Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1988
business-systems
456
collaboration
362
general-internet
339
media
524
networking
1027
saas
1
analytics
173
artificial-intelligence
55
audio-streaming
25
auth-service
9
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
91
email
80
encrypted-tunnel
45
erp-crm
383
file-sharing
75
gaming
266
general-business
4
hr
1237
ics-protocols
116
infrastructure
167
instant-messaging
96
internet-conferencing
200
internet-utility
155
ip-protocol
5
it-infrastructure
3
it-management
303
management
11
marketing
105
medical
112
office-programs
227
photo-video
53
proxy
120
remote-access
24
routing
3
security
58
social-business
143
social-networking
25
software-development
36
software-update
82
storage-backup
1
supply-chain-logistics
100
voip-video
53
web-posting
1597
browser-based
2149
client-server
801
network-protocol
149
peer-to-peer
2357
1115
672
410
142
656
Evasive
677
Excessive Bandwidth
388
Prone to Misuse
1260
SaaS
1608
Transfers Files
386
Tunnels Other Apps
329
Used by Malware
2826
Vulnerabilities
1508
Widely Used
Name
Category
Subcategory
Risk
Technology