Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1850
business-systems
456
collaboration
360
general-internet
339
media
511
networking
881
saas
34
artificial-intelligence
55
audio-streaming
25
auth-service
5
content-management
3
customer-service
1
data-privacy
42
database
6
design
90
email
76
encrypted-tunnel
45
erp-crm
373
file-sharing
75
gaming
261
general-business
4
hr
1160
ics-protocols
115
infrastructure
160
instant-messaging
93
internet-conferencing
196
internet-utility
155
ip-protocol
1
it-infrastructure
2
it-management
300
management
11
marketing
103
medical
93
office-programs
227
photo-video
52
proxy
118
remote-access
24
routing
1
security
57
social-business
143
social-networking
20
software-development
36
software-update
82
storage-backup
100
voip-video
53
web-posting
1401
browser-based
2083
client-server
764
network-protocol
149
peer-to-peer
2265
1038
581
371
142
646
Evasive
671
Excessive Bandwidth
385
Prone to Misuse
1043
SaaS
1526
Transfers Files
385
Tunnels Other Apps
328
Used by Malware
2599
Vulnerabilities
1456
Widely Used
Name
Category
Subcategory
Risk
Technology