Five Facts About Application Usage on Enterprise Networks Application Usage and Risk Report December 2011.

Slides:



Advertisements
Similar presentations
Application Usage and Risk Report 7 th Edition, May 2011.
Advertisements

9 x9 81 4/12/2015 Know Your Facts!. 9 x2 18 4/12/2015 Know Your Facts!
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 x0 0 4/15/2015 Know Your Facts!. 9 x1 9 4/15/2015 Know Your Facts!
1 x0 0 4/16/2015 Know Your Facts!. 1 x8 8 4/16/2015 Know Your Facts!
3 x0 0 7/18/2015 Know Your Facts!. 4 x3 12 7/18/2015 Know Your Facts!
A “Dynamic” Firewall Jon Hillier Oxford University/ eScience Centre.
Understanding ac. What is ac? ac is the next generation WiFi standard 3X faster than n.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Social Recruiting Travis Davis, Recruitment Specialist NCDOT Career Services.
Inter-DC Measurements; App Workloads: Google, Facebook, Microsoft Aditya Akella Lecture 11.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Negotiating Unsolicited Connections to a Service Listening Behind a Firewall Ben Stroud CS525 Spring 10.
Supplier / Consumer communications model 1.One supplier / one consumer 2.Many suppliers / one consumer 3.One supplier / many consumers 4.Many suppliers.
MLA 2007 Presidential Inaugural Address Presidential Inaugural Address Tracking Usage of a Library’s Browser Based Toolbars Tracking Usage of a Library’s.
Are consumers really networked? And, if they are, should you care? Jim Jansen Senior Fellow Pew Internet & American Life Project (they are and you should)
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
Using Statistics Entrepreneurship. Math Review Percents A percent is a part of a whole Percents can be calculated from decimals by multiplying them by.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
EthicsStat …Now You Know Addressing Social Networking Ethics Resource Center April 22, 2009.
© 2012 Crain Communications Inc.. TREND REPORT APRIL 2012 © 2012 Crain Communications Inc. MANAGING YOUR BRAND’S SOCIAL LIFEChart 1 Unique visitors to.
What Did You Do At School Today Junior?
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
電管碩一 R 凌伊亭 Social Media Use In a Mobile Broadband Environment : Examination of Determinants of Twitter and Facebook Use International Journal of.
Introduction and Overview Chapter 1. Why Study TCP/IP? Forms global Internet base technology Has accommodated explosive growth well Protocols work over.
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
IABNZ presents… Social Media Marketing October representing NZ's fastest growing and exciting industry 1.
4 x1 4 10/18/2015 Know Your Facts!. 5 x /18/2015 Know Your Facts!
3 x0 0 10/18/2015 Know Your Facts!. 11 x /18/2015 Know Your Facts!
 decimals/cc-7th-fracs-to-decimals/v/converting-fractions-to-decimals-example.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Hosted by 2004 Purchasing Intentions Survey Mark Schlack Editorial Director, Storage Media Group TechTarget.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Social Networking Presentation to Department Heads January 21, 2010.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Bell Ringer Activity  Pick up a graphic organizer about Social Networking  First, in your own words, explain what social media means to you (be prepared.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
This week on social media Oct 29 th -Nov 4 th. General stats.
Mobile. A rapidly growing smartphone audience 49.8 million people own a mobile phone in the UK 73% of mobile phones in the UK are smartphones Smartphone.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
1 Foothill College, El Monte Road, Los Altos Hills, CA | foothill.edu El Monte Road Los Altos Hills, CA foothill.edu Student Enrollment:
House Cleaning Company Dallas TX
Calgary Computer Support Services -
Home Cleaning Services Dallas TX
What we know about our customers
Calgary IT Network Support -
Accessing the WAN – Chapter 5
Fraud Mobility Ken Meiser VP- Identity Solutions.
HP support phone number
HP tech support number Call Us Now :
Business Meetings in Australia
Kettlebell Workouts - Kettlebellworkouts.com
House for Sale in Passaic NJ Cashbuyernewjersey.com.
Accessing the WAN – Chapter 5
Business Events in Blue Mountains
Accounting Network . -
Professional Women's Network
Accessing the WAN – Chapter 5
Basel III Accord Leverage Ratio= [ Tier 1/ Weighted Average Risk ] Emphasis: Tier I to be Dominated by Common Equity and Retained Earnings.
Learn Your 2x Facts.
GTN TRAFFIC & TRAVEL RESEARCH
SOCIAL NETWORK 82% 60% 45% 26% 12% INSTAGRAM FACEBOOK TWITTER GOOGLE+
By Seferash B Asfa Wossen Strayer University 3rd December 2003
SaaS Usage Report Guide
Funding Accelerator Programs
Calgary computer security
THE GROWTH ENVIRONMENT.
Presentation transcript:

Five Facts About Application Usage on Enterprise Networks Application Usage and Risk Report December 2011

Average number of social networking applications per organization?

A total of 71 different social networking applications were found in 97% of the 1,636 participating organizations. An average of 16 were found on each network.

Which application is showed the most significant Y-O-Y growth rate?

Based on the percentage of social networking bandwidth consumed, Twitter increased 7-fold in a year-over-year comparison.

Social networking becomes more active. While Facebook is the dominant application, Twitter and in rest action oriented uses increased significantly in Y-O-Y comparison.

Average number of browser-based filesharing applications per organization?

A total of 65 different browser-based filesharing applications were found in 92% of the 1,636 participating organizations. An average of 13 were found on each network.

Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.

The number of applications using Port 80 (tcp/80) only?

The number of applications that ONLY use Port 80 is 297 or 25% of the 1,195 applications found in the participating organizations.

Percentage of total bandwidth consumed by applications not using tcp/80?

51% of the total bandwidth is being consumed by 413 (35% of 1,195) applications that DO NOT USE port 80 at all. Ever.

Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.

Palo Alto Networks Application Usage and Risk Report