The Latest Palo Alto Networks News
Product and Solution Information, Press Releases, Announcements
|Enterprises Are Blind to up to 36 percent of Their Network Traffic, According to Largest Global Study of its Kind|
|Posted: Wed May 11, 2011 12:52:34 PM|
SUNNYVALE, Calif., May. 11, 2011 – New research published by Palo Alto Networks™, the network security company, illuminates the fact that roughly 36% of enterprise network traffic is comprised of hundreds of applications that can evade the controls of conventional security solutions by either using SSL or port-hopping capabilities. Contrary to conventional wisdom, the majority of this traffic is not from browser-based applications using HTTP over SSL on port 443.
This represents a significant blind spot that most IT organizations have not yet adequately addressed, and one that is rarely discussed in the security industry.
Available today, Palo Alto Networks has released these and many other findings in the 7th edition of its Application Usage and Risk Report. The report provides a global view into application usage by assessing 28 exabytes of application traffic from 1,253 enterprises between October 2010 and April 2011. The report focuses on three primary findings:
Exposing the elephant in the room: more than 40% of the 1,042 applications that Palo Alto Networks identified on enterprise networks can now use SSL or hop ports to increase their availability within corporate networks. This segment of applications will continue to grow as more applications follow Twitter, Facebook, and Gmail, who all have enabled SSL either as a standard setting or as a user-selectable option in an effort to create the perception of improved security for its end-users.
"What we learned from analyzing this tremendous amount of enterprise application traffic, which is arguably the largest sample set ever published, is to never assume anything about end-user behavior," said Rene Bonvanie, vice-president of marketing at Palo Alto Networks. "This data should be a wake-up call for IT teams who assume encrypted traffic is mainly HTTPS or for those who still believe that social networking usage is not taking place on their corporate networks."