Skip navigation

Tools & Technology Feedback Process

15-1122.00 — Information Security Analysts

The current Tools and Technology examples for this occupation are listed below. Please add your suggested examples to the appropriate category. When you are finished, click the Send Feedback button at the bottom of this page.


Desktop computers
Mainframe computers
Network analyzers
  • Local area network LAN analyzers
Notebook computers
Protocol analyzers


Access software
  • Access management software
  • Citrix software
  • IBM Tivoli Access Management TAM
Administration software
  • Cisco Systems CiscoWorks software
Analytical or scientific software
  • SAS software
Application server software
  • Oracle WebLogic Server
  • Red Hat WildFly
Authentication server software
  • Akoura SmartToken
  • Diameter
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
Backup or archival software
  • Backup and archival software
  • System and data disaster recovery software
  • Veritas NetBackup
Configuration management software
  • Automated installation software
  • Patch and update management software
  • Puppet
Data base management system software
  • Apache Cassandra
  • Apache Hadoop
  • MySQL software
  • Sybase software
Data base user interface and query software
  • Microsoft Access
  • Microsoft SQL Server software
  • Oracle software
  • Structured query language SQL
Desktop communications software
  • Secure shell SSH software
Development environment software
  • C
  • Common business oriented language COBOL
  • Microsoft .NET Framework
  • Microsoft Visual Basic Scripting Edition VBScript
Electronic mail software
  • IBM Notes
  • Microsoft Exchange Server
Enterprise application integration software
  • Extensible markup language XML
  • IBM WebSphere
Enterprise resource planning ERP software
  • SAP software
Enterprise system management software
  • ArcSight Enterprise Threat and Risk Management
  • IBM Power Systems software
  • Splunk Enterprise
Filesystem software
  • Computer forensic software
Graphics or photo imaging software
  • Microsoft Visio
Internet directory services software
  • Active directory software
  • Berkeley Internet Domain Name BIND software
  • Domain name system DNS software
  • Network directory services software
License management software
Network monitoring software
  • Automated audit trail analysis software
  • Automated media tracking software
  • Hewlett-Packard HP OpenView software
  • Integrity verification software
  • Keystroke monitoring software
  • Nagios
  • Network intrusion prevention systems NIPS software
  • Network, hardware, and software auditing software
  • Oracle Net Manager
  • Quest BigBrother
  • Snort
  • Wireshark
Network security and virtual private network VPN equipment software
  • Cryptographic key management software
  • Firewall software
  • Virtual private networking VPN software
Network security or virtual private network VPN management software
  • Intrusion detection system IDS software
  • Intrusion prevention system IPS software
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Security incident management software
Object or component oriented development software
  • C#
  • C++
  • Objective C
  • Oracle Java
  • Practical extraction and reporting language Perl
  • Python
Object oriented data base management software
  • PostgreSQL software
Office suite software
  • Microsoft Office software
Operating system software
  • Hewlett Packard HP-UX
  • Job control language JCL
  • KornShell
  • Linux
  • Microsoft Windows
  • Oracle Solaris
  • Red Hat Enterprise Linux
  • UNIX
Point of sale POS software
  • Smart card management software
Portal server software
  • Apache HTTP Server
Presentation software
  • Microsoft PowerPoint
Program testing software
  • Conformance and validation testing software
  • System testing software
Project management software
  • Microsoft Project
  • Microsoft SharePoint software
Requirements analysis and system architecture software
  • Unified modeling language UML
Spreadsheet software
  • Microsoft Excel
Transaction security and virus protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • End-to-end encryption software
  • Honeypot
  • Link encryption software
  • McAfee software
  • McAfee VirusScan
  • Password cracker software
  • Penetration testing software
  • Ping Identity software
  • Program checksumming software
  • Root kit detection software
  • Safeguard Systems software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • Symantec Norton Antivirus
  • Symantec security software
  • Virus scanning software
Transaction server software
  • Customer information control system CICS
Web platform development software
  • Apache Tomcat
  • Hypertext markup language HTML
  • JavaScript
  • PHP: Hypertext Preprocessor
Word processing software
  • Microsoft Word

Additional Examples

If you would like to suggest examples that do not fit into the categories above, please enter them below.

Background Information

If you would be willing for us to contact you for additional information on your responses, please provide your name and email address below: