Skip navigation

Tools & Technology for:
15-1122.00 - Information Security Analysts   Save Table (XLS/CSV)

Tools | Technology

Tools

Desktop computers
Mainframe computers
Network analyzers
  • Local area network LAN analyzers
Notebook computers
Protocol analyzers

Technology

Access software
  • Access management software
  • IBM Tivoli Access Management TAM
Authentication server software
  • Akoura SmartToken
  • Diameter *
  • IBM Tivoli Identity Management TIM
  • Password management software
  • Remote authentication dial-in user service RADIUS software
Backup or archival software
  • Backup and archival software
  • System and data disaster recovery software
Configuration management software
  • Automated installation software
  • Patch and update management software
Desktop communications software
  • Secure shell SSH software
Development environment software
  • C
Electronic mail software
  • Email software
Enterprise application integration software
  • Extensible markup language XML
Filesystem software
  • Computer forensic software
Internet directory services software
  • Active directory software
  • Berkeley Internet Domain Name BIND software
  • Domain name system DNS software
  • Network directory services software
License management software
Network monitoring software
  • Automated audit trail analysis software
  • Automated media tracking software
  • Cisco Systems CiscoWorks
  • Hewlett-Packard HP OpenView software
  • Integrity verification software
  • Keystroke monitoring software
  • Network, hardware, and software auditing software
  • Quest BigBrother
  • Sun Microsystems NetManage
Network security and virtual private network VPN equipment software
  • Cryptographic key management software
  • Firewall software
Network security or virtual private network VPN management software
  • Intrusion detection system IDS software
  • Intrusion prevention system IPS software
  • Network and system vulnerability assessment software
  • Network security auditing software
  • Security incident management software
  • Snort intrusion detection technology
Object or component oriented development software
  • C++
  • Practical extraction and reporting language Perl
  • Python
Point of sale POS software
  • Smart card management software
Program testing software
  • Conformance and validation testing software
  • System testing software
Project management software
  • Microsoft Project
Spreadsheet software
  • Microsoft Excel
Transaction security and virus protection software
  • Anti-phishing software
  • Anti-spyware software
  • Anti-Trojan software
  • End-to-end encryption software
  • Honeypot
  • Link encryption software
  • McAfee VirusScan
  • Password cracker software
  • Penetration testing software
  • Ping Identity software
  • Program checksumming software
  • Root kit detection software
  • Safeguard Systems software
  • Secure internet filtering software
  • Security risk assessment software
  • Stack smashing protection SSP software
  • Symantec Norton Antivirus
  • Virus scanning software
Web platform development software
  • Hypertext markup language HTML
Word processing software
  • Microsoft Word

We welcome feedback on the Tools & Technology database. We encourage you to suggest tools and technologies where our coverage may not reflect the full range of an occupation's duties. All suggestions will be considered for a future update of the T2 database.

Provide T2 feedback

* Software developed by a government agency and/or distributed as freeware or shareware.