SlideShare a Scribd company logo
1 of 12
Where’s My Bandwidth?

Global Findings from the June 2012
Application Usage and Risk Report
Where’s My Bandwidth?

Key questions this report answers:

•   Which application categories consume the most bandwidth?

•   Exactly how much bandwidth does streaming video consume?

•   Which type of filesharing is most heavily used?

•   Is social networking truly a bandwidth hog?
Top 5 Categories = 76% of the Bandwidth




Peel away the corporate usage. Roughly a quarter of your bandwidth $$$
                       is video and filesharing…
Users Like to Watch Video




   13% of total bandwidth is video/photo traffic. 107 variants found; an
average of 34 in 97% of the organizations. A fraction of it is corporate use.
P2P Never Dies




It continues to be used despite control efforts. 7 variants found in 78% of
                           the organizations.
The Filesharing Traffic
                  Port-based Firewalls Miss




Nearly 15% of filesharing is invisible to firewalls. Application control means
                       all apps, all ports, all the time.
Browser-Based Filesharing
                   Use Cases Solidify…




Work vs. entertainment? Megaupload traffic went to Putlocker, Rapidshare,
            others. P2P crushes BBFS in total BW consumed.
Pinterest and Tumblr - New Ways to
               Express Yourself




Tumblr is the antithesis of Facebook; unfiltered, fully customizable.
   Pinterest is a new way to share your hobbies and interests.
Which Ports do Applications Really Use?




The common perception is that Port 80 (tcp/80) is where all the traffic and
all the problems are. Port 80 security is a requirement; but too much focus
                              is shortsighted.
Where’s My Bandwidth?




Interactively view where your bandwidth is going:
          www.paloaltonetworks.com/aur
Palo Alto Networks Application Usage
           and Risk Report

   www.paloaltonetworks.com/aur

More Related Content

More from Palo Alto Networks

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks
 
Application Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USApplication Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USPalo Alto Networks
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Palo Alto Networks
 

More from Palo Alto Networks (12)

Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for ItalyPalo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for KoreaPalo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...Palo Alto Networks Application Usage and Risk Report - Key Findings for  Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for NordicsPalo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for SpainPalo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for TaiwanPalo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for ThailandPalo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UKPalo Alto Networks Application Usage and Risk Report - Key Findings for UK
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
 
Application Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for USApplication Usage and Risk Report - Key Findings for US
Application Usage and Risk Report - Key Findings for US
 
Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.Application Usage on Enterprise Networks, December 2011.
Application Usage on Enterprise Networks, December 2011.
 
Aus cert event_2010
Aus cert event_2010Aus cert event_2010
Aus cert event_2010
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Application Usage and Risk report, June 2012, Global Findings

  • 1. Where’s My Bandwidth? Global Findings from the June 2012 Application Usage and Risk Report
  • 2. Where’s My Bandwidth? Key questions this report answers: • Which application categories consume the most bandwidth? • Exactly how much bandwidth does streaming video consume? • Which type of filesharing is most heavily used? • Is social networking truly a bandwidth hog?
  • 3. Top 5 Categories = 76% of the Bandwidth Peel away the corporate usage. Roughly a quarter of your bandwidth $$$ is video and filesharing…
  • 4. Users Like to Watch Video 13% of total bandwidth is video/photo traffic. 107 variants found; an average of 34 in 97% of the organizations. A fraction of it is corporate use.
  • 5. P2P Never Dies It continues to be used despite control efforts. 7 variants found in 78% of the organizations.
  • 6. The Filesharing Traffic Port-based Firewalls Miss Nearly 15% of filesharing is invisible to firewalls. Application control means all apps, all ports, all the time.
  • 7. Browser-Based Filesharing Use Cases Solidify… Work vs. entertainment? Megaupload traffic went to Putlocker, Rapidshare, others. P2P crushes BBFS in total BW consumed.
  • 8. Pinterest and Tumblr - New Ways to Express Yourself Tumblr is the antithesis of Facebook; unfiltered, fully customizable. Pinterest is a new way to share your hobbies and interests.
  • 9. Which Ports do Applications Really Use? The common perception is that Port 80 (tcp/80) is where all the traffic and all the problems are. Port 80 security is a requirement; but too much focus is shortsighted.
  • 10. Where’s My Bandwidth? Interactively view where your bandwidth is going: www.paloaltonetworks.com/aur
  • 11.
  • 12. Palo Alto Networks Application Usage and Risk Report www.paloaltonetworks.com/aur

Editor's Notes

  1. 107 video/photo apps, 140 filesharing apps, 30% of the bandwidth. How do the business apps survive?
  2. Globally, users watch a significant amount of video. Youtube and PP Stream, a p2p based streaming video application are leading consumers. In total, 107 application variants were found globally. On average, 34 in every networkViewed from a cost of BW perspective, $0.13 of the bandwidth $$$ is spent on video.
  3. P2P filesharing, specifically bittorrent is off the charts. Jumping 4x to 13.4% of total bandwidth – despite ongoing efforts to control it. Viewed from a cost of BW perspective, $0.13 of the bandwidth $$$ is spent on bittorrent and other P2P filesharing apps.
  4. All applications within the Palo Alto Networks database include underlying technology (browser-based, peer-to-peer, etc) as well as which ports the applications use. The 140 filesharing and file transfer applications were broken down into four port groupings defined as: Applications that use tcp/80 only. As expected, the bulk of these applications are browser-based. Putlocker, Depositfiles and Docstoc are three examples of the applications found in this group. Applications that use tcp/443 ortcp/443 & 80. Applications within this group use tcp/443or tcp/443,80. RapidShare, 4Shared and YouSendIt! are three of the browser-based filesharing application examples while Sugarsync and Microsoft LiveMesh represent two of the client-server based examples. Applications that do not use tcp/80 at all. All of these applications are either client-server (FTP, TFTP) or peer-to-peer. The peer-to-peer applications in this group are using a range of ports and include Ares, DirectConnect and Kazaa. Applications that are dynamic (hop ports), or use a range of high numbered ports. As expected, this group of applications is primarily peer-to-peer and includes BitTorrent, eMule and Xunlei. The browser-based examples within this group include Fileserve, Filesonic, and Mediafire. As a user accessibility and firewall evasion feature, port hopping (aka, dynamic) has historically been used in either client-server or peer-to-peer applications. The use of port hopping in browser-based applications indicates how significantly applications have evolved.
  5. Usage patterns indicate a clear delineation between work and entertainment . 71 variants in this group – only 1% of total BW consumed. Compared to P2P at 13.4%. Control efforts should be directed at both P2P and browser-based filesharing
  6. Social networking applications are used universally. New variants (Pinterest and Tumblr) jump –tumblr a new comer, is rapidly growing in popularity. Its growth may be due to the differences between it and facebook. Tumblr: freeform, unstructured, unfiltered, customizable. Facebook: structured, filtered, minimal customization.Pinterest – a new variant added in march 2012 - found in only 15% of the orgs yet consumed 1% of SN BW G+ = jumped in frequecny from 25% to 86% and a 10X increase in BW Shows that the social networking space continues to define itself.
  7. Applications that use tcp/80 only. As expected, the bulk of the applications in this group are browser-based. Applications that use tcp/443 and/or tcp/80. Applications within this group use both tcp/443 exclusively or tcp/443 and tcp/80. Applications that do not use tcp/80 at all. All of these applications are either client-server (FTP, TFTP) or peer-to-peer. Applications that are dynamic (hop ports), or use a range of high numbered ports. As expected, this group of applications is primarily peer-to-peer with some browser-based and client server examples as well. Bottom line: Application visibility and control needs to be on all ports, across all apps, all the time.