Study Looks At Move To Cloud-Based Applications, Facebook Usage At Work

In its latest edition of the Application Usage and Risk Report, Palo Alto Networks draws attention to several realities that typically fall outside of the approved enterprise communications mechanisms.  These applications can enhance business responsiveness and performance -- but, conversely-- introduce inbound risks such as malware and vulnerability exploits, and outbound risks such as data loss and inadvertent sharing of private or proprietary data. The report advocates for assigning an action to these saying, socializing and sharing applications, and fostering discussions and creating viable policies around acceptable use.

Now in its 6th edition, the Application Usage and Risk Report consists of real-world traffic from 723 organizations worldwide, and examines user and application trends in the enterprise. In its analysis, Palo Alto Networks identified several patterns related to users’ applications to collaborate with others. These applications were pervasive among these participating organizations, and can be summarized as “saying, sharing and socializing applications.” In fact, these applications present are in up to 96 percent of the participating organizations and consume nearly one-quarter of the overall bandwidth.

Saying applications, including webmail and instant messaging applications, are still being used in a largely unmonitored and uncontrolled manner, which introduces significant inbound and outbound risks. Palo Alto Networks found that all of these saying applications either hop ports or use fixed ports that are not TCP/80 or TCP/443, which means that these applications cannot be easily monitored to control the related business and security risks. Furthermore, 60 percent of the saying applications discovered are capable of transferring files, thus opening organizations up to data leakage and the delivery of malware via attachments.

Since 2008, browser-based file-sharing applications have steadily grown in popularity to the point where they are now used more frequently than P2P or FTP. Now seen in 96 percent of organizations, these applications simplify file sharing but can also be broadcast-oriented (similar to P2P) in their distribution model. Using RapidShare, MegaUpload, or MediaFire, users can now upload their content and allow it to be indexed by one of the many affiliated search engines.

Traffic patterns of Facebook may contradict certain assumptions about its use in the workplace. The bulk of the traffic (88 percent) is users watching Facebook pages.

The risks that voyeurism represent include a potential loss of productivity and the possibility of malware introduction by clicking on a link within someone’s “wall.” Comparatively speaking, usage of Facebook apps (including popular games such as FarmVille) only represents 5 percent of Facebook traffic. Facebook posting represents an even smaller 1.4 percent of the traffic, yet the small amount of use should not minimize the risks in terms of what users are saying about work-related subjects such as current projects, travel plans and company status.

“IT teams are looking for ways to retain control within their organization at a time when non-IT-supported projects are pervasive,” said René Bonvanie, vice president of worldwide marketing at Palo Alto Networks. “In fact, we’re starting to see more trending of IT teams themselves embracing more progressive enterprise applications, which is indicative of these disruptive forces at work.”

Results indicate that IT organizations may be moving beyond debating the pros and cons of enterprise-class, cloud-based applications to actual deployment. The traffic usage patterns for select Microsoft and Google applications indicate both top-down and bottom-up adoption, especially in the last months.

For example, enterprise versions of Google Docs and Gmail were found in 30 percent of the 723 participating organizations. In other words, the high use of “free” versions of the Google applications by the end-user may be forcing IT to consider these tools as licensed and fully supported alternatives -- or replacements -- for existing tools. As more tech-savvy users enter the workforce, their work patterns and requests for more application alternatives will likely accelerate the adoption of a wider range of enterprise-class applications.

 

Featured

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities