Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2377
business-systems
503
collaboration
406
general-internet
349
media
560
networking
970
saas
1
analytics
378
artificial-intelligence
55
audio-streaming
29
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
95
email
84
encrypted-tunnel
48
erp-crm
413
file-sharing
76
gaming
283
general-business
4
hr
1298
ics-protocols
130
infrastructure
174
instant-messaging
101
internet-conferencing
208
internet-utility
2
iot-management
155
ip-protocol
10
it-infrastructure
3
it-management
310
management
11
marketing
111
medical
139
office-programs
236
photo-video
53
proxy
132
remote-access
25
routing
6
security
61
social-business
160
social-networking
24
software-development
36
software-update
87
storage-backup
2
supply-chain-logistics
2
vertical-industry
100
voip-video
53
web-posting
1933
browser-based
2276
client-server
806
network-protocol
150
peer-to-peer
2390
885
1326
393
171
657
Evasive
685
Excessive Bandwidth
395
Prone to Misuse
1907
SaaS
1709
Transfers Files
391
Tunnels Other Apps
335
Used by Malware
3265
Vulnerabilities
1630
Widely Used
Name
Category
Subcategory
Risk
Technology