Application Usage and Risk Report 7 th Edition, May 2011.

Slides:



Advertisements
Similar presentations
Case Study: Examining the Results of P2P Collaboration at PricewaterhouseCoopers February 14, 2001 Case Study: Examining the Results of Collaboration at.
Advertisements

TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
RAC One Node – The “Always On” Single Instance Database
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Demystifying IPv6: Ensuring a Smooth Transition John Curran ARIN President & CEO This presentation describes the impending depletion of Internet Protocol.
A Media Subscription Service By Peter Kriens CEO aQute OSGi Technology Officer
1Abacast - Confidential1 Hybrid Content Delivery Network (CDN) Technologies and Services.
© Copyright IBM Corporation 2009 IBM Global Business Services Innovation driving strategic choices for P2P Saul Berman Global & Americas Leader, IBM Strategy.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Mean, Median, Mode & Range
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Copyright, 2011 WowWe® VERS ONLINE 2 3.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
New Silent Knight Buyer SAP Based e-commerce. 2HONEYWELL - CONFIDENTIAL File Number 2HONEYWELL - CONFIDENTIAL File Number Agenda E-commerce training resources.
9th Northumbria International Conference on Performance Measurement in Libraries and Information Services York, UK. Aug. 22 nd – 26th, 2011 Leifang HeLeifang.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Chapter 1: Introduction to Scaling Networks
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.
Employee & Manager Self Service Overview
Palo Alto Networks Jay Flanyak Channel Business Manager
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
Gameology Games and Digital Goods Spending Behavior Report July 2011.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Squares and Square Root WALK. Solve each problem REVIEW:
E-business infrastructure
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Services Course Windows Live SkyDrive Participant Guide.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
Essential Cell Biology
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 12 Integrating the Organization from End to End – Enterprise Resource Planning.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Energy Generation in Mitochondria and Chlorplasts
Benchmark Series Microsoft Excel 2013 Level 2
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
What Did You Do At School Today Junior?
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
About Palo Alto Networks
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Five Facts About Application Usage on Enterprise Networks Application Usage and Risk Report December 2011.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.
Basic Policy Overview Palo Alto.
How Smart Networks are Changing Corporate Networks
Presentation transcript:

Application Usage and Risk Report 7 th Edition, May 2011

About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking experience - Founded in 2005, first customer July 2007 Builds next-generation firewalls that identify / control applications - Restores the firewall as the core of the enterprise network security infrastructure - Innovations: App-ID, User-ID, Content-ID Global footprint: 4,000+ customers in 70+ countries, 24/7 support

Applications Anytime, Anyplace! © 2010 Palo Alto Networks. Proprietary and Confidential.Page 3 |

Application Usage & Risk Report – May 2011 © 2010 Palo Alto Networks. Proprietary and Confidential.Page 4 |

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 5 | Methodology and Demographics Methodology - Analysis is based on live customer traffic – not a survey - How are networks being used? - What applications are running on enterprise networks? - What are the risks associated with the existing application mix? Demographics - 1,253 organizations worldwide, up from ,042 applications found, up from Exabytes of bandwidth

Key Findings Organizations are blind to hidden application traffic - More than 40% of the applications can use SSL or hop ports; consumes roughly 36% of the overall bandwidth Work is more social - Social networking and webmail use shows 5X growth, IM use doubled over the past 6 months File transfer applications: will history repeat itself? - Browser-based file-sharing adapting same characteristics as P2P © 2011 Palo Alto Networks. Proprietary and Confidential.Page 6 |

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 7 | Hidden application traffic 41% of the applications (433) found can use SSL or hop ports Consuming roughly 36% of overall bandwidth Only 43% use the browser Worldwide: Many Hidden Applications

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 8 | Can use SSL on 443 or any other port… 215 applications, 8% of bandwidth consumed Heavy emphasis on consumer, end-user applications; highest amount of business and security risk Many collaborative applications both business and personal Many P2P Filesharing, proxy, and social networking also fall into this group Examples: Most Google apps, Facebook, Twitter, several SW update apps

Can use SSL on 443 Only… Small group of applications (29) – includes SSL proper Consumes 14% of bandwidth Business: Webex, NetSuite, a range of software updates Non-business: Tor, party-poker, google-location-service © 2011 Palo Alto Networks. Proprietary and Confidential.Page 9 |

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 10 | Can use SSL on any port except 443… Small group of applications (18) and 1% of bandwidth Business applications include Cisco VPN and Microsoft Exchange Non-business applications include Gnutella and icq

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 11 | Can Hop Ports… 171 applications; 14% of the bandwidth consumed Filesharing (30), photo-video (24) and VoIP (21) are most common in this group SharePoint, NetFlow and many storage applications also fit this definition The darker side: P2P, gaming, some encrypted tunnel (hotspot-shield, gbridge)

Filesharing: Will History Repeat Itself? © 2011 Palo Alto Networks. Proprietary and Confidential.Page 12 | Browser-based filesharing; increasingly popular; more than 60 variants New business and security risks introduced through differentiation Premium service via a persistent client Repurposed technology: peer-to-peer, RTMPT

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 13 | Work Has Become More Social Social Networking and webmail show nearly 5X growth; IM use almost doubles Facebook, Linkedin, Twitter make up top 3 Facebook extends dominance; usage remains passive

Consumerization is driving business © 2011 Palo Alto Networks. Proprietary and Confidential.Page 14 |

Business Use of Social Networking Report : The state of corporate social media in 2011 from usefulsocialmedia.com. The majority of companies expect social media to become integrated into more than just marketing throughout % of the companies expect social media budgets to increase over The most common corporate social media use is for marketing (88%) and communications (93%). By the end of 2011, the biggest change in corporate use of social media will be the growth of companies using it for customer service (73%), employee engagement (59%) and product development (52%). © 2011 Palo Alto Networks. Proprietary and Confidential.Page 15 |

Summary Organizations are blind to SSL - and the amount of SSL in use is forecast to continue growing - Policy and controls must address this Social networking is making the workplace MORE social - Use continues to expand - It isn't replacing other modes of interaction – in fact, it may be helping them Browser-based filesharing is rapidly evolving – many now have the same characteristics as P2P - Some introducing clients, connecting peers - Will they introduce the same types of risks? © 2011 Palo Alto Networks. Proprietary and Confidential.Page 16 |

Applications Have Changed; Firewalls Have Not © 2011 Palo Alto Networks. Proprietary and Confidential.Page 17 | Need to restore visibility and control in the firewall BUT…applications have changed Ports Applications IP Addresses Users Packets Content The gateway at the trust border is the right place to enforce policy control Sees all traffic Defines trust boundary

Technology Sprawl & Creep Are Not The Answer More stuff doesnt solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain © 2011 Palo Alto Networks. Proprietary and Confidential.Page 18 | Internet Putting all of this in the same box is just slow

The Right Answer: Make the Firewall Do Its Job © 2011 Palo Alto Networks. Proprietary and Confidential.Page 19 | New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation

© 2010 Palo Alto Networks. Proprietary and Confidential. Beware of Imitators………..

To Block or Not Block © 2010 Palo Alto Networks. Proprietary and Confidential.Page 21 |

Next Generation FW for Dummies at our Table © 2010 Palo Alto Networks. Proprietary and Confidential.Page 22 |

Thanks! Jeff Stiling © 2010 Palo Alto Networks. Proprietary and Confidential.Page 23 |

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 24 |