Skip navigation

Tools & Technology Feedback Process

15-1122.00 — Information Security Analysts

The current Tools and Technology examples for this occupation are listed below. Please add your suggested examples to the appropriate category. When you are finished, click the Send Feedback button at the bottom of this page.


Desktop computers
Mainframe computers
Network analyzers
  • Local area network LAN analyzers
Notebook computers
Protocol analyzers


Access software
  • Access management software
  • Citrix software
  • IBM Tivoli Access Management TAM
Analytical or scientific software
  • SAS software
Application server software
  • Oracle WebLogic Server
Authentication server software
  • Akoura SmartToken
  • Diameter
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
Backup or archival software
  • Backup and archival software
  • System and data disaster recovery software
Configuration management software
  • Automated installation software
  • Patch and update management software
  • Puppet
Data base management system software
  • Apache Cassandra
  • Apache Hadoop
  • Oracle software
  • Sybase software
Data base user interface and query software
  • Microsoft Access
  • Microsoft SQL Server
  • MySQL software
  • Structured query language SQL
Desktop communications software
  • Secure shell SSH software
Development environment software
  • C
  • Microsoft .NET Framework
  • Microsoft Visual Basic Scripting Edition VBScript
Document management software
  • Microsoft Office SharePoint Server MOSS
Electronic mail software
  • IBM Notes
  • Microsoft Exchange Server
Enterprise application integration software
  • Extensible markup language XML
  • IBM WebSphere
Enterprise resource planning ERP software
  • SAP software
Enterprise system management software
  • ArcSight Enterprise Threat and Risk Management
  • IBM Power Systems software
  • Splunk
Filesystem software
  • Computer forensic software
Graphics or photo imaging software
  • Microsoft Visio
Internet directory services software
  • Active directory software
  • Berkeley Internet Domain Name BIND software
  • Domain name system DNS software
  • Network directory services software
License management software
Network monitoring software
  • Automated audit trail analysis software
  • Automated media tracking software
  • Cisco Systems CiscoWorks software
  • Hewlett-Packard HP OpenView software
  • Integrity verification software
  • Keystroke monitoring software
  • Nagios
  • Network, hardware, and software auditing software
  • Quest BigBrother
  • Sun Microsystems NetManage
  • Wireshark
Network security and virtual private network VPN equipment software
  • Cryptographic key management software
  • Firewall software
Network security or virtual private network VPN management software
  • Intrusion detection system IDS software
  • Intrusion prevention system IPS software
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Security incident management software
  • Snort intrusion detection technology
Object or component oriented development software
  • C#
  • C++
  • Objective C
  • Oracle Java
  • Practical extraction and reporting language Perl
  • Python
Object oriented data base management software
  • PostgreSQL software
Office suite software
  • Microsoft Office software
Operating system software
  • Hewlett Packard HP-UX
  • Job control language JCL
  • KornShell
  • Linux
  • Microsoft Windows
  • Oracle Solaris
  • Red Hat Enterprise Linux
  • UNIX
Point of sale POS software
  • Smart card management software
Portal server software
  • Apache HTTP Server
Presentation software
  • Microsoft PowerPoint
Program testing software
  • Conformance and validation testing software
  • System testing software
Project management software
  • Microsoft Project
  • Microsoft SharePoint software
Requirements analysis and system architecture software
  • Unified modeling language UML
Spreadsheet software
  • Microsoft Excel
Transaction security and virus protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • End-to-end encryption software
  • Honeypot
  • Link encryption software
  • McAfee VirusScan
  • Password cracker software
  • Penetration testing software
  • Ping Identity software
  • Program checksumming software
  • Root kit detection software
  • Safeguard Systems software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • Symantec Norton Antivirus
  • Virus scanning software
Transaction server software
  • Customer information control system CCIS
Web platform development software
  • Apache Tomcat
  • Hypertext markup language HTML
  • JavaScript
  • PHP: Hypertext Preprocessor
Word processing software
  • Microsoft Word

Additional Examples

If you would like to suggest examples that do not fit into the categories above, please enter them below.

Background Information

If you would be willing for us to contact you for additional information on your responses, please provide your name and email address below: