palo alto networks application usage and risk report - key findings for italy

16
Five Facts About Application Usage on Enterprise Networks in Italy Application Usage and Risk Report December 2011

Upload: palo-alto-networks

Post on 19-Jan-2015

880 views

Category:

Technology


1 download

DESCRIPTION

Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Italy Only). The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.

TRANSCRIPT

Page 1: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Five Facts About ApplicationUsage on Enterprise Networks

in Italy

Application Usage and Risk Report December 2011

Page 2: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Average number of social networking applications per organization?

15

Page 3: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Average number of social networking applications per organization?

A total of 53 different social networking applications were found in 96% of the 51 participating organizations with an

average of 13 found on each network.

13

Page 4: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Which application is used more heavily?

(Facebook Social Plugins)

Page 5: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Which application is used more heavily?

Based on the percentage of social networking bandwidth consumed, social plugins consumed 25% - nearly as much as Facebook itself (27%) while Twitter consumed a mere 6%

of the overall social networking bandwidth.

(Facebook Social Plugins)

Page 6: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Facebook social plugins are used more heavily than in rest of the world. Tumblr is also used heavily, when compared to the

global use.

Page 7: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Average number of browser-based filesharing applications per organization?

19

Page 8: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Average number of browser-based filesharing applications per organization?

A total of 44 different browser-based filesharing applications were found in 90% of the 51 participating

organizations with an average of 13 in each.

13

Page 9: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business

and security risks that organizations must address.

Page 10: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

The number of applications using Port 80 (tcp/80) only?

175

Page 11: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

The number of applications using Port 80 (tcp/80) only?

The number of applications that ONLY use Port 80 is 194 or 27% of the 725 applications found in the participating

organizations.

194

Page 12: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Percentage of total bandwidth consumed by applications not using tcp/80?

30%

Page 13: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Percentage of total bandwidth consumed by applications not using tcp/80?

34% of the total bandwidth is being consumed by 205 (28% of 725) applications that DO NOT USE port 80 at all. Ever.

34%

Page 14: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all

the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.

Page 15: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Demographics and Methodology: The data in this presentation is based on actual network traffic. It is not a survey. Data is collected (with

permission) as part of the Palo Alto Networks customer evaluation process where a Palo Alto Networks next-generation firewall is deployed to monitor

network application traffic. At the end of the evaluation, the customer receives a report that provides unprecedented insight into their network

traffic, detailing the applications found, and their corresponding risks. The traffic patterns observed are then anonymously summarized in the

Application Usage and Risk Report.

Page 16: Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy

Palo Alto Networks Application Usage and Risk Report

www.paloaltonetworks.com/aur