Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2154
business-systems
459
collaboration
369
general-internet
339
media
529
networking
1014
saas
1
analytics
285
artificial-intelligence
55
audio-streaming
25
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
91
email
83
encrypted-tunnel
45
erp-crm
384
file-sharing
75
gaming
266
general-business
4
hr
1259
ics-protocols
118
infrastructure
167
instant-messaging
96
internet-conferencing
206
internet-utility
2
iot-management
155
ip-protocol
5
it-infrastructure
3
it-management
303
management
11
marketing
106
medical
122
office-programs
227
photo-video
53
proxy
120
remote-access
24
routing
3
security
58
social-business
146
social-networking
24
software-development
36
software-update
82
storage-backup
1
supply-chain-logistics
100
voip-video
53
web-posting
1731
browser-based
2182
client-server
802
network-protocol
149
peer-to-peer
2390
1182
732
418
142
656
Evasive
677
Excessive Bandwidth
391
Prone to Misuse
1397
SaaS
1659
Transfers Files
390
Tunnels Other Apps
330
Used by Malware
2983
Vulnerabilities
1533
Widely Used
Name
Category
Subcategory
Risk
Technology