Skip navigation

Tools & Technology Feedback

15-1122.00 — Information Security Analysts

The current Tools and Technology examples for this occupation are listed below. Please add your suggested examples to the appropriate category. When you are finished, click the Send Feedback button at the bottom of this page.

Tools

Desktop computers
Mainframe computers
Network analyzers
  • Local area network LAN analyzers
Notebook computers
Protocol analyzers

Technology

Access software
  • Access management software
  • IBM Tivoli Access Management TAM
Authentication server software
  • Akoura SmartToken
  • Diameter
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
Backup or archival software
  • Backup and archival software
  • System and data disaster recovery software
Configuration management software
  • Automated installation software
  • Patch and update management software
Desktop communications software
  • Secure shell SSH software
Development environment software
Electronic mail software
  • Email software
Enterprise application integration software
  • Extensible markup language XML
Filesystem software
  • Computer forensic software
Internet directory services software
  • Active directory software
  • Berkeley Internet Domain Name BIND software
  • Domain name system DNS software
  • Network directory services software
License management software
Network monitoring software
  • Automated audit trail analysis software
  • Automated media tracking software
  • Cisco Systems CiscoWorks
  • Hewlett-Packard HP OpenView software
  • Integrity verification software
  • Keystroke monitoring software
  • Network, hardware, and software auditing software
  • Quest BigBrother
  • Sun Microsystems NetManage
Network security and virtual private network VPN equipment software
  • Cryptographic key management software
  • Firewall software
Network security or virtual private network VPN management software
  • Intrusion detection system IDS software
  • Intrusion prevention system IPS software
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Security incident management software
  • Snort intrusion detection technology
Object or component oriented development software
  • C++
  • Practical extraction and reporting language Perl
  • Python
Point of sale POS software
  • Smart card management software
Program testing software
  • Conformance and validation testing software
  • System testing software
Project management software
  • Microsoft Project
Spreadsheet software
  • Microsoft Excel
Transaction security and virus protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • End-to-end encryption software
  • Honeypot
  • Link encryption software
  • McAfee VirusScan
  • Password cracker software
  • Penetration testing software
  • Ping Identity software
  • Program checksumming software
  • Root kit detection software
  • Safeguard Systems software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • Symantec Norton Antivirus
  • Virus scanning software
Web platform development software
  • Hypertext markup language HTML
Word processing software
  • Microsoft Word

Additional Examples

If you would like to suggest examples that do not fit into the categories above, please enter them below.

Optional Information


If you would be willing for us to contact you for additional information on your responses, please provide your name and email address below: