Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1836
business-systems
456
collaboration
358
general-internet
339
media
510
networking
868
saas
26
artificial-intelligence
55
audio-streaming
25
auth-service
1
collaboration-productivity
5
content-management
3
customer-service
1
data-privacy
42
database
2
design
90
email
75
encrypted-tunnel
45
erp-crm
372
file-sharing
75
gaming
259
general-business
4
hr
1150
ics-protocols
115
infrastructure
160
instant-messaging
93
internet-conferencing
194
internet-utility
155
ip-protocol
1
it-infrastructure
2
it-management
300
management
11
marketing
102
medical
92
office-programs
227
photo-video
52
proxy
118
remote-access
24
routing
1
security
57
social-business
142
social-networking
20
software-development
36
software-update
82
storage-backup
100
voip-video
53
web-posting
1391
browser-based
2065
client-server
762
network-protocol
149
peer-to-peer
2245
1031
580
369
142
645
Evasive
671
Excessive Bandwidth
384
Prone to Misuse
1027
SaaS
1516
Transfers Files
383
Tunnels Other Apps
327
Used by Malware
2581
Vulnerabilities
1455
Widely Used
Name
Category
Subcategory
Risk
Technology