Access Data FTK
Access Data FTK (Forensic Toolkit) is a digital forensics software used for analyzing and extracting data from various sources, such as computers, mobile devices, and network storage. It helps investigators collect and preserve evidence for legal and investigative purposes.
ACF2
ACF2 (Access Control Facility) is an access control and security management system for IBM mainframe computers. It helps protect mainframe resources and data from unauthorized access.
Active Directory Local Administrator Password Solution (AD LAPS)
Password manager
Adobe Acrobat DC
Adobe Acrobat Document Cloud tool to create, convert, edit and
sign PDFs.
Adobe Analytics
Enables web, marketing, predictive analysis and reporting of data.
Adobe Campaign
Set of solutions to personalize and deliver campaigns.
Adobe Creative Suite
Predecessor of Adobe Creative Cloud with less features and a
different license model.
Adobe Experience Manager
Content management solution.
Adobe Forms
Online form generator by Adobe.
Adobe Sign
E-signature service.
Angular
TypeScript-based, free and open-source single-page web application framework.
Anomali
Anomali is a threat intelligence platform that helps organizations identify, analyze, and respond to security threats. It collects and analyzes threat data from various sources to provide actionable intelligence and automate threat response.
Aruba Airwave
A network operations system to manage wired and wireless infrastructure from Aruba.
ASP .NET Identity
Identity framework to handle authentication and authorization. Single Sign-On.
ASPRunner
Creates a set of ASP pages to access and modify databases, or any other ODBC datasource.
Atlassian
Helps teams to collaborate and share knowledge efficiently.
AWS
Amazon Web Services
Axe
Accessibility tool.
Azure
Microsoft`s flexible cloud platform that includes legacy support and provisioning.
Azure Active Directory
A built-in solution for managing identities in Azure.
Azure Virtual Desktop
Azure Virtual Desktop is a cloud-based virtual desktop infrastructure (VDI) service that allows users to access virtualized desktops and applications from any device. It provides secure and scalable desktop virtualization solutions.
B2C
Identity management service.
Bitlocker
BitLocker is a full disk encryption feature in Windows that helps protect data on Windows devices. It encrypts the entire hard drive to prevent unauthorized access in case of theft or loss.
BitSight
BitSight is a cybersecurity ratings platform that assesses and monitors the security performance of organizations and their third-party vendors. It provides insights and ratings based on factors such as security practices, vulnerabilities, and data breaches.
BlazeMeter
Open source, automated enterprise testing platform.
BridgeMaster
C#
Object-oriented programming language.
Canva
Graphic design platform used to create visual content
CastleBranch
CastleBranch is a background screening and compliance management platform used primarily in the healthcare and education sectors to manage employee and student screening processes.
Celonis
Celonis Process Intelligence allows you to analyze, improve, and monitor your processes.
Checkmarx
Software security solution for modern enterprise software development.
Cloud Composer
A Google environment for managing data. Manages data ingestion,
data transformation, data analysis and utilization, job scheduling,
tasks, etc.
Cloud Data Fusion
Cloud Functions
Google Cloud Service: Open source functions as a service.
CMDB
Configuration management database.
Cohesity
Cohesity DataProtect is a software-defined solution for protecting data sources.
Commvault
Data center backup and recovery solution for physical, virtual and cloud environments, and for different operating systems.
CrowdStrike
CrowdStrike is a cloud-native endpoint protection platform that uses artificial intelligence and behavioral analytics to detect and respond to advanced cyber threats. It provides real-time visibility and threat intelligence to protect endpoints from attacks.
Crystal Reports
Business intelligence application used to create custom reports from a variety of data sources.
Customer Information Control System (CICS)
Application servers for transaction processing for z/OS IBM
mainframe systems.
Data Domain
A backup solution used and replaced the SAN.
Data Fusion
Data integration service.
Data Quality Tool
Data validity configuration tool for the data pipeline.
DataStudio (IBM)
IBM Tool for database development and administration of IBM DB2
for Linux, Unix and Microsoft Windows environments.
DB2 (IBM)
Data management products developed by IBM including the DB2
relational database.
DBF Viewer
Utility to view legacy DBFs.
Delinea
Privileged access management platform.
Delinea PAM
Delinea PAM (Privileged Access Management) is a comprehensive solution that helps organizations secure and manage privileged accounts and access rights. It provides capabilities for privileged account discovery, credential management, and session monitoring.
DevOps
Used to help plan, work and build applications. Code Management and Deployment.
DMBOK2
Data Management Body of Knowledge.
Dragon Naturally Speaking
Accessibility tool used to covert speech to text.
Dynatrace
Tool for application and infrastructure performance monitoring
Enterprise Data Governance Tool
A tool that aids the process of creating and maintaining a
structured set of policies, procedures and protocols that control
how data is stored, managed and used.
ESRI ArcGIS
ArcGIS is GIS mapping and analysis solution.
Fiddler
Traffic inspector that inspects HTTP/HTTPS traffic to and from browsers and desktop apps.
FileZilla Pro
Software for FTP/SFTP/FTPS.
Foglight
Database monitoring tool.
GitHub
Development platform for code repository, code sharing and workflows.
Internet search engine
Google BigQuery
Serverless, multicloud data warehouse.
Google Cloud CLI
Command line interface to create and manage Google cloud
resources.
Google Cloud Platform (GCP)
Cloud data platform.
Google Colaboratory
Hosted Jupyter Notebook service.
Google Data Studio
Online tool for converting data into customizable informative
reports and dashboards.
GovDelivery
Web based Email Subscription Management System - Communications tool used for content delivery via email.
Host-Integration Server (HIS)
Gateway application providing connectivity between Microsoft Windows networks and IBM mainframe and IBM i systems.
IBM Spectrum Protect
Data Protection Solution - Enterprise-scale data protection for physical file servers, virtual environments and a wide range of applications.
IdentoGO iTouch
Center that provides fingerprinting services
IMS
Mainframe database system.
Infoblox DNS
A hierarchical and decentralized naming system for computers, services, or other resources connected to the internet or a private network.
InRule
Business rules engine.
Intrusion Prevention
Network security and threat prevention system.
Intune
Microsoft cloud-based management tool for mobile devices.
IP Address Management (IPAM)
Methodology implemented in computer software for planning and managing the assignment and use of IP addresses and closely related resources of a computer network.
JAVA
Object-oriented programming language.
JAWS
A computer screen reader program for Microsoft Windows that allows blind and visually impaired users to read the screen.
Jmeter
Testing tool for software for analyzing performance and measures from Apache.
Juniper Mist Portal
End-to-end network observability.
Juniper Space
Network management solution.
Juniper Wired Assurance
A solution for proactive remediation of network operations.
Juvare
Leading provider of emergency preparedness and response software.
Katalon
Automation testing software tool.
Kerberos
Kerberos is a network authentication protocol used to verify the identity of users and provide secure communication over a network. It is commonly used in Windows and Unix environments.
KnowBe4
KnowBe4 is a security awareness training and simulated phishing platform. It helps organizations educate their employees about cybersecurity threats, vulnerabilities, and best practices through interactive training modules and simulated phishing attacks.
LAMP Stack
A set of tools for web application development (Linux, Apache, MySQL, PHP/Perl/Python)
Looker
Google Data Analytics and Reporting.
Magento
An open-source eCommerce platform.
MAMPP
Microsoft Access
Manages data. It combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools.
Microsoft SQL 2019
Microsoft SQL database version 2019.
Microsoft SQL Management Studio
A software application used for configuring, managing and administering all components within Microsoft SQL Server.
Microsoft SQL Suite
Suite of database software to manage/administer Microsoft SQL
database.
Microsoft Visual Studio
Application development platform.
Microsoft Visual Studio Code
Source-code editor made by Microsoft for Windows, Linux and macOS.
Mimecast
Cloud cybersecurity services for email, data and web.
MobaXterm
MoveIt
Managed file transfer software produced by Ipswitch, Inc.
MuleSoft
An integration platform for applications and data.
MYSQL Workbench
A MySQL database management tool.
Narrator
Web accessibility software.
Nerdio
Azure deployment and management service.
Notepad++
Free source code editor.
NVDA
Screen reader for Microsoft Windows.
O365 Data Loss Prevention
To help protect this sensitive data, and to reduce the risk from oversharing, they need a way to help prevent their users from inappropriately sharing sensitive data with people who shouldn`t have it. This practice is called data loss prevention (DLP).
In Microsoft Purview, you implement data loss prevention by defining and applying DLP policies. With a DLP policy, you can identify, monitor, and automatically protect sensitive items across:
Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive accounts
Office applications such as Word, Excel, and PowerPoint
Windows 10, Windows 11, and macOS (three latest released versions) endpoints
non-Microsoft cloud apps
on-premises file shares and on-premises SharePoint
Fabric and Power BI
DLP detects sensitive items by using deep content analysis, not by just a simple text scan. Content is analyzed:
For primary data matches to keywords
By the evaluation of regular expressions
By internal function validation
By secondary data matches that are in proximity to the primary data match
DLP also uses machine learning algorithms and other methods to detect content that matches your DLP policies
OAuth2
Open Authentication 2.0. A Protocol that allows a user to grant a third-party website or application access to the user`s protected resources.
OCI
Oracle Cloud Infrastructure
OEM
OEM Tools
OnBase
A single enterprise information platform designed to manage your content, processes and cases.
OneTrust
OneTrust is a comprehensive privacy management platform that helps organizations comply with data protection and privacy regulations. It provides tools for data inventory and mapping, consent management, privacy impact assessments, and more.
OPENID Connect2
A simple identity layer on top of the OAuth 2.0 protocol.
Oracle 19C
A multi-model database that provides full support for relational
data and non-relational data.
Paint.net
Digital photo editing software.
Palo Alto Firewall
Palo Alto Firewall is a network security appliance that provides advanced firewall protection, intrusion prevention, and threat intelligence. It helps organizations secure their network infrastructure and prevent unauthorized access.
Pega
Java-based business process management tool.
Peoplesoft
Oracle application system.
PeopleSoft Financials Platform
Suite of Peoplesoft modules to keep track of financials.
PeopleSoft Inventory
A flexible, comprehensive inventory management system.
PHP
A general-purpose scripting language geared toward web development.
PHP Runner
A low-code/no-code solution to access and edit databases.
Platform Microsoft Endpoint Manager Patch
PC/patch management platform.
PostgreSQL
A free and open-source relational database management system
emphasizing extensibility and SQL compliance.
Postman
Collaboration platform for application programming interface (API) development.
Power Automate
Power Query
Query tool.
Power Shell
O/S command line utility.
PowerBI
A Microsoft business analytics service. Provides dashboard and visualization capabilities for reporting.
PowerFlex
Dell storage solution.
PuTTY
A free and open-source terminal emulator, serial console and network file transfer application.
Python
An interpreted high-level, general-purpose programming language.
Qualtrics
An online survey tool.
R Studio
An integrated development environment for R, a programming
language for statistical computing and graphics.
Updated:
These are now included in the basic package-
To load data:
googleCloudStorageR (r-project.org)
bigQueryR (r-project.org)
CRAN - Package DBI (r-project.org)
CRAN - Package odbc (r-project.org)
CRAN - Package xlsx (r-project.org)
CRAN - Package foreign (r-project.org)
CRAN - Package haven (r-project.org)
CRAN - Package data.table (r-project.org)
To manipulate, model, and visualize data:
CRAN - Package tidyverse (r-project.org)
CRAN - Package ggvis (r-project.org)
CRAN - Package tidymodels (r-project.org)
CRAN - Package car (r-project.org)
CRAN - Package mgcv (r-project.org)
CRAN - Package mgcViz (r-project.org)
CRAN - Package lme4 (r-project.org)
CRAN - Package nlme (r-project.org)
CRAN - Package randomForest (r-project.org)
CRAN - Package randomForestExplainer (r-project.org)
CRAN - Package multcomp (r-project.org)
CRAN - Package vcd (r-project.org)
CRAN - Package glmnet (r-project.org)
CRAN - Package survival (r-project.org)
CRAN - Package caret (r-project.org)
CRAN - Package caretEnsemble (r-project.org)
For reporting data:
CRAN - Package shiny (r-project.org)
CRAN - Package rmarkdown (r-project.org)
CRAN - Package xtable (r-project.org)
For spatial data:
CRAN - Package sp (r-project.org)
CRAN - Package maps (r-project.org)
CRAN - Package ggmap (r-project.org)
For time series and financial data:
CRAN - Package zoo (r-project.org)
CRAN - Package xts (r-project.org)
RACF
RACF (Resource Access Control Facility) is an access control system for IBM mainframe computers. It provides security and authorization services to protect resources and data within mainframe environments.
Redhat
Linux open-source product.
Relativity iCONECT via Managed Service Provider
Salesforce
Customer relationship management (CRM) software.
SAML 2
A version of the SAML standard for exchanging authentication and authorization identities between security domains.
SauceLabs
Cloud-based platform for automated continuous testing of web and mobile apps.
Selenium
Automated testing platform across different browsers.
SendGrid
A cloud-based SMTP provider.
ServiceNow
Platform as a service providing technical management support such as IT service management, IT operations management and IT business management. Used to define, manage, automate and structure services and production instances.
ServiceNow Asset Management
Manage all your hardware, software, and cloud IT assets from a single platform. Automate every stage of the IT asset lifecycle at scale while controlling costs and minimizing licensing and leasing risks.
ServiceNow SPM
ServiceNow Strategic Portfolio Management
ShareGate Apricot
Platform for automated teams governance.
SharePoint
Platform for content management and repository.
SIEM Plateform Splunk ES
SiteImprove
Web accessibility software product.
Slack
A messaging application that can be used across multiple devices and platforms.
SOL
Platform for automated testing.
Sprout
Social media management platform used for social media analysis and tracking.
Sprout Social, Inc. is a social media management tool that helps brands communicate with customers across social channels, collaborate across teams, and measure the effectiveness of their efforts.
Sprout`s platform integrates with Twitter, Facebook, LinkedIn, Instagram, Google+, Zendesk, UserVoice, Feedly, and Google Analytics. Bambu by Sprout Social, launched in August 2015, is an employee advocacy platform that allows organizations to curate content for employees to read and share on social media.[1]
SSO Azure AD
Suse
Linux open-source product.
Tenable
Tenable is a cybersecurity company that provides vulnerability management and threat detection solutions. Its products help organizations identify and remediate vulnerabilities, and detect and respond to security threats.
The DASH
Custom application that sits on top of the State Data Platform and
serves as the central point for getting information from the
platform.
Time Clocks - TimeClock Plus
Time reporting tool.
Toad
A Quest data management tool for the DBAs, architects and developers.
UiPath
A robotic process automation tool that enables users to automate various aspects of business processes.
V3locity (Velocity)
Employee benefits management system.
Veracode
Platform to manage security risk across the entire application portfolio.
VerifyOK
Software to verify identity online.
Visio
Visio is a diagramming and vector graphics application and is part of the Microsoft Office family
VMware
Enterprise virtual machine software.
VMware SRM
VMware Site Recovery Manager (SRM) provides policy-based management, minimizes downtime in case of disasters via automated orchestration, and enables nondisruptive testing of your disaster recovery plans.
VMware vCenter
Enterprise virtual machine management system on-premises.
Voiceover
Web accessibility software.
Webex
Solution for video conferencing, online meetings, screen share, webinars and collaboration
WebFOCUS
Enterprise reporting system.
Workday
Strategic workforce planning software for human capital
management (HCM).
XAMPP
Provides web, database and FTP server packages, fast and completely portable, for Windows.
Zscaler
Cloud security software and system for virtual private network and access.