Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1467
business-systems
655
collaboration
524
general-internet
326
media
513
networking
54
audio-streaming
23
auth-service
40
database
88
email
69
encrypted-tunnel
45
erp-crm
351
file-sharing
70
gaming
227
general-business
591
ics-protocols
108
infrastructure
150
instant-messaging
82
internet-conferencing
173
internet-utility
154
ip-protocol
285
management
11
marketing
36
medical
85
office-programs
202
photo-video
50
proxy
108
remote-access
24
routing
51
social-business
135
social-networking
18
software-development
36
software-update
70
storage-backup
99
voip-video
50
web-posting
1253
browser-based
1528
client-server
556
network-protocol
148
peer-to-peer
1537
898
547
361
142
634
Evasive
659
Excessive Bandwidth
377
Prone to Misuse
862
SaaS
1371
Transfers Files
378
Tunnels Other Apps
322
Used by Malware
2182
Vulnerabilities
1393
Widely Used
Name
Category
Subcategory
Risk
Technology