Key findings from Palo Alto Networks Application Usage and Risk Report, December 2011 (Taiwan Only).
The slides provides insight into application activity that is based on network application assessments that show what is really happening on corporate networks.
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
1. Five Facts About Application
Usage on Enterprise Networks
in Taiwan
Application Usage and Risk Report
December 2011
2.
3. Average number of social networking
applications per organization?
A total of 61 different social networking applications were
found in 99% of the 148 participating organizations with an
average of 12 found on each network.
4.
5. Which application is used more heavily?
Based on the percentage of social networking bandwidth
consumed, Zynga games consumed 10% of the bandwidth
while Twitter consumed only 2%.
6. Taiwan social networking usage is active. Facebook
dominates but action oriented (apps, games, posting, and
plugins) usage is greater in Taiwan than it is globally.
7.
8. Average number of browser-based
filesharing applications per organization?
A total of 53 different browser-based filesharing
applications were found in 97% of the 148 participating
organizations with an average of 15 in each.
9. Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
and security risks that organizations must address.
10.
11. The number of applications
using Port 80 (tcp/80) only?
The number of applications that ONLY use Port 80 is 228 or
25% of the 898 applications found in the participating
organizations.
12.
13. Percentage of total bandwidth consumed
by applications not using tcp/80?
Only 18% of the total bandwidth is being consumed by 292
(33% of 898) applications that DO NOT USE port 80 at all.
Ever.
14. Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
the problems are. A port 80 emphasis is an absolute
requirement; but too much focus is shortsighted.
15.
16. Palo Alto Networks Application Usage
and Risk Report
www.paloaltonetworks.com/aur