Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
466
business-systems
502
collaboration
340
general-internet
255
media
411
networking
46
audio-streaming
16
auth-service
27
database
71
email
52
encrypted-tunnel
30
erp-crm
239
file-sharing
61
gaming
100
general-business
67
infrastructure
127
instant-messaging
58
internet-conferencing
101
internet-utility
129
ip-protocol
182
management
36
office-programs
148
photo-video
48
proxy
91
remote-access
24
routing
16
social-business
101
social-networking
29
software-update
46
storage-backup
81
voip-video
48
web-posting
723
browser-based
897
client-server
228
network-protocol
126
peer-to-peer
572
484
454
326
138
610
Evasive
563
Excessive Bandwidth
350
Prone to Misuse
930
Transfers Files
348
Tunnels Other Apps
280
Used by Malware
1127
Vulnerabilities
1227
Widely Used
Name
Category
Subcategory
Risk
Technology