Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2330
business-systems
490
collaboration
401
general-internet
345
media
559
networking
982
saas
1
analytics
359
artificial-intelligence
55
audio-streaming
25
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
95
email
83
encrypted-tunnel
47
erp-crm
408
file-sharing
76
gaming
274
general-business
4
hr
1297
ics-protocols
130
infrastructure
174
instant-messaging
101
internet-conferencing
209
internet-utility
2
iot-management
155
ip-protocol
10
it-infrastructure
3
it-management
309
management
11
marketing
111
medical
134
office-programs
232
photo-video
53
proxy
132
remote-access
25
routing
6
security
58
social-business
154
social-networking
24
software-development
36
software-update
87
storage-backup
2
supply-chain-logistics
2
vertical-industry
100
voip-video
53
web-posting
1889
browser-based
2264
client-server
804
network-protocol
150
peer-to-peer
2187
1306
1003
462
149
657
Evasive
685
Excessive Bandwidth
395
Prone to Misuse
1672
SaaS
1696
Transfers Files
391
Tunnels Other Apps
333
Used by Malware
3209
Vulnerabilities
1606
Widely Used
Name
Category
Subcategory
Risk
Technology