研究

Filter Results By

Filter by Type

Filter by Topic

Filter by Industry

Viewing All Results

Most Viewed

The Application Usage and Threat Report is the first report of its kind to provide an analysis of enterprise application usage and the associated threat activity. The report summarizes network traffic assessments performed worldwide in more than 3,000 organizations where 1,395 applications, 12.6 petabytes of bandwidth, 5,307 unique threats and 264 million threat logs were observed.

Application Usage AND Threat Report Interactive Findings

25 视图
搜索报告
July 22, 2014, 05:15 AM

In the past three months Palo Alto Networks has identified a series of attacks emanating from Nigerian actors against our customers in Taiwan and South Korea. Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Read the report by Palo Alto Networks Unit 42.

搜索报告
July 22, 2014, 05:10 AM

Today’s cyber attackers utilize an increasingly sophisticated set of evasion tactics. Disjointed techniques and a fragmented security approach leave enterprises prone to risk. The volume of attacks is rising, applying strain on a limited population of security specialists. It is essential that defenders and security specialists understand the trends and distributions in the attack landscape. This paper takes a survey of the Palo Alto Networks Threat Data generated across the customer base.

搜索报告
Verizon | May 19, 2014, 10:53 AM

Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR). This year’s report features nine common incident patterns, bringing together insights from 50 global organizations, and more than 63,000 confirmed security incidents. Discover how attackers can affect your business, and learn the steps you need to take to counter threats and protect your reputation.

搜索报告
Palo Alto Networks | Santa Clara, CA | June 18, 2013, 10:48 AM

Palo Alto Networks analyzed 35 university networks around the world, detected 589 applications that span the social, entertainment and educational spectrum, and compiled a usage report based on this analysis. See the complete report.

搜索报告
May 19, 2013, 10:54 AM

Perhaps more so than any other year, the large scale and diverse nature of data breaches and other network attacks took center stage in 2012. But rather than a synchronized chorus making its debut on New Year's Eve, we witnessed separate, ongoing movements that seemed to come together in full crescendo throughout the year. And from pubs to public agencies, mom-and-pops to multi-nationals, nobody was immune. As a result—perhaps agitated by ancient Mayan doomsday predictions—a growing segment of the security community adopted an "assume you're breached" mentality. 

搜索报告
Palo Alto Networks | Santa Clara, CA | April 16, 2013, 10:50 AM

The Application Usage and Threat Report is the first report of its kind to provide an analysis of enterprise application usage and the associated threat activity. The report summarizes network traffic assessments performed worldwide in more than 3,000 organizations where 1,395 applications, 12.6 petabytes of bandwidth, 5,307 unique threats and 264 million threat logs were observed.

搜索报告
Palo Alto Networks | Santa Clara, CA | June 16, 2012, 11:48 AM

The Application Usage and Risk Report (9th Edition, June 2012) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in more than 2,000 organizations worldwide between November 2011 and May 2012. During the data collection period, a total of 1,290 applications were found across all participating organizations.  

搜索报告
Palo Alto Networks | June 16, 2012, 11:45 AM

The Application Usage and Risk Report (9th Edition, June 2012) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in more than 2,000 organizations worldwide between November 2011 and May 2012. During the data collection period, a total of 1,290 applications were found across all participating organizations.  

搜索报告
May 19, 2012, 10:55 AM

2011 will almost certainly go down as a year of civil and cultural uprising. Citizens revolted, challenged, and even overthrew their governments in a domino effect that has since been coined the “Arab Spring,” though it stretched beyond a single season. Those disgruntled by what they perceived as the wealth-mongering “1%” occupied Wall Street along with other cities and venues across the globe. There is no shortage of other examples.

搜索报告
Palo Alto Networks | Santa Clara, CA | December 19, 2011, 11:52 AM

The Application Usage and Risk Report (8th Edition, December 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide between April 2011 and November 2011. The key findings and observations both globally and by specific countries are outlined in this report.

搜索报告
Palo Alto Networks | April 4, 2011, 11:46 AM

The Application Usage and Risk Report (7th Edition, May 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing 1,253 application traffic assessments conducted between October 2010 and April 2011. The key findings and observations both globally and by specific countries are outlined in this report. 

搜索报告
May 19, 2010, 10:56 AM

In some ways, data breaches have a lot in common with fingerprints. Each is unique and we learn a great deal by analyzing the various patterns, lines, and contours that comprise each one. The main value of fingerprints, however, lies in their ability to identify a particular individual in particular circumstances. In this sense, studying them in bulk offers little additional benefit. On the other hand, the analysis of breaches in aggregate can be of great benefit; the more we study, the more prepared we are to stop them.

搜索报告
April 6, 2010, 11:08 AM

Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and methods, espionage usually follows in its wake, borrowing techniques and tradecraft. The Shadows in the Cloud report illustrates the increasingly dangerous ecosystem of crime and espionage and its embeddedness in the fabric of global cyberspace.

搜索报告
May 19, 2008, 11:44 AM

Data breaches. You’ve gleaned all you can from the headlines; now you have access to information directly from the investigator’s casebook. The 2008 Data Breach Investigations Report draws from over 500 forensic engagements handled by the Verizon Business Investigative Response team over a four-year period. Tens of thousands of data points weave together the stories and statistics from compromise victims around the world. What valuable insights can your organization learn from them? A sample of findings are discussed in the report.

搜索报告
Palo Alto Networks | April 16, 2008, 10:52 AM

The Application Usage and Risk Report from Palo Alto Networks summarizes application traffic assessments for 20 large organizations across financial services, manufacturing, healthcare, government, retail and education over the last 6 months, and represents the behavior of over 350,000 users. The report confirms that CIO/CSOs face an application landscape that has evolved in dramatic fashion. 

搜索报告

The Application Usage and Risk Report (Spring Edition, 2009), from Palo Alto Networks provides a view into enterprise application usage by summarizing application traffic assessments from more than 60 large organizations across financial services, manufacturing, healthcare, government, retail and education. The assessments were conducted between August 2008 and December 2008, representing the behavior of nearly 900,000 users. The report supports the position that application controls within enterprises are failing. Applications have standard features to evade controls automatically, employees use applications to evade control mechanisms purposefully, and most current control mechanisms are ill-equipped to regain visibility and control.  

搜索报告

The Application Usage and Risk Report (5th Edition, Spring 2010) from Palo Alto Networks provides a global view into enterprise application usage by summarizing application traffic assessments conducted between September 2009 and March of 2010. This edition of the report shows that application usage from both a geographic and a vertical industry perspective is remarkably consistent. Globally, the barriers to accessing an application are minimal, enabling rapid worldwide adoption, regardless of where the application was developed. Viewed within select vertical industries, the adoption rate remains consistent, yet the levels of business and security risks vary greatly, depending on the industry.

搜索报告

The Application Usage and Risk Report (7th Edition, May 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing 1,253 application traffic assessments conducted between October 2010 and April 2011.  

搜索报告

Defence Intelligence first observed Mariposa in May of 2009 as an emerging botnet. In the following months, Mariposa showed a significant increase in beaconing traffic to its command and control servers. This is indicative of an increasingly high number of compromised computers actively participating in the Mariposa botnet. 

搜索报告

The Application Usage and Risk Report (Fall Edition, 2009) from Palo Alto Networks provides a global view into enterprise application usage by summarizing application traffic assessments conducted between March and September of 2009. This version of the report focuses on a group of applications that are top of mind for executives and IT managers alike: Enterprise 2.0 applications. Messaging of all types, social networking, cloud-based productivity, collaboration, blogging and wikis, are just a few of the types of applications that fall within this definition and not coincidently showed significant increases in usage when compared to the Application Usage and Risk Report (Spring Edition, 2009).  

搜索报告

The Application Usage and Risk Report (8th Edition, December 2011) from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide between April 2011 and November 2011. This edition of the report will delve into some shifts in social networking traffic patterns that indicate more active participation than previously viewed. Then, a discussion of how browser-based filesharing applications have evolved into two different usage segments while continuing to grow in popularity. The growth in usage brings personal and professional benefits as well as increased business and security risks. The last section takes a contrarian view of the traffic by highlighting the fact that while tcp/80 is a commonly used port for many applications, the majority of the traffic is traversing ports other than tcp/80 exclusively. The risk of course is that security teams may focus too much effort on tcp/80 and miss significant risks elsewhere. 

搜索报告

The Application Usage and Risk Report (6th Edition, Oct.  2010) from Palo Alto Networks provides a global view into enterprise application usage by summarizing application traffic assessments conducted between March 2010 and September of 2010. This report highlights the rapid dissolution of the global barriers to application access, which in turn enables worldwide adoption of an application, regardless of where the application was developed. In addition to the usage consistency, the report looks at the risks that are introduced by the heavy use of applications that enable users to “say” what they want through personal webmail and instant messaging, “socialize” when they want through social networking, and “share” when they want via P2P or browser-based filesharing.  

资源

The Application Usage and Threat Report is the first report of its kind to provide an analysis of enterprise application usage and the associated threat activity. The report summarizes network traffic assessments performed worldwide in more than 3,000 organizations where 1,395 applications, 12.6 petabytes of bandwidth, 5,307 unique threats and 264 million threat logs were observed.

Application Usage AND Threat Report Interactive Findings

搜索报告

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry.  Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?

搜索报告

The Application Usage and Risk Report (Fall Edition, 2008) from Palo Alto Networks provides a view into enterprise application usage by summarizing application traffic assessments from 60 large organizations across financial services, manufacturing, healthcare, government, retail and education. The assessments were conducted between April 2008 and July 2008, representing the behavior of over 960,000 users consuming more than 63 terabytes of bandwidth. The report supports the notion that employee application usage within the enterprise is akin to the wild west where anything and everything is fair game.  

聊天
有问题吗?
与我们沟通寻求答案。
立即聊天