Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1647
business-systems
452
collaboration
355
general-internet
329
media
502
networking
819
saas
54
audio-streaming
25
auth-service
5
content-management
3
customer-service
41
database
2
design
90
email
74
encrypted-tunnel
45
erp-crm
366
file-sharing
74
gaming
252
general-business
4
hr
1003
ics-protocols
113
infrastructure
158
instant-messaging
87
internet-conferencing
193
internet-utility
155
ip-protocol
1
it-infrastructure
1
it-management
295
management
11
marketing
69
medical
92
office-programs
219
photo-video
51
proxy
114
remote-access
24
routing
57
social-business
141
social-networking
19
software-development
36
software-update
77
storage-backup
100
voip-video
53
web-posting
1351
browser-based
1887
client-server
717
network-protocol
149
peer-to-peer
2030
995
570
367
142
644
Evasive
667
Excessive Bandwidth
380
Prone to Misuse
969
SaaS
1475
Transfers Files
384
Tunnels Other Apps
328
Used by Malware
2452
Vulnerabilities
1435
Widely Used
Name
Category
Subcategory
Risk
Technology