SlideShare une entreprise Scribd logo
1  sur  16
Five Facts About Application
Usage on Enterprise Networks
            in Rest of ASEAN
 (Malaysia, Indonesia, Philippines, Vietnam)




      Application Usage and Risk Report
                         December 2011
Average number of social networking
     applications per organization?




A total of 50 different social networking applications were
 found in 83% of the 23 participating organizations with an
            average of 20 found on each network.
Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Based on the percentage of social networking bandwidth
   consumed in the 23 participating organizations, Facebook is
              consuming 73% of the bandwidth.

Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Facebook dominates. While Facebook is the dominant
 application in rest of ASEAN, action oriented uses, mainly
Zynga games, are used more heavily than they are globally.
Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Average number of browser-based
    filesharing applications per organization?




           A total of 32 different browser-based filesharing
         applications were found in 83% of the 23 participating
              organizations with an average of 18 in each.

Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Browser-based filesharing use cases: work or
entertainment. Both uses have a common set of business
   and security risks that organizations must address.
Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
The number of applications
                      using Port 80 (tcp/80) only?




   The number of applications that ONLY use Port 80 is 140 or
      21% of the 657 applications found in the participating
                          organizations.

Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Percentage of total bandwidth consumed
        by applications not using tcp/80?




   22% of the total bandwidth is being consumed by 280 (43%
    of 657) applications that DO NOT USE port 80 at all. Ever.


Rest of ASEAN: Malaysia,
Indonesia, Philippines, Vietnam
Port 80 only security is shortsighted. The common
perception is that Port 80 (tcp/80) is where all the traffic and all
     the problems are. A port 80 emphasis is an absolute
       requirement; but too much focus is shortsighted.
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

Contenu connexe

Tendances

Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks
 
In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014
Sumit Roy
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
1crore projects
 
In mobi insights the state of mobile app downloads
In mobi insights   the state of mobile app downloadsIn mobi insights   the state of mobile app downloads
In mobi insights the state of mobile app downloads
inmobikorea
 

Tendances (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for CanadaPalo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for DachPalo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
 
Application Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USApplication Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for US
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for BeneluxPalo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Nuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogaresNuevas tecnologías a nivel de hogares
Nuevas tecnologías a nivel de hogares
 
In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014In mobi state_of_app_downloads_q3_2014
In mobi state_of_app_downloads_q3_2014
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
Secure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeSecure your network to secure your reputation and your income
Secure your network to secure your reputation and your income
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
In mobi insights the state of mobile app downloads
In mobi insights   the state of mobile app downloadsIn mobi insights   the state of mobile app downloads
In mobi insights the state of mobile app downloads
 

Similaire à Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest of Asean

Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
Positive Hack Days
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
sng
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 

Similaire à Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest of Asean (20)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
 
Kjvg hit2008eng
Kjvg hit2008engKjvg hit2008eng
Kjvg hit2008eng
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
CIO Vietnam Talkshow 40th
CIO Vietnam Talkshow 40thCIO Vietnam Talkshow 40th
CIO Vietnam Talkshow 40th
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
SFSCON23 - Abid Munir Bajwa - Sustainability of Open Source Software and Pote...
SFSCON23 - Abid Munir Bajwa - Sustainability of Open Source Software and Pote...SFSCON23 - Abid Munir Bajwa - Sustainability of Open Source Software and Pote...
SFSCON23 - Abid Munir Bajwa - Sustainability of Open Source Software and Pote...
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Ci Digital Generation Survey 2008 with AIESEC - Results
Ci Digital Generation Survey 2008 with AIESEC - ResultsCi Digital Generation Survey 2008 with AIESEC - Results
Ci Digital Generation Survey 2008 with AIESEC - Results
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest of Asean

  • 1. Five Facts About Application Usage on Enterprise Networks in Rest of ASEAN (Malaysia, Indonesia, Philippines, Vietnam) Application Usage and Risk Report December 2011
  • 2.
  • 3. Average number of social networking applications per organization? A total of 50 different social networking applications were found in 83% of the 23 participating organizations with an average of 20 found on each network.
  • 4. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 5. Based on the percentage of social networking bandwidth consumed in the 23 participating organizations, Facebook is consuming 73% of the bandwidth. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 6. Facebook dominates. While Facebook is the dominant application in rest of ASEAN, action oriented uses, mainly Zynga games, are used more heavily than they are globally.
  • 7. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 8. Average number of browser-based filesharing applications per organization? A total of 32 different browser-based filesharing applications were found in 83% of the 23 participating organizations with an average of 18 in each. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 9. Browser-based filesharing use cases: work or entertainment. Both uses have a common set of business and security risks that organizations must address.
  • 10. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 11. The number of applications using Port 80 (tcp/80) only? The number of applications that ONLY use Port 80 is 140 or 21% of the 657 applications found in the participating organizations. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 12. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 13. Percentage of total bandwidth consumed by applications not using tcp/80? 22% of the total bandwidth is being consumed by 280 (43% of 657) applications that DO NOT USE port 80 at all. Ever. Rest of ASEAN: Malaysia, Indonesia, Philippines, Vietnam
  • 14. Port 80 only security is shortsighted. The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. A port 80 emphasis is an absolute requirement; but too much focus is shortsighted.
  • 15.
  • 16. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur