{"id":5756,"date":"2014-06-04T06:00:25","date_gmt":"2014-06-04T13:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5756"},"modified":"2014-06-03T13:29:07","modified_gmt":"2014-06-03T20:29:07","slug":"interactively-browse-application-usage-and-threat-report-data","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/interactively-browse-application-usage-and-threat-report-data\/","title":{"rendered":"Interactively Browse Our Application Usage and Threat Report Data"},"content":{"rendered":"<p>The <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/application-usage-and-threat-report.html\" target=\"_blank\">Application Usage and Threat Report<\/a> provides an analysis of applications and their link to cyber threats within the enterprise. Our research is based on application traffic from more than 5,500 organizations, with 2,100 applications, 16,000 unique threats and billions of threat logs analyzed. It's clearer than ever that the relationship between cyberattacks and applications in use by businesses is inextricable.<\/p>\n<p>In addition to <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">downloading the 2014 Application Usage and Threat Report in full<\/a>, we invite you to interactively browse the data we gathered using our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/app-usage-risk-report-visualization-2014\/\" target=\"_blank\">AUTR visualization tool<\/a>. It's here where you can view what we've gathered by application, category and subcategory as well as sort it by technology and frequency, filter it by risk level, and filter it by region, including specific analyses for global usage, the Americas and Canada, the Asia Pacific region, Europe, and Japan.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/app-usage-risk-report-visualization-2014\/\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:71.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-5758 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-500x359.png\" alt=\"AUTR visualization tool\" width=\"500\" height=\"359\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-500x359.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-230x165.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-417x300.png 417w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1-55x40.png 55w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-visualization-tool1.png 692w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><br \/>\n<!--more--><\/p>\n<p>You'll also notice a comparison of the top 20 types of applications used by enterprises, including how much bandwidth they consume and what their risk level is.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/app-usage-risk-report-visualization-2014\/\"><div style=\"max-width:100%\" data-width=\"337\"><span class=\"ar-custom\" style=\"padding-bottom:135.31%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-5759 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-vis-2.png\" alt=\"AUTR vis 2\" width=\"337\" height=\"456\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-vis-2.png 337w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-vis-2-230x311.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-vis-2-221x300.png 221w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/AUTR-vis-2-29x40.png 29w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>What surprises you about this year's <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">Application Usage and Threat Report<\/a> data? Leave a comment and let us know what you think.<\/p>\n<p><center><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:83.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5715 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg\" alt=\"AUTR_banner_300x250\" width=\"300\" height=\"250\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-230x191.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-48x40.jpg 48w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Application Usage and Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. Our research is based on application traffic from more than 5,500 organizations, &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155],"tags":[485,134,492],"coauthors":[],"class_list":["post-5756","post","type-post","status-publish","format-standard","hentry","category-announcement","category-cybersecurity-2","tag-application-usage-and-threat-report","tag-autr","tag-visualization-tool"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5756"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5756\/revisions"}],"predecessor-version":[{"id":5764,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5756\/revisions\/5764"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5756"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}