Products
Solutions
Services
Partners
Customers
Company
Careers
Contact
Search:
Applications
(
Clear filters
)
Category
Subcategory
Technology
Risk
Characteristic
2474
business-systems
512
collaboration
409
general-internet
350
media
561
networking
960
saas
1
analytics
414
artificial-intelligence
55
audio-streaming
29
auth-service
16
content-management
3
customer-service
1
data-privacy
42
database
7
design
1
development
99
email
85
encrypted-tunnel
48
erp-crm
413
file-sharing
76
gaming
285
general-business
4
hr
1328
ics-protocols
130
infrastructure
174
instant-messaging
102
internet-conferencing
210
internet-utility
5
iot-management
155
ip-protocol
10
it-infrastructure
7
it-management
318
management
11
marketing
114
medical
141
office-programs
237
photo-video
53
proxy
128
remote-access
25
routing
7
security
59
social-business
160
social-networking
24
software-development
36
software-update
96
storage-backup
2
supply-chain-logistics
2
vertical-industry
100
voip-video
53
web-posting
1998
browser-based
2311
client-server
807
network-protocol
150
peer-to-peer
2442
891
1361
415
157
649
Evasive
688
Excessive Bandwidth
395
Prone to Misuse
2057
SaaS
1724
Transfers Files
391
Tunnels Other Apps
335
Used by Malware
3340
Vulnerabilities
1647
Widely Used
Name
Category
Subcategory
Risk
Technology