Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Nearly 1 Million Users Confirm Web Is Becoming De Facto Business Desktop – And Largest Threat Vector

September 16, 2008

Palo Alto Networks in conjunction with ASIS announced the release of its second Application Usage and Risk Report, a semiannual analysis of application usage, trends, and risks within enterprises. This edition of the report tripled its sample base to more than 60 companies, representing more than 960,000 users.

The report remains unique in that it is not simply focused on malware/threat tracking or behavioral surveys. It provides a detailed analysis of Internet applications and threats based on real traffic, and the larger perspective of business risks or benefits associated with that behavior. As before, much of the behavior was virtually invisible to many IT departments prior to the study.

Key findings of the report include:

HTTP has become the universal application protocol

HTTP applications consume 64% of enterprise bandwidth

HTTP traffic comprises: Client-server applications - 54%; Web surfing - 23%; browser-based applications - 23%

Browser-based applications aren’t simple web browsing – Google Docs, Webex and others download fully-fledged clients on top of the browser

Streaming video is consuming significant enterprise bandwidth

Streaming media (video/audio) applications found in nearly 100% of the accounts are consuming 10% of aggregate enterprise bandwidth

Streaming media applications consumed 30x the bandwidth than P2P filesharing. P2P (e.g., BitTorrent, eMule) and browser-based (e.g., Megaupload) filesharing, notorious for consuming bandwidth, were also found in nearly 100% of the accounts, but consumed less than 1% of the aggregate bandwidth

P2P technology continues its inroads as a delivery mechanism for streaming video, appearing in 43% of the accounts, contributing to increased media application usage.

Applications are the major uncontrolled threat vector

While nearly all organizations studied had application-level threats present, 86% of organizations had one threat in particular – a hidden iframe exploit – which is the entry point for all sorts of other threats, spyware, botnets or other exploits.

Media threats are common (62%) – several threats focusing on Real, Flash and iTunes were found in the sample, corresponding to the extremely high media application usage

Due, in large part to the heavy penetration of iframe/drive-by download exploits, every organization in the sample had adware and spyware, with the sample containing nearly 200 different types of adware and spyware.

“All applications – business, entertainment and malicious – have settled on HTTP as a universal transport.” said Steve Mullaney, vice president of marketing for Palo Alto Networks. “As applications continue to get richer and more powerful, the legacy security infrastructure is completely ineffective. This is evidenced by the near-saturation of application-borne threats we found and the vast range of unsanctioned – and in many cases invisible – applications in heavy use across enterprises. This report is not only a reference guide on the latest application trends, but it also provides IT with the business justification to reassess and realign policies and controls.”

The Application Usage and Risk Report is available for download from Palo Alto Networks at (http://www.paloaltonetworks.com/literature/aur_registration.html). Additional information on more than 700 applications can be found in Palo Alto Networks’ Application Research Center (ARC), an online resource that contains up-to-date information on the rapidly evolving application landscape – including the latest news, alerts and analysis. Included in the ARC is the ability to search the Applipedia™ for important characteristics of each application that must be considered when developing policies to enable safe and productive application usage within the enterprise.

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing