Engage Overview
Learn more about Archer Engage offerings for business users,...
Learn more about Archer Engage offerings for business users,...
Review more than 300 offerings to augment your IRM program o...
Review details about Archer Platform features and functional...
Learn more about Archer Solutions and Use Cases
Looking for a specific Archer Exchange offering? The tables below provide a list of all available Archer Exchange offerings. Please note that videos, implementation guides and implementation packages require login access to the Archer Community. App-...
The European Commission (EC) is the executive branch of the European Union (EU), responsible for proposing legislation, implementing decisions, upholding the EU treaties and managing the day-to-day business of the EU. The Commission helps to shape th...
Companies see value in transitioning to a DevOps process model, which allows faster turnaround and less waste in the development process; however, this new model opens companies up to new security risks that need to be monitored as the development te...
With the increase of usage for IoT devices comes an increase in risk and vulnerabilities. Organizations face issues with prioritization of risk and vulnerabilities due to constraints with security resources. Finding a way to focus their attention on ...
Companies see value in IoT technology and data collection to improve processes and analyze trends. However, 35% of customers site security concerns and IoT implementations as a barrier to the organization. IoT products are extremely broad, examples i...
Accountability is quickly becoming a top-of-mind issue for financial organizations in Australia and EMEA. Regulations like SMCR (Senior Managers and Certification Regime) in EMEA and FAR (Financial Accountability Regime) in Australia provide a govern...
Archer users frequently need to download multiple attachment files from an Archer record or cross-referenced records. This is especially true for Archer Audit Management users. In the event of an audit, evidence for the audit which can be contained t...
Shared Assessments has been the standard for third-party risk management since 2005, when they were developed by the Big Four and six global banks to address inefficiencies surrounding vendor risk management. Using a robust compilation of questions, ...
Update: Effective December 2022, ISO 27001:2022 and ISO 27002:2022 are now available. ISO/IEC 27001 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Securi...
The National Institute of Standards and Technology (NIST) is a part of the U.S. Department of Commerce. The NIST mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways ...
Organizations are often inundated with requests for information. These requests can come from within the organization or external to the organization from their clients, third parties, vendors, and so on. These requests are typically Requests for Inf...
Supply Wisdom was launched out of a need for an early warning service to help enterprises detect and prevent disruptions across both third parties and locations. Today, global industry leaders use Supply Wisdom as a trusted resource for continuous ri...
Axonius is a cybersecurity asset management platform providing actionable visibility and security policy enforcement for all assets and users by aggregating existing business data from more than 100 management and security solutions. The combination ...
The Archer Question Library is a central repository for assessment-based content that might be used to drive questionnaire generation or facilitate compliance assessments. Out-of-the-box the Archer Question library contains several thousand questions...
Use Case for Resilience Management Archer® Incident Management provides case management and incident response for reporting and categorizing cyber and physical incidents and determining the appropriate response procedures. The use case allows you to ...
Use Case for Resilience Management Archer Operational Scenario Analysis helps your organization make sense of plausible disruptive scenarios that could impact your ability to provide products and services to your customers. It enables you to identify...
Use Case for Resilience Management Archer Business Impact Analysis helps you determine the criticality of your products and services, business processes and supporting infrastructure so you can make the most important of these resilient to disruption...
Archer® Business Continuity & IT Disaster Recovery Planning enables you to perform risk assessments and document and test business continuity and IT disaster recovery plans that target your organization, including business processes, locations, IT ap...
Use Case for Resilience Management Archer® Crisis Management provides a coordinated, consistent and automated approach to handling crisis events. By aligning crisis management with incident response, you can respond earlier to incidents and in crisis...
Looking for your favorite use case? Use this guide to search and navigate all of the Archer solutions and use cases.