Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1745
business-systems
454
collaboration
358
general-internet
333
media
505
networking
830
saas
5
artificial-intelligence
54
audio-streaming
25
auth-service
5
content-management
3
customer-service
41
database
2
design
90
email
75
encrypted-tunnel
45
erp-crm
369
file-sharing
75
gaming
255
general-business
4
hr
1085
ics-protocols
113
infrastructure
159
instant-messaging
92
internet-conferencing
193
internet-utility
155
ip-protocol
1
it-infrastructure
1
it-management
299
management
11
marketing
79
medical
92
office-programs
222
photo-video
51
proxy
116
remote-access
24
routing
57
social-business
142
social-networking
19
software-development
36
software-update
77
storage-backup
100
voip-video
53
web-posting
1357
browser-based
2002
client-server
717
network-protocol
149
peer-to-peer
2134
1008
574
367
142
644
Evasive
667
Excessive Bandwidth
380
Prone to Misuse
986
SaaS
1489
Transfers Files
384
Tunnels Other Apps
328
Used by Malware
2491
Vulnerabilities
1444
Widely Used
Name
Category
Subcategory
Risk
Technology