{"id":1379,"date":"2010-11-08T11:18:32","date_gmt":"2010-11-08T19:18:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=1379"},"modified":"2010-11-14T09:35:00","modified_gmt":"2010-11-14T17:35:00","slug":"contrary-to-popular-opinion-webmail-is-not-dead","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2010\/11\/contrary-to-popular-opinion-webmail-is-not-dead\/","title":{"rendered":"Contrary to Popular Opinion, Webmail is Not Dead!"},"content":{"rendered":"<p>The rapid expansion of social networking, video chat and micro-blogging has led to some speculation that webmail is dead or dying. Like Mark Twain famously said, \u201cthe report of my death was an exaggeration,\u201d\u00a0 the same holds true for the claimed death of webmail.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/www.paloaltonetworks.com\/researchcenter\/wp-content\/uploads\/2010\/11\/death.jpg\"><div style=\"max-width:100%\" data-width=\"266\"><span class=\"ar-custom\" style=\"padding-bottom:128.95%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-1380 lozad\" title=\"death\"  data-src=\"http:\/\/www.paloaltonetworks.com\/researchcenter\/wp-content\/uploads\/2010\/11\/death.jpg\" alt=\"\" width=\"266\" height=\"343\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2010\/11\/death.jpg 266w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2010\/11\/death-232x300.jpg 232w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/span><\/div><\/a>Looking at traffic patterns on enterprise networks over the past 2 years, summarized in the <a href=\"http:\/\/www.paloaltonetworks.com\/researchcenter\/reports\/\">Application Usage and Risk Reports<\/a>, shows that the use of webmail applications remains very healthy and shows no signs of getting old, ill or dying. Several data points support this finding.<\/p>\n<ul>\n<li>Webmail traffic, as a percentage of overall traffic has increased over the four reporting periods.<\/li>\n<li>The frequency that webmail was found within the participating organizations hovered between 93% and 96%.<\/li>\n<li>The number of application variants found in use increased from 24 to 33, yet the same five applications remain the most commonly used.<\/li>\n<\/ul>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"40%\" valign=\"bottom\"><\/td>\n<td width=\"14%\" valign=\"bottom\">Spring 2009<\/td>\n<td width=\"14%\" valign=\"bottom\">Fall 2009<\/td>\n<td width=\"14%\" valign=\"bottom\">Spring 2010<\/td>\n<td width=\"14%\" valign=\"bottom\">Fall 2010<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Bandwidth as a % of Overall Traffic<\/td>\n<td width=\"14%\" valign=\"bottom\">0.04%<\/td>\n<td width=\"14%\" valign=\"bottom\">0.01%<\/td>\n<td width=\"14%\" valign=\"bottom\">0.21%<\/td>\n<td width=\"14%\" valign=\"bottom\">1%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Frequency Of Webmail Overall<\/td>\n<td width=\"14%\" valign=\"bottom\">96%<\/td>\n<td width=\"14%\" valign=\"bottom\">95%<\/td>\n<td width=\"14%\" valign=\"bottom\">93%<\/td>\n<td width=\"14%\" valign=\"bottom\">95%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Gmail Frequency<\/td>\n<td width=\"14%\" valign=\"bottom\">96%<\/td>\n<td width=\"14%\" valign=\"bottom\">95%<\/td>\n<td width=\"14%\" valign=\"bottom\">99%<\/td>\n<td width=\"14%\" valign=\"bottom\">94%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Hotmail Frequency<\/td>\n<td width=\"14%\" valign=\"bottom\">96%<\/td>\n<td width=\"14%\" valign=\"bottom\">94%<\/td>\n<td width=\"14%\" valign=\"bottom\">90%<\/td>\n<td width=\"14%\" valign=\"bottom\">91%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Yahoo Mail Frequency<\/td>\n<td width=\"14%\" valign=\"bottom\">96%<\/td>\n<td width=\"14%\" valign=\"bottom\">92%<\/td>\n<td width=\"14%\" valign=\"bottom\">88%<\/td>\n<td width=\"14%\" valign=\"bottom\">89%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">Facebook Mail Frequency<\/td>\n<td width=\"14%\" valign=\"bottom\">87%<\/td>\n<td width=\"14%\" valign=\"bottom\">78%<\/td>\n<td width=\"14%\" valign=\"bottom\">67%<\/td>\n<td width=\"14%\" valign=\"bottom\">79%<\/td>\n<\/tr>\n<tr>\n<td width=\"40%\" valign=\"bottom\">AOL Mail Frequency<\/td>\n<td width=\"14%\" valign=\"bottom\">91%<\/td>\n<td width=\"14%\" valign=\"bottom\">68%<\/td>\n<td width=\"14%\" valign=\"bottom\">55%<\/td>\n<td width=\"14%\" valign=\"bottom\">54%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*Chart updated 11\/14\/2010<\/p>\n<p>As the data shows, webmail use is strong and vibrant. The use of these applications however poses certain business and security risks. Regulatory compliance within specific industries such as financial services, data loss via file transfer features, malware propagation and vulnerability exploits are the key risks that organizations are exposed to when webmail is in use.<\/p>\n<p>Webmail applications enable more efficient communications so the benefits are very clear. The challenge for IT is to maintain network security while enabling a set of applications that most people would view as being used more for personal, not professional, purposes.<\/p>\n<p>The business benefits make the unreasonable \u201cblock all webmail\u201d an inappropriate response while the \u201chead in the sand, allow all\u201d approach is equally inappropriate due to the business and security risks. Organizations need to follow a systematic process to develop, enable and enforce policies that allow the use of webmail in a controlled yet secure manner.<\/p>\n<p>Matt<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rapid expansion of social networking, video chat and micro-blogging has led to some speculation that webmail is dead or dying. Like Mark Twain famously said, \u201cthe report of my death was &hellip;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[31,1814],"coauthors":[],"class_list":["post-1379","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-application-control","tag-application-usage-risk-report"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1379"}],"version-history":[{"count":9,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1379\/revisions"}],"predecessor-version":[{"id":1389,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1379\/revisions\/1389"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1379"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=1379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}