One frequently asked question regarding our annual Application Usage and Threat Report (AUTR) is whether the findings are different depending on region.
The short answer is that the regional traffic and threat patterns we examined mimic the overall global threat patterns described in the report – not a surprise, considering that our data set comes from enterprise networks all over the world, and those enterprises use similar applications from leading vendors worldwide, and those applications rely on network services that are commonly targeted by cyber criminals.
That said, the 2014 AUTR does highlight some subtle regional differences, including:
You can download the full 2014 AUTR here and also compare differences in the data by region, threat and other parameters using our visualization tool here.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.