RSA Archer Suite is a risk management solution that provides solutions in sectors such as business resiliency, operational and enterprise risk management, audit management, public sector, security and IT risk management, third-party governance and regulatory compliance management.
A) RSA SecurID (“SecurID”) is a two-factor authentication technology that is used to protect network resources. The authentication is based on two factors — something you know (a password or PIN) and something you have (an authenticator).
RSA creates a wide range of industry-leading products that allow customers to take control of risk. Whether those risks stem from external cyber threats, identity and access management challenges, online fraud, compliance pressure or any number of other business and technology issues, RSA’s extensive portfolio of integrated, independently-top rated products better position public- and private-sector enterprises to drive growth and embrace change in today’s complex, volatile world.
They are:
Auditing, reporting, monitoring and assessment often require specialist governance, risk management and compliance (GRC) tools. They can be costly, take time to set up and usually necessitate training.
RSA Archer Data Governance helps in providing the framework for better Identity, Implementing, and Managing proper control around the data processing all the activities that involve identifiable information(PII).
We can retrieve old value by:
creating a simple text field.
creating an action which is triggered whenever all the related record field values can be changed.
Here an code used for retrieving old values:
FirstDate = "" or FirstDate = null then FirstDate = MyRelatedRecordField
RSA archer business resiliency, automate business continuity and disaster recovery planning and execution to protect your ongoing operations. Transform the efficiency of your continuity and recovery teams, address the most critical areas of the business quickly, and partner across the business to achieve your organization’s resiliency goals.
RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization's risk appetite.
RSA Security Analytics is an enterprise security information and event management (SIEM) product. The purpose of a SIEM is to harvest, analyze and report on security log data across an enterprise, including network-based security controls and host operating systems and applications.
The RSA algorithm is an asymmetric cryptography algorithm; this means that it uses a public key and a private key (i.e two different, mathematically linked keys). As their names suggest, a public key is shared publicly, while a private key is secret and must not be shared with anyone.
RSA is named for the MIT scientists (Rivest, Shamir, and Adleman) who first described it in 1977. It is an asymmetric algorithm that uses a publicly known key for encryption, but requires a different key, known only to the intended recipient, for decryption.
The European Union (EU) General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. The GDPR increases privacy rights for individuals and gives regulatory authorities greater powers to take action against businesses that breach the new law.
RSA Archer Privacy Program Management is built upon the capabilities provided by the RSA Archer Data Governance use case and is designed to help organizations identify and assess the privacy impacts and risks posed by data processing activities involving PII.
RSA archer incident management, centralize and streamline tracking, workflow and resolution of day-to-day incidents, whether they be security, physical or employee-related—before they become business disruptions.
It implement a coordinated approach to business continuity and IT disaster recovery planning, testing and execution.
RSA Archer Business Continuity Management (BCM) provides a centralized, consistent and automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in crisis situations to protect your ongoing operations.
Archer Risk Catalog allows you to record and track risks across your organization and establish accountability by named first and second line of defense managers. It provides a three-level rollup of risk, from a granular level through enterprise risk statements.
Archer Top-Down Risk Assessment enables practitioners to document risks and controls throughout the organization. Risks can be assessed on an inherent and residual basis, both qualitatively and across multiple risk categories using monetary values.
Archer Loss Event Management allows organizations to capture and inventory actual loss events and near misses, as well as relevant external industry-related loss events.
RSA Archer Key Indicator Management is an essential element of an effective Operational and Integrated Risk Management program to understand the organization's risk and performance profile and operation of the existing internal control framework.
RSA Archer Bottom-Up Risk Assessment allows you to engage your teams via targeted project risk assessments. Projects can include such things as new and changing business processes, fraud assessments, new products and services, and proposed mergers, acquisitions, and divestitures.
Operational risk management. Understand the business context of risk with an aggregated, enterprise-wide view of operational risks. Archer Operational Risk Management helps you engage business managers in using consistent methodologies to identify and manage the risks and controls under their purview.