Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1920
business-systems
456
collaboration
360
general-internet
339
media
515
networking
1012
saas
1
analytics
128
artificial-intelligence
55
audio-streaming
25
auth-service
5
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
90
email
80
encrypted-tunnel
45
erp-crm
383
file-sharing
75
gaming
266
general-business
4
hr
1225
ics-protocols
115
infrastructure
167
instant-messaging
96
internet-conferencing
198
internet-utility
155
ip-protocol
1
it-infrastructure
2
it-management
302
management
11
marketing
105
medical
99
office-programs
227
photo-video
52
proxy
118
remote-access
24
routing
1
security
58
social-business
143
social-networking
21
software-development
36
software-update
82
storage-backup
100
voip-video
53
web-posting
1523
browser-based
2131
client-server
799
network-protocol
149
peer-to-peer
2331
1088
631
410
142
655
Evasive
677
Excessive Bandwidth
388
Prone to Misuse
1182
SaaS
1583
Transfers Files
386
Tunnels Other Apps
328
Used by Malware
2745
Vulnerabilities
1494
Widely Used
Name
Category
Subcategory
Risk
Technology