Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
1247
business-systems
447
collaboration
354
general-internet
323
media
495
networking
808
saas
54
audio-streaming
24
auth-service
5
content-management
41
database
2
design
89
email
72
encrypted-tunnel
45
erp-crm
364
file-sharing
73
gaming
248
general-business
4
hr
614
ics-protocols
112
infrastructure
152
instant-messaging
86
internet-conferencing
190
internet-utility
155
ip-protocol
1
it-infrastructure
1
it-management
293
management
11
marketing
65
medical
92
office-programs
214
photo-video
50
proxy
111
remote-access
24
routing
57
social-business
141
social-networking
18
software-development
36
software-update
77
storage-backup
100
voip-video
53
web-posting
1336
browser-based
1625
client-server
564
network-protocol
149
peer-to-peer
1621
978
568
365
142
640
Evasive
665
Excessive Bandwidth
379
Prone to Misuse
953
SaaS
1459
Transfers Files
381
Tunnels Other Apps
326
Used by Malware
2326
Vulnerabilities
1429
Widely Used
Name
Category
Subcategory
Risk
Technology