The findings are based on analysis of traffic data collected from 5,500 network assessments and billions of threat logs over a 12-month span. The report provides the industry’s most detailed assessment of the relationship between advanced cyber threats and the applications running on enterprise networks worldwide.
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarises network traffic assessments performed worldwide in more than 5,500 organisations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Key takeaways:
“Our research shows an inextricable link between commonly-used enterprise applications and cyber threats. Most significant network breaches start with an application such as e-mail delivering an exploit. Then, once on the network, attackers use other applications or services to continue their malicious activity – in essence, hiding in plain sight. Knowing how cyber criminals exploit applications will help enterprises make more informed decisions when it comes to protecting their organisations from attacks.”
In addition to the findings, the report includes actionable intelligence that security teams can use to better protect their networks, such as: