cancel
Showing results for 
Search instead for 
Did you mean: 
Exchange Overviews
Review more than 300 offerings to augment your IRM program on the Archer Exchange

Articles

RiskLens Integration

RiskLens specializes in the quantification of cybersecurity risk. RiskLens’ cyber risk quantification software is purpose-built on FAIR (Fair Analysis of Information Risk), the international standard quantitative model for information security and op...

RiskLens Logo.jpg

Qualys Vulnerability Management Integration

Qualys is a pioneer and leading provider of cloud-based security and compliance solutions. Qualys Vulnerability Management is a cloud-based service that provides immediate, global visibility into where your IT systems might be vulnerable to the lates...

Qualys Logo.png

Qualys Asset Discovery Integration

Qualys is a cloud-based solution for IT, security, and compliance. The Qualys Cloud Platform provides complete, real-time inventory of IT assets, continuous assessment of security and compliance posture, vulnerability identification and compromised a...

Qualys+Logo.png

Tenable.sc Asset Discovery Integration

Tenable.sc provides your organization the ability to accurately identify, investigate, and prioritize vulnerabilities. With Tenable.sc you get a real-time, continuous assessment of your security posture by identifying weaknesses through scanning the ...

Tenable+Logo.png

Tenable.sc Vulnerability Management Integration

As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable.sc provides your organization the ability to accura...

Tenable Logo.png

CISA Cyber Essentials Authoritative Source Content

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to cyber and physical infrastructure. CISA connects stakeholders in industry and government to each other and to resources, a...

ThreatWatch Integration

ThreatWatch is a pro-active cyber security solution that uses an AI powered vulnerability curation and no scan approach for impact assessment of assets including source code, containers, cloud instances, and servers. The ThreatWatch integration takes...

ThreatWatch_Logo_300px.jpg

RiskRecon Own Enterprise Monitoring Integration

RiskRecon enables you to control third-party risk by providing vendor security assessments that are comprehensive, actionable and available on demand. We can evaluate the security program of any organization -- SaaS, outsourcer or an in-house provide...

RiskRecon Logo.jpg

U.S. State Privacy Laws Authoritative Source Content

This authoritative source comprises state privacy laws for the following U.S. States: California - California Consumer Privacy Act (CCPA) Colorado - Colorado Privacy Act Massachusetts - MA 4806 Maryland - MD 14-3504 Maine - ME 9301 New Jersey - NJ S5...

AWS Security Hub Integration

AWS Security Hub provides security alerts and compliance information related to Amazon Web Service accounts, services, and supported third-party partner products. It aggregates, organizes, and prioritizes security alerts, or findings, from multiple A...

AWS_logo_RGB.png
Top Contributors