{"id":5927,"date":"2014-06-23T15:00:43","date_gmt":"2014-06-23T22:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5927"},"modified":"2014-06-23T11:26:22","modified_gmt":"2014-06-23T18:26:22","slug":"ssl-capable-applications-consistent-among-regions","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/06\/ssl-capable-applications-consistent-among-regions\/","title":{"rendered":"SSL-Capable Applications Consistent Among Regions"},"content":{"rendered":"<p>Last week we reviewed subtle differences in application usage among enterprises in different regions, based on the data in our 2014 Application Usage and Threat Report. A number of you have asked if we noticed any regional patterns pertaining to the applications appearing on networks that are capable of using SSL encryption.<\/p>\n<p>Here is the breakdown by region of what we found:<!--more--><\/p>\n<p>The 2014 AUTR summarizes network traffic assessments performed worldwide in more than 5,500 enterprise organizations in the span of a year. Regionally, there was little variance in the number of applications found on these networks that are capable of using SSL encryption:<\/p>\n<ul>\n<li>Globally, 34 percent of the thousands of applications observed are capable of using SSL<\/li>\n<li>In Asia Pacific about 32 percent of applications observed are capable of using SSL<\/li>\n<li>Japan had the highest percentage of SSL usage (36 percent of applications observed) based on applications found<\/li>\n<li>In Europe, about 30 percent of applications observed are capable of using SSL<\/li>\n<li>In the Americas and Canada, 32 percent of applications observed are capable of using SSL<\/li>\n<\/ul>\n<p>The big takeaway regarding SSL from the 2014 AUTR isn't these regional differences, it's that many administrators throughout the world still don't have a handle on which applications running on their networks are capable of using SSL. As we've seen with Heartbleed, that knowledge gap can be dangerous -- how many applications running on the network use unpatched versions of OpenSSL, for example?<\/p>\n<p><center><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:83.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5715 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg\" alt=\"AUTR_banner_300x250\" width=\"300\" height=\"250\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250.jpg 300w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-230x191.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/AUTR_banner_300x250-48x40.jpg 48w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/center><\/p>\n<h3>For more<\/h3>\n<ul>\n<li><a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">Download the 2014 Application Usage and Threat Report<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/app-usage-risk-report-visualization-2014\/\" target=\"_blank\">Interactively browse the data using our AUTR visualization tool<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/ToJ9rj\" rel=\"nofollow,noopener\"  target=\"_blank\">Watch a video discussing key findings from the AUTR<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/regional-differences-enterprise-application-usage-threats\/\" target=\"_blank\">Have a look at some of the subtle regional differences among application usage and threats in the enterprise<\/a><\/li>\n<li><a href=\"http:\/\/www.securityweek.com\/when-youre-talking-ssl-heartbleed-isnt-only-thing-worry-about\" rel=\"nofollow,noopener\"  target=\"_blank\">Read Scott Simkin's recent SecurityWeek column on why SSL decryption is so important to security administrators<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week we reviewed subtle differences in application usage among enterprises in different regions, based on the data in our 2014 Application Usage and Threat Report. A number of you have asked &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,5],"tags":[134,400,401,508],"coauthors":[],"class_list":["post-5927","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-firewall","tag-autr","tag-heartbleed","tag-openssl","tag-ssl"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5927"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5927\/revisions"}],"predecessor-version":[{"id":5930,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5927\/revisions\/5930"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5927"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}