SOCIAL NETWORKING AND COLLABORATIVE APPLICATION USAGE EXPLODES IN BUSINESSES WORLDWIDE
Personal-to-Business “Crossover” is Accelerating, Says Latest Industry Report from Palo Alto Networks
SUNNYVALE, Calif., Nov. 9, 2009 – Palo Alto Networksâ„¢, the leader in next-generation firewalls, today announced results of an international study that reveal the use of social networking and collaborative applications for business purposes has skyrocketed in the last six month period. With increased adoption of Web-based applications comes new business and security risks that go far beyond potential productivity losses. Yet most companies have outdated IT infrastructure and usage policies that may fail to protect them from these growing risks.
These are just some of the results of the fourth Application Usage and Risk Report (Fall Edition 2009), a semi-annual analysis of application usage on enterprise networks. Unlike other industry reports that are based on behavioral surveys, the Application Usage and Risk Report looks at which applications are in use, identifies emerging trends, and discusses the associated business benefits and risks. Made available today, this edition of the report summarizes traffic assessments performed between March and September 2009 in more than 200 organizations worldwide that span markets including financial services, manufacturing, healthcare, government, retail, and education.
Despite many enterprises’ attempts to block these applications, the rate at which they are making the crossover from personal to business use is happening faster than previous crossovers, such as instant messaging (IM). The use of a social networking application can bring measurable business benefits, but not without introducing business and security risks. These Enterprise 2.0 applications can transfer files, propagate malware, and have known vulnerabilities that can be exploited. The Application Usage and Risk Report is available for download at http://www.paloaltonetworks.com/literature/AUR_report1109.html.
Some specific findings from the research include:
• Twitter session use grew more than 250 percent from the Spring 2009 edition of the Application Usage and Risk Report, published in April.
• Facebook use increased 192 percent while Facebook Chat (released in April 2008) was the fourth most commonly detected chat application, ahead of Yahoo! IM and AIM.
• SharePoint collaboration is ubiquitous – bandwidth consumed by SharePoint, specifically the documents component, increased 17-fold from the previous report in April.
• Blogging and wiki editing increased by a factor of 39, while total bandwidth consumed increased by a factor of 48.
Social networking and collaborative applications are increasingly considered to be Enterprise 2.0 applications, along with messaging of all types, conferencing, and VoIP. These business-enabling applications are not threats, yet they pose risks to enterprise networks. The analysis discovered 255 Enterprise 2.0 applications – of which 70 percent are capable of transferring files, 64 percent have known vulnerabilities, 28 percent are known to propagate malware, and 16 percent can tunnel other applications. Examples of new threats introduced to enterprise networks by applications such as Facebook include Koobface, Fbaction and Boface, which all target social networking applications to hijack accounts and personal data.
“We know that workers are using these applications to help them get their jobs done, with or without approval from their IT departments. And now we know this is happening much faster than anticipated. It’s naÃ¯ve to think that old-school security practices can handle this deluge,” said Rene Bonvanie, Palo Alto Networks vice president of worldwide marketing. “Organizations must realize that banning or allowing specific applications in a black-and-white fashion is bad for business. They need a new approach that allows for shades of gray by enforcing appropriate application usage policies tailored for their workforce. This is a radical and necessary shift for today’s IT security professionals.”
Additional information on the more than 900 applications that are identified by Palo Alto Networks can be found in Applipedia, part of the company’s Application and Threat Research Center. Visit the online resource to find the latest news, commentary, and discoveries on applications and threats at http://www.paloaltonetworks.com/researchcenter/.
About Palo Alto Networks
Palo Alto Networksâ„¢ is the leader in next-generation firewalls, enabling unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-IDâ„¢ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, please visit http://www.paloaltonetworks.com.
# # #
Palo Alto Networks, the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.