Skip navigation

Tools & Technology Feedback Process

15-1122.00 — Information Security Analysts

The current Tools and Technology examples for this occupation are listed below. Please add your suggested examples to the appropriate category. When you are finished, click the Send Feedback button at the bottom of this page.


Desktop computers
Mainframe computers
Network analyzers
  • Local area network LAN analyzers
Notebook computers
Protocol analyzers


Access software
  • Access management software
  • Citrix
  • IBM Tivoli Access Management TAM
Administration software
  • Cisco Systems CiscoWorks
Analytical or scientific software
  • SAS
Application server software
  • Oracle WebLogic Server
  • Red Hat WildFly
Authentication server software
  • Diameter
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
Backup or archival software
  • Backup and archival software
  • System and data disaster recovery software
  • Veritas NetBackup
Business intelligence and data analysis software
  • IBM Cognos Impromptu
  • MicroStrategy
  • Tableau
Communications server software
  • IBM Domino
Configuration management software
  • Automated installation software
  • Chef
  • Patch and update management software
  • Puppet
  • VMWare
Content workflow software
  • Atlassian JIRA
Customer relationship management CRM software
  • Salesforce
Data base management system software
  • Apache Cassandra
  • Apache Hadoop
  • Apache Pig
  • Apache Solr
  • MongoDB
  • MySQL
  • NoSQL
  • Relational database management software
Data base user interface and query software
  • Microsoft Access
  • Microsoft SQL Server
  • Structured query language SQL
Desktop communications software
  • Secure shell SSH software
Development environment software
  • Adobe Systems Adobe ActionScript
  • C
  • Common business oriented language COBOL
  • Microsoft .NET Framework
  • Microsoft PowerShell
  • Microsoft Visual Basic
  • Microsoft Visual Basic Scripting Edition VBScript
  • Ruby
Electronic mail software
  • IBM Notes
  • Microsoft Exchange Server
Enterprise application integration software
  • Extensible markup language XML
  • IBM WebSphere
Enterprise resource planning ERP software
  • Oracle Fusion Applications
  • Oracle PeopleSoft
  • Oracle PeopleSoft Financials
  • SAP
Enterprise system management software
  • ArcSight Enterprise Threat and Risk Management
  • IBM Power Systems software
  • Splunk Enterprise
File versioning software
  • Apache Subversion SVN
  • Git
  • WinMerge
Filesystem software
  • Computer forensic software
Financial analysis software
  • Delphi Technology
  • Oracle E-Business Suite Financials
Graphics or photo imaging software
  • Adobe Systems Adobe Flash
  • Microsoft Visio
Internet directory services software
  • Active directory software
  • Berkeley Internet Domain Name BIND
  • Domain name system DNS
  • Network directory services software
Internet protocol IP multimedia subsystem software
  • Voice over internet protocol VoiP system software
License management software
Medical software
  • Epic Systems
Network monitoring software
  • AccessData FTK
  • Automated audit trail analysis software
  • Automated media tracking software
  • Ethereal
  • Guidance Software EnCase Forensic
  • IBM QRadar SIEM
  • Integrity verification software
  • Keystroke monitoring software
  • Micro Focus OpenView
  • Nagios
  • Network intrusion prevention systems NIPS
  • Network, hardware, and software auditing software
  • Oracle Net Manager
  • Quest BigBrother
  • Sniffer Investigator
  • Snort
  • Symantec Blue Coat Data Loss Prevention
  • Tcpdump
  • Wireshark
Network security and virtual private network VPN equipment software
  • Cryptographic key management software
  • Firewall software
  • Imperva SecureSphere
  • IpFilter
  • IpTables
  • Juniper Networks NetScreen-Security Manager
  • Palo Alto Networks Next-Generation Security Platform
  • Trend Micro TippingPoint
  • Virtual private networking VPN software
Network security or virtual private network VPN management software
  • HP Fortify
  • Intrusion detection system IDS
  • Intrusion prevention system IPS
  • ISS RealSecure
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Qualys Cloud Platform
  • Security incident management software
  • Websense Data Loss Prevention
Object or component oriented development software
  • Advanced business application programming ABAP
  • C#
  • C++
  • Objective C
  • Oracle Java
  • Practical extraction and reporting language Perl
  • Python
  • Swift
Object oriented data base management software
  • PostgreSQL
Office suite software
  • Microsoft Office
Operating system software
  • Bash
  • Hewlett Packard HP-UX
  • Job control language JCL
  • KornShell
  • Linux
  • Microsoft Hyper-V Server
  • Microsoft Windows
  • Oracle Solaris
  • Red Hat Enterprise Linux
  • Ubuntu
  • UNIX
Point of sale POS software
  • Smart card management software
Portal server software
  • Apache HTTP Server
Presentation software
  • Microsoft PowerPoint
Program testing software
  • Conformance and validation testing software
  • Kali Linux
  • SeleniumHQ
  • System testing software
Project management software
  • Microsoft Project
  • Microsoft SharePoint
Requirements analysis and system architecture software
  • Unified modeling language UML
Spreadsheet software
  • Microsoft Excel
Transaction security and virus protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • Check Point Next Generation Secure Web Gateway
  • End-to-end encryption software
  • Honeypot
  • HP WebInspect
  • Link encryption software
  • McAfee
  • McAfee VirusScan
  • Metasploit
  • Password cracker software
  • Penetration testing software
  • Ping Identity
  • Portswigger BurP Suite
  • Program checksumming software
  • Rapid7 Nexpose
  • Root kit detection software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • Symantec
  • Symantec Endpoint Protection
  • Symantec Norton Antivirus
  • Tenable Nessus
  • Virus scanning software
Transaction server software
  • Customer information control system CICS
Web platform development software
  • AJAX
  • Apache Tomcat
  • Extensible HyperText Markup Language XHTML
  • Hypertext markup language HTML
  • JavaScript
  • Microsoft ASP.NET
  • Node.js
  • Oracle JavaServer Pages JSP
  • PHP: Hypertext Preprocessor
  • Ruby on Rails
Word processing software
  • Microsoft Word

Additional Examples

If you would like to suggest examples that do not fit into the categories above, please enter them below.

Background Information

If you would be willing for us to contact you for additional information on your responses, please provide your name and email address below: