Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2297
business-systems
474
collaboration
387
general-internet
343
media
553
networking
994
saas
1
analytics
353
artificial-intelligence
55
audio-streaming
25
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
95
email
83
encrypted-tunnel
45
erp-crm
397
file-sharing
75
gaming
273
general-business
4
hr
1294
ics-protocols
130
infrastructure
167
instant-messaging
100
internet-conferencing
207
internet-utility
2
iot-management
155
ip-protocol
5
it-infrastructure
3
it-management
309
management
11
marketing
111
medical
132
office-programs
231
photo-video
53
proxy
131
remote-access
25
routing
3
security
58
social-business
148
social-networking
24
software-development
36
software-update
82
storage-backup
2
supply-chain-logistics
100
voip-video
53
web-posting
1847
browser-based
2247
client-server
804
network-protocol
150
peer-to-peer
2462
1227
778
439
142
656
Evasive
684
Excessive Bandwidth
391
Prone to Misuse
1524
SaaS
1689
Transfers Files
391
Tunnels Other Apps
330
Used by Malware
3155
Vulnerabilities
1578
Widely Used
Name
Category
Subcategory
Risk
Technology