Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2324
business-systems
474
collaboration
389
general-internet
345
media
554
networking
988
saas
1
analytics
358
artificial-intelligence
55
audio-streaming
25
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
95
email
83
encrypted-tunnel
47
erp-crm
398
file-sharing
76
gaming
274
general-business
4
hr
1297
ics-protocols
130
infrastructure
167
instant-messaging
100
internet-conferencing
208
internet-utility
2
iot-management
155
ip-protocol
5
it-infrastructure
3
it-management
309
management
11
marketing
111
medical
134
office-programs
232
photo-video
53
proxy
132
remote-access
25
routing
6
security
58
social-business
148
social-networking
24
software-development
36
software-update
87
storage-backup
2
supply-chain-logistics
100
voip-video
53
web-posting
1866
browser-based
2254
client-server
804
network-protocol
150
peer-to-peer
2478
1227
778
447
144
657
Evasive
684
Excessive Bandwidth
395
Prone to Misuse
1543
SaaS
1693
Transfers Files
391
Tunnels Other Apps
333
Used by Malware
3177
Vulnerabilities
1588
Widely Used
Name
Category
Subcategory
Risk
Technology