New research published by Palo Alto Networks™, the network security company, indicates explosive growth in global social networking and browser-based file sharing on corporate networks, with a 300 percent increase in active social networking (e.g., posting, applications) compared with activity during the same period in the latter half of 2010. The Palo Alto Networks Application Usage and Risk Report provides a global view into application usage based on assessments of the raw application traffic from more than 1,600 enterprises between April 2011 and November 2011.

"Whether or not employees are using social networks or sharing files at work is no longer a question; this data clearly demonstrates that users are embracing and actively using such applications," said René Bonvanie, chief marketing officer at Palo Alto Networks. "Companies must determine how to safely enable these technologies on their networks so that users can maintain the levels of productivity that many of these applications can afford, while at the same time ensuring that their corporate networks and users are protected against all threats."

The report focuses on three primary findings:

  • Social media use is more active; Twitter has gained significant mainstream traction in the workplace: Since October 2010, social networking usage patterns have become more active with bandwidth consumption for Facebook Apps, Social Plugins, and posting increasing from 5 percent (October 2010) to 25 percent (December 2011) when measured as a percentage of total social networking bandwidth. Twitter browsing at work alone grew by more than 700 percent year-over-year.
  • Widespread file sharing use requires a balanced response: File sharing sites continue to be used on most networks, appearing on the networks of 92 percent of the participating organizations. In total, 65 different browser-based file-sharing variants were found with an average of 13 being used in each of the analyzed organizations. The report also explores a variety of risks associated with browser-based file-sharing applications, which varies by application and use case. However, the use of evasive techniques by these applications implies that they are often operating unchecked on corporate networks.
  • The types of traffic on enterprise networks is changing: Web applications that use TCP port 80, the standard port associated with HTTP web browsing traffic, actually represent a minority of the traffic on enterprise networks for the first time ever. The 297 applications that use only TCP port 80 and no other port by default represent a mere 25 percent of the applications and 32 percent of the bandwidth observed, meaning that a standard web browsing-focused security model actually protects a minority of an organization's traffic.

"This is the largest sample size of actual application traffic from enterprises worldwide that we have analyzed since we began this area of research in Spring 2008," said Matt Keil, senior research analyst at Palo Alto Networks. "The most surprising finding from this data is the one that is most counter-intuitive: non-web-based traffic and application use is much more significant than most people think.

Application and Threat Information

Information on the more than 1,400 applications that are identified by Palo Alto Networks can be found in Applipedia, part of the company's Application and Threat Research Center. Visit the online resource to find the latest news, commentary, and discoveries on applications and threats at http://researchcenter.paloaltonetworks.com

To download the Application Usage and Risk Report (Fall 2011), please visit: http://www.paloaltonetworks.com/aur

About Palo Alto Networks

Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks has enabled enterprises to extend this same network security to remote users with the release of GlobalProtect™ and to combat targeted malware with its WildFire™ service. For more information, visit www.paloaltonetworks.com.

Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo, App-ID, GlobalProtect, and WildFire are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.