cancel
Showing results for 
Search instead for 
Did you mean: 
Exchange Overviews
Review more than 300 offerings to augment your IRM program on the Archer Exchange

Articles

CISA Cyber Essentials Authoritative Source Content

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to cyber and physical infrastructure. CISA connects stakeholders in industry and government to each other and to resources, a...

Prudential Regulation Authority Outsourcing and Third Party Risk Management Supervisory Statement (SS2/21) Authoritative Source Content

The Prudential Regulation Authority (PRA), as part of the Bank of England, is the United Kingdom’s prudential regulator for deposit-takers, insurance companies and designated investment firms. The PRA is responsible for the prudential regulation and ...

Auditmation™ Integration

uditmation™ and Archer have teamed up to deliver independent, forensic grade automated evidence, through a seamless user experience. The Auditmation™ integration with Archer automates the collection of evidence and makes all collected evidence readil...

auditmation logo.png Gloria_Higley_0-1636681451158.png Gloria_Higley_0-1636656722769.png Control Evaluations Screenshot.png

Caveris ICAS Integration

Caveris was founded to help businesses manage their information and cybersecurity protection measures. The Caveris Information and Cyber Assurance Suite (ICAS) solution brings structure, order, and oversight to the management of Information Risk and ...

logo.png

AWS Security Hub Integration

AWS Security Hub provides security alerts and compliance information related to Amazon Web Service accounts, services, and supported third-party partner products. It aggregates, organizes, and prioritizes security alerts, or findings, from multiple A...

AWS_logo_RGB.png

U.S. State Privacy Laws Authoritative Source Content

This authoritative source comprises state privacy laws for the following U.S. States: California - California Consumer Privacy Act (CCPA) Colorado - Colorado Privacy Act Massachusetts - MA 4806 Maryland - MD 14-3504 Maine - ME 9301 New Jersey - NJ S5...

Cysiv Command Integration

Cysiv Command is a modern security operations and analytics platform. It is the foundation for Cysiv’s threat monitoring, detection, hunting, investigation, and remediation service features. It combines a number of essential technologies and function...

Cysiv_Logo_300px.jpg

ThreatWatch Integration

ThreatWatch is a pro-active cyber security solution that uses an AI powered vulnerability curation and no scan approach for impact assessment of assets including source code, containers, cloud instances, and servers. The ThreatWatch integration takes...

ThreatWatch_Logo_300px.jpg

Panaseer Platform Integration

Traditionally, Governance, Risk and Compliance (GRC) functions have relied on manual, human-driven approaches to self-assess and assure that controls are deployed and implemented correctly. To assure a complete control set across all assets, a typica...

Panaseer_Logo_300px.jpg

AWS IAM Access Analyzer Integration

The AWS IAM Access Analyzer integration helps cloud operations teams to identify potential security risks with cloud resources in their AWS environment. It informs which resources are shared with external principals as per the configured IAM policies...

AWS_logo_RGB.png

Archer IoT Project Readiness App-Pack

Companies see value in IoT technology and data collection to improve processes and analyze trends. However, 35% of customers site security concerns and IoT implementations as a barrier to the organization. IoT products are extremely broad, examples i...

archer-logo-full-color-w300px.jpg IoT Project Owner.PNG IoT Project Approver.PNG

Tenable.sc Asset Discovery Integration

Tenable.sc provides your organization the ability to accurately identify, investigate, and prioritize vulnerabilities. With Tenable.sc you get a real-time, continuous assessment of your security posture by identifying weaknesses through scanning the ...

Tenable+Logo.png

Qualys Asset Discovery Integration

Qualys is a cloud-based solution for IT, security, and compliance. The Qualys Cloud Platform provides complete, real-time inventory of IT assets, continuous assessment of security and compliance posture, vulnerability identification and compromised a...

Qualys+Logo.png
Top Contributors