Archive for February, 2013

Palo Alto Networks Release New Application Usage and Threat Report

Friday, February 22nd, 2013

Palo Alto Networks today released its Application Usage and Threat Report. This 10th edition of the report is the first version to compile and correlate data on application usage and threat activity. Based on analysis of network traffic of more than 3,000 organizations between May and December 2012, the report is the network security industry’s most comprehensive examination of application usage and threats. The report’s findings include:

• Social, video, and filesharing are not the top threat sources. While 339 social networking, video, and filesharing applications represent 20 percent of network bandwidth use, they account for less than 1 percent of threat logs.

• Exploits continue to target enterprises’ most valued assets via commonly used business applications. Of the 1,395 applications studied, 9 business critical applications were responsible for 82 percent of all exploit logs.

• Malware hides inside custom applications. Custom or unknown applications are the leading type of traffic associated with malware communications, accounting for 55 percent of malware logs, yet they are consuming less than 2 percent of network bandwidth.

• SSL is used as both a security mechanism and a masking agent. 356 applications use SSL in some way. SSL by itself represented 5 percent of all bandwidth and the 6th highest volume of malware logs. HTTP proxy, used both as a security component and to evade controls, exhibited the 7th highest volume of malware logs.

“Correlating threats with specific applications allows security teams to directly see and control risks in their networks,” said René Bonvanie, chief marketing officer at Palo Alto Networks. “We are empowering our customers with the knowledge they need to implement comprehensive security policies and practices to better secure their networks with minimal impact on day-to-day operation.”

“The volume of exploits targeting business critical applications was stunning and serves as a data center security wake-up call,” said Matt Keil, senior research analyst at Palo Alto Networks and author of the report. “These threats will continue to afflict organizations until they isolate and protect their business applications by bringing threat prevention deeper into the network.”

The report categorizes applications into 3 categories: personal applications, business applications, and custom or unknown applications.

• Personal applications include social networking applications (Facebook, Pintrest, Tumblr, and Twitter), filesharing (BitTorrent, Box, Dropbox, Putlocker, Skydrive, and YouSendit), and video (YouTube, Netflix, and Hulu Networks).

• Business applications include Microsoft SQL Server, Microsoft Active Directory, SMB, Microsoft RPC, and other commonly used enterprise applications.

• Custom or unknown applications are defined as either TCP or UDP based applications that are custom (internal to the organization), unrecognized commercially available, or a threat.

Read the official press release by Palo Alto Networks, or download the full Application and Threat report, alternatively you can speak to a Net-Ctrl representative about your next generation firewall requirement by calling us on 01473 281 211, or emailing

Free to attend iPad in Education Event in London and Derby

Thursday, February 21st, 2013

Our partner Square group, a premium Apple reseller, is due to run two free to attend iPad in education events, one in London on the 28th February and the second in Derby on the 06th March.

The event is focusing on how the iPad can be used within education and assist in teaching and improving student engagement.

It will provide an insight into how the iPad can address a variety of learning styles and create highly interactive classrooms. Since students find the iPad intuitive, they can start using it straightaway. See the iPad in action in Square Groups education case study videos.

Square have ran a few of these events in the past which were really well received.

Register here.

What you will learn:
iPad in an hour
iPad in the classroom – hands on workshop
iPad 1:1 in action
Interactive classroom experience
Meet our partners

Thursday 28th February 2013
09:30 – 13:00
The Barbican
Silk Street
For directions please click here.

Wednesday 6th March 2013
09:30 – 16:00
The Roundhouse
Roundhouse Road
Pride Park
DE24 8JE
For directions please click here.

Click here to register.

Ruckus Wireless 7982 Access Point Beats the Competition in Independent Study

Wednesday, February 20th, 2013

Ruckus Wireless announced today its new ZoneFlex™ 7982 Smart Wi-Fi access point (AP) took top marks in a unique, non-vendor sponsored, enterprise Wi-Fi stress test study performed and published by Wireless LAN Professionals, Inc., (WLAN Pros) based in Orem, Utah.

Unlike many common industry Wi-Fi performance tests, WLAN Pros set out to determine how much traffic was needed to “break” access points from nine of the industry’s leading enterprise suppliers including: Aruba Networks, Aerohive, Cisco, HP, Juniper, Meraki, and Ruckus Wireless.

“With so many new Wi-Fi devices with which to contend, organizations are now demanding a well-performing wireless network and are, at times, confused and misled by vendor claims,” said Keith Parsons, a certified network engineer and managing director of Wireless LAN Professionals. “Our ultimate goal was to keep everything constant and the tests repeatable by only changing the access point. This way we could determine the edge at which these ‘best in class’ access points fall over.”

According to WLAN Pros, as each AP neared the maximum utilization of the RF spectrum, all of the tested APs failed. The differences between the APs were determined by how well they managed “air time.”


While winners and losers varied from test to test, the overall results of the WLAN Pros testing showed the Ruckus ZoneFlex 7982 outperforming all other devices under test in each ranked area.

The Ruckus ZoneFlex 7982 was the only access point able to support 25 concurrent unicast HD video streams to 25 individual iPads — delivering the highest overall aggregate throughput and lowest number of iPad video errors compared to all wireless access points tested.

“Because Wi-Fi is a shared medium, the key to good performance, as we found with our testing, was the ability for any access point to optimize the available spectrum in real time,” said Parsons.

Read the full press release from Ruckus Wireless, or speak to Net-Ctrl about your wireless requirements direct on 01473 281 211, or email

Palo Alto Networks Strengthens Gartner Magic Quadrant Position

Monday, February 11th, 2013

The latest issue (2013) of the Gartner Magic Quadrant for Enterprise Firewalls was released yesterday and shows Palo Alto Networks strengthening its position in the Leaders Quadrant with all other major vendors in the sector weakening.

“Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react.”

“Palo Alto Networks’ high-performance NGFW functionality continues to drive competitors to react in the firewall market. It is assessed as a Leader mostly because of its NGFW design, redirection of the market along the NGFW path, consistent displacement of Leaders and Challengers, and market disruption forcing Leaders to react.”

Gartner, February 2013

If you would like to find out more about the Palo Alto Networks solution range, and why they have managed to strengthen their position in the Gartner Magic Quadrant email or call us direct on 01473 281 211.