The Application Usage and Risk Report End User Application Trends in the Enterprise - Country Specific Findings

Similar documents
Power Analyzer Firmware Update Utility Version Software Release Notes

Global entertainment and media outlook Explore the content and tools

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Safety. Introduction

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

Troubleshooting Ethernet Problems with Your Oscilloscope APPLICATION NOTE

APP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform

Traffic Offload. Cisco 7200/Cisco 7500 APPLICATION NOTE

Appendix G. Percentiles and Standard Deviations of Science Achievement TIMSS 2011 INTERNATIONAL RESULTS IN SCIENCE APPENDIX G 495

DataKom Vodafone Mobile Tariff Minimum 30 day end of month notice cancellation - Subject to contract. DataKom O2 Mobile Tariff. All prices exclude VAT

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

iclass SE multiclass SE 125kHz, 13.56MHz 125kHz, 13.56MHz

Next-Generation Firewall Overview

Digital EAGLEs. Outlook and perspectives

E-Seminar. Voice over IP. Internet Technical Solution Seminar

Multi-Site Parallel Testing with the S535 Wafer Acceptance Test System APPLICATION NOTE

Fast 3D EMC/EMI Scan with Detectus Scanning System and Tektronix Real Time Spectrum Analyzers CASE STUDY

Insights for Clubs

Innovative Fastening Technologies

User SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to!

DATA APPENDIX. Real Exchange Rate Movements and the Relative Price of Nontraded Goods Caroline M. Betts and Timothy J. Kehoe

Cisco AVVID The Architecture for E-Business

For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops

ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY

Students Backgrounds And Attitudes Toward Mathematics

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Managed Network Services. Managing your network to enable your digital business

CISCO IP PHONE 7970G NEW! CISCO IP PHONE 7905G AND 7912G XML

High-Availability Solutions for SIP Enabled Voice-over-IP Networks

Access Code and Phone Number

Microsoft Dynamics 365 for Finance and Operations. Table of contents

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

Alternative phone number: Credit card/debit card number Expiry date: / / DD MM YYYY

Home Resources for Learning Scale, Fourth Grade

Purchasing. Operations 3% Marketing 3% HR. Production 1%

RT-AX95U Wireless-AX11000 Tri Band Gigabit Router

What Are the Background Characteristics of Mathematics Teachers?

Patent Portfolio Overview May The data in this presentation is current as of this date.

Teacher Job Satisfaction Scale, Fourth Grade

Chapter 7. Teacher Preparation

Enterprise price plan guide Vodafone One Net Business

Technology Lifecycle Management Assessment. Know your network - achieve business agility

Spoka Meet Audio Calls Rates Dial-In UK

RPM International Inc. Hotline Instructions

Microsoft Dynamics 365 for Finance and Operations, Enterprise edition. Table of contents

Transforming networks and services for communications service providers

THE POWER OF A STRONG PARTNERSHIP.

Student Bullying Scale, Fourth Grade

Cisco CallManager 4.0-PBX Interoperability: Lucent/Avaya Definity G3 MV1.3 PBX using 6608-T1 PRI NI2 with MGCP

Cisco Voice Services Provisioning Tool 2.6(1)

Dataliner Message Displays Using DL50 Slaves with a DL40 Master

GW-WN150M 11b/g/n USB Wireless User Manual

Cisco Extensible Provisioning and Operations Manager 4.5

OPERATIONS MANUAL Audio Conferencing

PIRLS 2016 INTERNATIONAL RESULTS IN READING

Chapter 5. School Resources for Teaching Mathematics

Server Virtualisation Assessment. Service Overview

Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf

U85026A Detector 40 to 60 GHz

PLX35-NB2 RELEASE NOTES. Network Bridge Stand Alone Gateway. July 20, 2018

Troubleshooting Ethernet Problems with Your Oscilloscope APPLICATION NOTE

PAY MONTHLY ADDITIONAL SERVICES TERMS AND CONDITIONS

Chapter 3. Literacy-related Activities in the Home

Patent Portfolio Overview July The data in this presentation is current as of this date.

AdaptaScan Reader to a PLC-5 Using DH-485 Protocol with the 2760 RB Module and the 2760-SFC2 Protocol Cartridge

CONFIGURING EPOLICY ORCHESTRATOR 3.0 AND MCAFEE 8.0i WITH CISCO CALLMANAGER

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

Iridium. Roadpost Satellite Service. Customer Care. A free call from your Roadpost satellite phone:

Global Entertainment & Media Outlook.

Programming Note. Agilent Technologies Quick Reference Guide For the 8757D/E Scalar Network Analyzer

FORGING A TRUE GLOBAL CONNECTION - BROADBAND PASSES 500 MILLION SUBSCRIBERS

Introduction to the Export Services Branch Programmes and Services Ministry of International Trade

Global Deployment of SD-WAN. Mike Howell October 2017

END-USER MANUAL. Sennheiser HeadSetup Pro

AdaptaScan Reader to a PLC-5 Using RS-232/ASCII Protocol with the 2760 RB Module and the 2760-SFC1 and -SFC2 Protocol Cartridge

Measures to Maintain Post-Nuclear Security Summit Momentum for Continuously Enhancing Nuclear Security

Strategic IT Plan Improves NYCHA Resident Services While Reducing Costs US$150 Million

E-Seminar. Wireless LAN. Internet Technical Solution Seminar

RTPA2A. TekConnect probe adapter for real-time spectrum analyzers. Tektronix high-performance probing solutions. Applications. Notice to EU customers

EE Pay Monthly Add-Ons & Commitment Packs. Version

World Broadband Statistics: Q Fiona Vanier December 2008

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

Sunao SATO Japan Patent Office January 21, 2016

Investigating Country Differences in Mobile App User Behaviour and Challenges for Software Engineering. Soo Ling Lim

Items exceeding one or more of the maximum weight and dimensions of a flat. For maximum dimensions please see the service user guide.

Conferencing and Recording

Взято с сайта

Mobile Communications Worldwide Cluster Research

Software-defined Networking Development Model

digital.vector Global Animation Industry Strategies, Trends & Opportunities digital.vector

International Business Mail Rate Card

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary

SurroundVideo Megapixel IP Cameras. (1,1) Arecont Surround 6pg RA-1 AV.indd

Improving digital infrastructure for a better connected Thailand

International Packets

Instructions. (For 6180 Industrial Computers) Installing a Processor Upgrade

VOICE/DATA SIMCARD USA UNLIMITED

Keysight Technologies Configuring Boundary Scan Chains on Keysight x1149 Boundary Scan Analyzer. Application Note

Transcription:

The Application Usage and Risk Report End User Application Trends in the Enterprise - Country Specific Findings December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 www.paloaltonetworks.com

Table of Contents Executive Summary... 3 Country Specific Findings Europe... 4 Benelux (Belgium, Luxembourg, Netherlands)... 4 France... 5 DACH (Germany, Switzerland and Austria)... 6 Italy... 7 Nordics (Denmark, Finland, Norway, Sweden)... 8 UK... 9 Spain... 10 Middle East (Jordan, Kuwait, Oman, Qatar, Saudi Arabia, UAE)... 11 Country Specific Findings APAC... 12 ANZ (Australia and New Zealand)... 12 China... 13 Hong Kong... 14 Taiwan... 15 Korea... 16 Singapore... 17 Thailand... 18 Rest of ASEAN (Malaysia, Indonesia, Philippines, Vietnam)... 19 Country Specific Findings Japan... 20 Country Specific Findings North America... 21 USA... 21 Canada... 22 Appendix 1: Demographics and Methodology... 23 2012 Palo Alto Networks Page 2

Executive Summary The Application Usage and Risk Report (8 th Edition, December 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide between April 2011 and November 2011. The key findings and observations both globally and by specific countries are outlined below. To view the global findings, please download the Application Usage and Risk Report (8 th Edition, December 2011) here. Social networking usage becomes more active. Active usage of social networking applications (Facebook-apps, games, social-plugins and posting) more than tripled, going from a cumulative 9% (October 2010) to 28% (December 2011) when measured as a percentage of total social networking bandwidth. With 65 different browser-based filesharing variants found and an average of 13 being used in each of the participating organizations, two clear use cases are emerging within the browser-based filesharing market: work and entertainment. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. The analysis shows that 51% of the bandwidth consumed by 35% of the applications do not use tcp/80. In contrast, the 297 applications that use only tcp/80, and no other port by default, represent a mere 25% of the applications and 32% of the bandwidth observed. 2012 Palo Alto Networks Page 3

Country Specific Findings Europe Benelux (Belgium, Luxembourg, Netherlands) The Benelux sample encompassed 115 organizations with 973 applications detected. Key findings include: Social networking usage becomes more active. Active social networking application (games, plugins, posting) usage is similar to global usage patterns. Hyves holds its own against most heavily used Facebook and Twitter. Interestingly, Renren, a Chinese social networking application appears at 4% - which is somewhat odd. A total of 62 different social networking applications were found in 99% of the participating organizations. An average of 14 were found on each network. There were 52 different browserbased across 96% of the 115 organizations observed in Benelux. Each organization had an average of 10 different variants on their network with Dropbox and Megaupload most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 973 applications found, 38% (370) of the applications do not use port 80 at all and those applications are consuming 38% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 4

France The French sample encompassed 85 organizations with 867 applications detected. Key findings include: Social networking usage becomes more active. Social networking games and plugins are used more heavily in France than they are globally Facebook is a clear dominant player with 39% of the bandwidth consumed. On average, 16 social networking applications per organization were found across 98% of the organizations observed. In total, 63 different social networking applications were found in France. There were 54 different browserbased across 94% of the 85 organizations observed in France. Each organization had an average of 15 different variants on their network with Dropbox being most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. Out of the 867 applications found, 30% of them do not use port 80 at all and those applications are consuming 55% of the bandwidth. A focus on tcp/80 is a security requirement, without a doubt, but too much focus may introduce significant risks. 2012 Palo Alto Networks Page 5

DACH (Germany, Switzerland and Austria) The sample in DACH encompassed 62 organizations with 833 applications detected. Key findings include: Social networking usage becomes more active. Several local social networking applications are in use while active social networking applications (games, posting, plugins, apps) usage is similar to the global usage patterns. on average, 19 social networking applications per organization were found across 97% of the 62 DACH organizations observed. A total of 62 social networking applications were found. There were 48 different browserbased across 90% of the 62 organizations observed. Each organization had an average of 13 different variants on their network with Rapidshare being used most heavily. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 833 applications found in the 62 organizations observed, 30% of them do not use port 80 at all and those applications are consuming 65% of the bandwidth. A focus on tcp/80 is a security requirement, without a doubt, but too much focus may introduce significant risks. 2012 Palo Alto Networks Page 6

Italy The Italian sample encompassed 51 organizations with 725 applications detected. Key findings include: Social networking usage becomes more active. In Italy, Facebook social plugins consumed 25% of the bandwidth - nearly as much as Facebook itself (24%) while Twitter consumed a mere 6% of the overall social networking bandwidth. An average of 13 social networking applications per organization were found across 96% of the 51 Italian organizations observed. In total, 53 variants were found. There were 44 different browserbased across 90% of the 51 organizations observed. Each organization had an average of 13 different variants on their network with Megaupload being used most heavily. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 725 applications observed, 28% of them do not use port 80 at all and those applications are consuming 34% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 7

Nordics (Denmark, Finland, Norway, Sweden) The Nordics sample encompassed 55 organizations with 785 applications detected. Key findings include: Social networking usage becomes more active. Interestingly, Vkontakte, originally a Russian only site, now in 67 languages, consumed 20% of the bandwidth while Twitter consumed only 8%. Part of the bandwidth consumption may be related Vkontakte s integration with filesharing torrents. On average, 15 social networking applications per organization were found across 87% of the 55 organizations observed in the Nordics. A total of 63 different social networking applications were found. There were 42 different browserbased across 78% of the 55 organizations observed. Each organization had an average of 10 different variants on their network with Dropbox and Megaupload being most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 935 applications found, 28% of them do not use port 80 at all and those applications are consuming 42% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 8

UK The UK sample encompassed 70 organizations with 812 applications detected. Key findings include: Social networking usage becomes more active. In the UK, active social networking applications (games, posting, plugins, apps) usage patterns are similar to those seen globally. On average, 17 social networking applications per organization were found across 100% of the 70 organizations observed. A total of 68 different social networking applications were found. There were 42 different browserbased across 96% of the organizations observed. Each organization had an average of 13 different variants on their network with Dropbox being most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 812 applications found, 30% of them do not use port 80 at all and those 214 applications are consuming 61% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 9

Spain The sample in Spain encompassed 71 organizations with 935 applications detected. Key findings include: Social networking usage becomes more active. In Spain, active social networking applications (games, posting, plugins, apps) are used a bit more heavily when compared to the global usage patterns. On average, 21 social networking applications per organization were found across 99% of the 71 organizations observed. A total of 63 different social networking applications were found. There were 48 different browserbased across 96% of the organizations observed. Each organization had an average of 21 different variants on their network with Megaupload being most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 935 applications found in the 71 organizations observed, 37% of them do not use port 80 at all and those applications are consuming 53% of the bandwidth. A focus on tcp/80 is a security requirement, without a doubt, but too much focus may introduce significant risks. 2012 Palo Alto Networks Page 10

Middle East (Jordan, Kuwait, Oman, Qatar, Saudi Arabia, UAE) The sample in the middle east encompassed 37 organizations with 674 applications detected. Key findings include: Social networking usage becomes more active. Active social networking applications (games, posting, plugins, apps) are used a bit more heavily when compared to the global view. Facebook is a clear dominant player with 52% of bandwidth consumed. On average, 19 social networking applications per organization were found across 97% of the 37 organizations observed. A total of 55 different social networking applications were found. There were 46 different browserbased filesharing applications found across 95% of the organizations observed. Each organization had an average of 18 different variants on their network with Filesonic being most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 674 applications, 40% of them do not use port 80 at all and those applications are consuming 81% of the bandwidth. A focus on tcp/80 is a security requirement, without a doubt, but too much focus may introduce significant risks. 2012 Palo Alto Networks Page 11

Country Specific Findings APAC ANZ (Australia and New Zealand) The ANZ sample encompassed 21 organizations with 566 applications. Key findings include: Social networking usage becomes more active. Tumblr, a micro-blogging site based in NY city was used more heavily than any other social networking application. ANZ is the only geography where Tumblr was used so heavily and it highlights the fact that where the application is developed has little bearing on where it is popular. An average of 20 social networking applications per organization (and a total of 48) were found. There were 34 different browserbased across 81% of the 21 organizations observed. Each organization had an average of 12 different variants on their network. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 566 applications found, 39% of them do not use port 80 at all and those 219 applications are consuming 67% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 12

China The Chinese sample encompassed 18 organizations with 535 applications detected. Key findings include: Social networking usage becomes more active. Localized social networking sites are more popular and are used more heavily than others. A total of 48 different social networking applications were found across 94% of the 18 organizations observed with an average of seven detected on each network (the lowest out of all geographies observed). There were 30 different browserbased across 89% of the organizations observed. Each organization had an average of eight different variants on their network with fs2you the most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. Out of the 535 applications found in the 18 Chinese organizations observed, 30% of them do not use port 80 at all and those 161 applications are consuming 49% of the bandwidth. A focus on tcp/80 is a security requirement, without a doubt, but too much focus may introduce significant risks. 2012 Palo Alto Networks Page 13

Hong Kong The Hong Kong sample encompassed 46 organizations with 734 applications detected. Key findings include: Social networking usage becomes more active. While Facebook dominates, some of the action oriented applications, (apps, plugins, games, posting) are used more heavily in Hong Kong than they are globally. On average, 14 social networking applications per organization were found across 98% of the 46 organizations observed. A total of 63 different social networking applications were found. There were 41 different browserbased across 100% of the organizations observed. Each organization had an average of 12 different variants on their network. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. Conventional wisdom suggests that most of an organization s traffic is going through tcp/80. Out of 734 applications, 27% of them do not use port 80 at all and those 195 applications are consuming 19% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 14

Taiwan The Taiwan sample encompassed 148 organizations with 898 applications detected. Key findings include: Social networking usage becomes more active. While Facebook dominates, the action oriented uses (apps, games, posting, and plugin) are all used more heavily in Taiwan then they are globally. An average of 12 social networking applications per organization (and a total of 61) were found across 99% of the 148 Taiwan organizations observed. There were 53 different browserbased across 97% of the organizations observed. Each organization had an average of 15 different variants on their network with Megaupload used most heavily. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. Conventional wisdom suggests that most of an organization s traffic is going through tcp/80. Out of 898 applications found, 33% of them do not use port 80 at all and those 292 applications are consuming 18% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 15

Korea The Korean sample encompassed 35 organizations with 707 applications detected. Key findings include: Social networking usage becomes more active. While Facebook dominates elsewhere, Daum and Cyworld both are used more heavily in Korea than anywhere else. An average of 20 social networking applications per organization (and a total of 57) were found across 96% of the organizations observed. There were 55 different browserbased filesharing applications found across 86% of the organizations observed. Each organization had an average of 18 different variants on their network with Naver-ndrive used most heavily. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. Conventional wisdom suggests that most of an organization s traffic is going through tcp/80. Out of the 707 applications found, 30% of them do not use port 80 at all and those 214 applications are consuming 20% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 16

Singapore The Singapore sample encompassed 65 organizations with 775 applications detected. Key findings include: Social networking usage becomes more active. While Facebook dominates elsewhere, the action oriented uses (apps, games, posting, and plugin) are all used more heavily in Singapore then they are globally. An average of 16 social networking applications (and 64 in total) were found on 97% of the 65 participating organizations. There were 47 different browserbased across 92% of the organizations observed. Each organization had an average of 18 different variants on their network. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 775 applications found, 29% of them do not use port 80 at all and those 216 applications are consuming 49% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 17

Thailand The Thai sample encompassed 75 organizations with 759 applications detected. Key findings include: Social networking usage becomes more active. Facebook is consuming the most bandwidth but games and posting are all used more heavily in Thailand then than they are globally. On average, 16 social networking applications per organization (and 60 in total) were found across 97% of the 75 organizations observed. There were 48 different browserbased filesharing applications found across 95% of the organizations observed. Each organization had an average of 16 different variants on their network with Mediafire being the most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. Out of the 759 applications observed in the analysis for Thailand, 28% of the applications do not use port 80 at all and those 210 applications are consuming 34% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 18

Rest of ASEAN (Malaysia, Indonesia, Philippines, Vietnam) The rest of ASEAN sample encompassed 23 organizations with 657 applications detected. Key findings include: Social networking usage becomes more active. Facebook is consuming the most bandwidth, but some of the action oriented uses, mainly Zynga games, are used more heavily in ASEAN than they are globally. On average, 20 social networking applications (and 50 in total) were found across 83% of the organizations observed. There were 32 different browserbased across 83% of the organizations observed. Each organization had an average of 18 different variants on their network with Mediafire being the most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. Conventional wisdom suggests that most of an organization s traffic is going through tcp/80. Out of 657 applications found in the organizations observed, 43% of the applications do not use port 80 at all and those 280 applications are consuming 22% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 19

Country Specific Findings Japan The Japanese sample encompassed 89 organizations with 923 applications detected. Key findings include: Social networking usage becomes more active. Twitter usage is consuming 85% of the social networking bandwidth, leaving only 15% for the other 71 social networking applications. How will they all survive? On average, 91% of the 89 Japanese organizations had 15 different social networking applications in use. There were 65 different browserbased filesharing applications found across 89% of the organizations observed. An average of 12 browser-based filesharing applications were found each participating organizations with Dropbox being the most heavily used. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. In fact, out of 923 applications found, 42% of them do not use port 80 at all and those 390 applications are consuming 53% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 20

Country Specific Findings North America USA The USA sample size encompassed 395 organizations with 1,121 applications detected. Key findings include: Social networking usage becomes more active. Action-oriented social networking applications (games, plugins, posting) are used more heavily in the USA than they are globally. There were 69 different social networking applications found across 96% of the 395 organizations. On average, there were 15 different social networking applications in use. Browser-based filesharing use cases: There were 55 different browser-based filesharing applications found with across 95% of the organizations observed and an average of 11 were found on each network. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. Out of 1,121 applications found, 48% of them do not use port 80 at all and those 534 applications are consuming 54% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 21

Canada The Canadian sample encompassed 49 organizations with 703 applications detected. Social networking usage becomes more active. In Canada, active social networking applications (games, plugins, posting) are used more heavily than they are globally. There were 58 different social networking applications found with an average of 15 detected on 94% of the 49 participating organizations. There were 36 different browser-based filesharing applications found across 94% of the organizations observed and an average of 10 were found on each network. Regardless of how they are used, the risks associated with browser-based filesharing applications are significant; they are an unchecked set of applications flowing across most firewalls using tcp/80, sometimes SSL and others hopping ports. organization s traffic is going through tcp/80. Out of the 703 applications found in the Canadian organizations observed, 40% of them do not use port 80 at all and those 282 applications are consuming 65% of the bandwidth. A focus on tcp/80 is a security 2012 Palo Alto Networks Page 22

Appendix 1: Demographics and Methodology The data in this report is generated from 1,636 traffic assessments where a Palo Alto Networks nextgeneration firewall is deployed within the network, in either tap mode or virtual wire mode, where it monitors traffic traversing the Internet gateway. At the end of the data collection period, usually up to seven days, an Application Visibility and Risk Report is generated that presents the findings along with the associated business risks, and a more accurate picture of how the network is being used. The data from each of the AVR Reports is then aggregated and analyzed, resulting in The Application Usage and Risk Report. Delivered as a purpose-built platform, Palo Alto Networks next-generation firewalls bring visibility and control over applications, users and content back to the IT department using three identification technologies: App-ID, Content-ID and User-ID. App-ID: Using as many as four different traffic classification mechanisms, App-ID TM accurately identifies exactly which applications are running on networks irrespective of port, protocol, SSL encryption or evasive tactic employed. App-ID gives administrators increased visibility into the actual identity of the application, allowing them to deploy comprehensive application usage control policies for both inbound and outbound network traffic. Content-ID: A stream-based scanning engine that uses a uniform threat signature format detects and blocks a wide range of threats and limits unauthorized transfer of files and sensitive data (CC# and SSN), while a comprehensive URL database controls non-work related web surfing. The application visibility and control delivered by App-ID, combined with the comprehensive threat prevention enabled by Content-ID, means that IT departments can regain control over application and related threat traffic. User-ID: Seamless integration with enterprise directory services (Microsoft Active Directory, LDAP, edirectory) links the IP address to specific user and group information, enabling IT organizations to monitor applications and content based on the employee information stored within Active Directory, edirectory, LDAP or a range of terminal services solutions. User-ID allows administrators to leverage user and group data for application visibility, policy creation, logging and reporting. Purpose-Built Platform: Designed specifically to manage enterprise traffic flows using functionspecific processing for networking, security, threat prevention and management, all of which are connected by a 20 Gbps data plane to eliminate potential bottlenecks. The physical separation of control and data plane ensures that management access is always available, irrespective of the traffic load. To view details on more than1,400 applications currently identified by Palo Alto Networks, including their characteristics and the underlying technology in use, please visit Applipedia, the Palo Alto Networks encyclopedia of applications 2012 Palo Alto Networks Page 23

About Palo Alto Networks Palo Alto Networks is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content by user, not just IP address at up to 20Gbps with no performance degradation. Based on patent-pending App-ID technology, Palo Alto Networks firewalls accurately identify and control applications regardless of port, protocol, evasive tactic or SSL encryption and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect and to combat targeted malware with its WildFire service. For more information, visit www.paloaltonetworks.com. 2012 Palo Alto Networks Page 24