Skip navigation
All Places > Products > RSA Archer Suite > Blog
1 2 3 Previous Next

RSA Archer Suite

442 posts

We are pleased to announce a new, purpose-built integration for Panaseer with RSA Archer Suite. Panaseer has integrated its Continuous Controls Monitoring (CCM) platform with the RSA Archer platform to provide automated continuous controls and risk monitoring and assurance. This integration is designed to give security teams complete and accurate visibility of assets, controls gaps, and risks, both on premises and in the cloud.

 

Need of the hour

Traditionally, integrated risk management (IRM) practices have relied on manual, human-driven approaches to self-assess and assure that controls are deployed and implemented correctly. To assure complete control coverage and effectiveness across all asset types such as devices, applications, people, accounts and databases, enterprises require very large teams at considerable expense. Alternatively, they are only able to test a sample of controls and assets, on an infrequent basis, with the budget available. The veracity of the results of this process is questionable because humans are prone to error. As the assessment process is manual and costly, it cannot be conducted frequently, leading to out-of-date and inaccurate results.

 

Risk and compliance teams are also seeing an increase in the number and complexity of regulatory requests, as more privacy and security laws go into effect globally. For example, in the banking sector, Singapore’s Notice 655 “Requirements for Cyber Hygiene for Banks” requires banks to ensure that a malware protection solution is installed and functioning on every device all the time. Risk and compliance teams in turn rely on security teams to provide relevant security metrics to inform their security and risk posture assessment for IRM. This places significant load on security teams to do data science, rather than securing the business. In fact, a recent Panaseer commissioned survey found that security teams spend more than 36% of their time on reporting, which includes extracting, moving, cleaning and merging data, as well as making, formatting and presenting calculations.

 

How can CCM + IRM help?

With the new Panaseer integration with RSA Archer, IRM practices that require data to be collected and analyzed can be automated with near real-time insights that are easily scalable. Cost of risk management and the associated data collection and analysis can also be reduced significantly.

 

Panaseer’s CCM Platform integration with RSA Archer enables organizations to:

  • Reduce costs through automation, as large teams doing manual assessments are no longer required
  • Improve accuracy with data as assessments are based on facts versus subjective opinions
  • Perform complete assessments (instead of sampling assessments) as testing of every control instance is available automatically, without the need for a large team
  • View continuous assessments with a consistently up-to-date view of control deployments

 

Panaseer Screenshot Archer Option 1 Color

 

Panaseer Screenshot Archer Option 1

NIST-aligned control assurance metrics automatically calculated in 
Panaseer and exported as Metric Results in RSA Archer

 

How does it work?

CCM sits above existing security tooling, ensuring that all controls are fully operational and all assets are protected. It automatically and continuously consumes data from sources across security, IT and business domains. By unifying disparate data, it can identify previously unknown or unmanaged assets, control coverage gaps, and control compliance failures. It then substantiates that insight through automated reports which can be segmented by market, business process, business unit or service line and mapped to your goals and structure to provide business context for security metrics. Business Risk Perspectives (BRP), an element of Panaseer’s CCM platform, provides a continuous view of the risks associated with the most mission-critical business processes. 

 

Complete asset inventories (including devices, applications, people, accounts and databases), control coverage gaps (control deployment and performance insights), and business context for risk prioritization from Panaseer’s CCM platform are all fed into RSA Archer for continuous controls and risk assessment. 

 

Interested in learning more about the Panaseer Continuous Controls Monitoring integration with RSA Archer? 
Register and join us for a Free Friday Tech Huddle on Friday, March 20, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

If you have any questions or feedback, please get in touch via Panaseer’s contact page.

About the author(s):

Charaka Goonatilake is CTO at Panaseer where he is responsible for the technology strategy and delivery of the Panaseer Platform. He leads a team of engineers who develop innovative technologies and techniques for deriving data-driven cyber security insights for a range of enterprise stakeholders. Charaka has been immersed in Hadoop and cloud-based big data technologies for the past decade, across roles at BAE Systems Applied Intelligence and Panaseer. He has hands-on experience of architecting large-scale data solutions in the enterprise, for a range of cyber security use cases, including security analytics for threat detection, threat intelligence management and cyber security risk management.

 

Gloria Higley is a Product Manager at RSA focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, the RSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, and Tools & Utilities that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

Proactive security is essentially a big data problem, although at first glance it may not seem like one. On one hand, the vulnerability deluge is inundated with thousands of vulnerabilities and exploits being reported each day. On the other hand, there is an ever-expanding attack surface with public/hybrid clouds, data centers, and containers. These two dimensions effectively make it a big data problem. Traditional vulnerability assessment (VA) solutions and their scanning-over-the-network models are simply not up to solving it.

 

ThreatWatch is a next generation proactive cyber security solution that uses machine-powered, AI-based vulnerability curation, along with a no-scan approach, for impact assessments for assets including cloud instances, containers, servers, source code, and more.

 

Two key aspects of the ThreatWatch integration to note:

  1. ThreatWatch does no scanning over the network.
  2. All assets recorded in ThreatWatch are protected in a continuous and ongoing manner without user intervention.

ThreatWatch integrates with the RSA Archer IT Security Vulnerabilities Program use case to provide a real-time automated picture of the vulnerability landscape and its impacts on organizational assets to customers. The RSA Archer IT Security Vulnerabilities Program use case offers a centralized catalog of IT assets, repository, and taxonomy for vulnerability data that enables customers to quickly understand which assets are vulnerable based on scanner detections.

 

This integration is achieved via two data feeds in RSA Archer:

  • The ThreatWatch Vulnerability Intel data feed pulls the latest vulnerability intelligence from ThreatWatch into RSA Archer's Vulnerability Library application. This helps provide a complete vulnerability landscape to RSA Archer users. It also helps provide prioritization input for newer vulnerabilities like Common Vulnerabilities and Exposures (CVEs), missing analysis in National Vulnerability Database (NVD), and critical information around availability of patches, remediations and exploits. Together, these details help security teams with prioritization.

    ThreatWatch Vulnerability Library Screenshot
  • The ThreatWatch Vulnerability Impact data feed pulls the latest vulnerability impacts from ThreatWatch into RSA Archer's Vulnerability Scan Results application. ThreatWatch's continuous no-scan approach ensures that impacts are recorded in near real-time without the need for intrusive scans on the network. Impacts are auto-prioritized as either “Do Now” (something that needs immediate attention) or “Do Later," providing actionable insights for security teams.

    ThreatWatch Vulnerability Scan Results Screenshot

 

Having vulnerability intelligence and impact details in RSA Archer out-of-the-box applications like Vulnerability Library and Vulnerability Scan Results ensures that existing RSA Archer users do not have an additional learning curve and can leverage existing reports. The ThreatWatch integration with RSA Archer helps provide a complete and accurate risk score picture to RSA Archer users.

 

ThreatWatch Example Vulnerability Intelligence Chart

 

Example Vulnerability Intelligence Chart

 

ThreatWatch Example Vulnerability Impacts by Asset Chart

Example Vulnerability Impacts by Asset Chart

 

ThreatWatch Example Vulnerability Impacts by Asset by Priority Chart

Example Vulnerability Impacts by Asset by Priority Chart

 

Interested in learning more about the ThreatWatch integration with RSA Archer?
Register and join us for a Free Friday Tech Huddle on Friday, March 20, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.


About the author(s):

Ajey Godbole & Paresh Borkar
Ajey Godbole is a Senior Engineer at ThreatWatch. Paresh Borkar is a co-founder and Chief Architect at ThreatWatch.

 

Gloria Higley

Gloria is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, theRSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, Tools & Utilities, and Content that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

Designing the right processes, organization, and templates during the initial set-up of an Information Security Management System (ISMS) are challenges many organizations face. Rolling out an ISMS in a large organization is a completely different story: aspects like automating frequent manual steps, usability, easy reporting or access permissions to sensitive information become crucial for the ISMS’ success.

 

The NTT ISMS Control Assessment app-pack was introduced as part of the RSA Exchange Release R11 to enable organizations to achieve a streamlined classification and control assessment methodology when implementing and operating their ISMS. This app-pack allows organizations to leverage the first two steps in a flexible three step approach for the implementation and roll-out of an ISMS that has been successful among many of NTT’s clients. The methodology is derived from ISO 27005 and NIST Special Publication 800-30, as well as NTT’s many years of consulting experience assisting clients with their ISMS implementation process.The three steps of the methodology include:

 

  1. Classification
    Use a built-in questionnaire or derive classification from assets, such as business processes or information assets, when master data applications are integrated.

    RSA Archer Classification Step for NTT ISMS Control Assessment App-Pack

  2. Control Assessment
    Results from previous cycles are pre-filled and controls automatically selected based on three filter stages to ensure there are only controls for relevant assets in the assessment. This reduces the effort needed for assessment in the process.


    RSA Archer Control Assessment Step for NTT ISMS Control Assessment App-Pack

  3. Risk Assessment
    Threat events are automatically selected, results from previous cycles are pre-filled, and risks automatically calculated based on the results from the Classification and Control Assessment steps to derive a well-founded prioritization of measures.

    RSA Archer Risk Assessment Step for NTT ISMS Control Assessment App-Pack

 

NTT has developed two app-packs to provide RSA Archer customers with this methodology, including:

  • NTT ISMS Control Assessment app-pack
    • Includes the Classification and Control Assessment steps.
    • Prerequisite for the NTT ISMS Risk Assessment app-pack and currently available on the RSA Exchange.

  • NTT ISMS Risk Assessment app-pack
    • Includes the Risk Assessment step.
    • Currently in development and is a planned offering for a future RSA Exchange release.

 

With the NTT ISMS Control Assessment app-pack, RSA Archer customers can:

  • Evaluate the maximum impact resulting from a breach of a security objective (confidentiality, integrity, availability) based on a questionnaire or by inheriting from one or multiple assets
  • Assess compliance with relevant controls (filtered by asset category, classification and zone)
  • Define and track remediation plans
  • Assess assets with a streamlined process as part of the organization’s ISMS
  • Gain insight into compliance violations of internal or external policies
  • Improve overall compliance and security
  • Track measures using RSA Archer Issues Management

The NTT ISMS Control Assessment app-pack includes several useful features, including:

  • Workflow process graphics
  • Tooltips to efficiently provide all the necessary information to the user
  • Multi-language user interface, including content like controls and threat events
  • Automatically saved inline edit grids

 

Interested in learning more about the NTT ISMS Control Assessment app-pack? 
Register and join us for a Free Friday Tech Huddle on Friday, February 28, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

About the author(s):


Lars Rudolff
Lead Consultant, GRC Tools - NTT Ltd. 

Lars Rudolff works for NTT Ltd. as lead consultant for GRC Tools. Mr. Rudolff is responsible for the technical and strategic orientation of the GRC Implementation practice. He has experience in the area of GRC tools in general since 2005 and with RSA Archer since 2011. He has led implementation projects for many customers including the introduction of one of the largest RSA Archer environments in Europe at a German car manufacturer.

In addition, Mr. Rudolff accompanies the NTT’s Operations team for RSA Archer, which provides operational services for existing RSA Archer customers. This includes, among other things, 2nd and 3rd level support activities as well as maintenance services such as system upgrades or minor modifications of an existing implementation. He is also responsible for developing monitoring and automation tools for the RSA Archer platform.

 

Gloria Higley

Product Manager - RSA 

Gloria is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, the RSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, and Tools & Utilities that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

The adoption of Internet of Things (IoT) is transforming the way companies do business. With IoT, organizations can gather an abundance of data for analytics to improve their product offerings. A simple case would be the addition of IoT to automobiles to improve safety for consumers. Not only can businesses use IoT to improve their product offerings, they can use IoT to improve business operations, to gather data from manufacturing machines and equipment in order to identify areas to improve productivity. With increased usage of IoT, data privacy and security are among the top concerns. Once devices are connected to the Internet, they become vulnerable to possible attacks which increase the risk for the organization. 

 

The first step is understanding the impacts of implementing IoT within your organization. 

 

In RSA Exchange Release R11, we've introduced the RSA Archer IoT Project Readiness app-pack. This is our first IoT offering which helps you track IoT projects within your organization and provides visibility into all IoT projects and how they impact your organization. With this app-pack, you can document the IoT project, identify the risks prior to implementation and ensure a plan is in place to address the risks so that your IoT projects are ready to implement. 

  

RSA Archer IoT Project Readiness allows you to:

  • Gain visibility into all IoT projects by documenting and tracking IoT projects within your organization
  • Minimize impacts of IoT projects to your organization by identifying project risks and monitoring project status and remediation plans
  • Proactively address risks by developing mitigation strategies prior to implementation

 

Interested in learning more about the RSA Archer IoT Project Readiness app-pack? Join us for a Free Friday Tech Huddle on Friday, Feb. 28 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

 

RSA Archer IoT Project Readiness

IoT Project Owner Dashboard

 

 

RSA Archer IoT Project Readiness

IoT Project Approver Dashboard

With today's launch of RSA Exchange Release R11, we're excited to share new offerings to enable you to expand your IT & Security Risk Management processes. It's important to have a complete picture of technology and security-related risks in order to make decisions. What's more, the alignment of security policies and regulatory and business requirements is critical for success.

 

One of our new offerings, the RSA Archer IoT Project Readiness app-pack, enables organizations to prioritize their IoT projects around business goals and needs.  Our partner, NTT, has created the NTT ISMS Controls Assessment app-pack to help with the challenges that organizations face when setting up an Information Security Management System (ISMS).

 

We're excited about our partner integrations like the AWS IAM Access Analyzer which will provide a consolidated view of unauthorized access findings from multiple AWS accounts, prioritize and take action on critical devices, save time analyzing resource policies for public or cross-account accessibility, and continuously monitor and refine permissions. Our new Cysiv Command Integration provides an ongoing management of incidents and security posture using RSA Archer, while allowing Cysiv to provide SOC-as-a-service and SIEM-as-a-service. The Panaseer integration computes metrics that measure control deployment and control performance. Our Rapid7 Nexpose integration enables organizations to catalog network devices discovered on the network. Finally, the ThreatWatch integration enables organization to access near real-time vulnerability intelligence along with continuous impact assessment of organizational assets.

 

We're also introducing a wide range of content that provides best-practice policies, control standards, legal and regulatory requirements, industry standards, and assessments such as the CCPA Regulation that was passed in June 2018 and went into effect on January 2020.

 

To learn more about each of these new and updated offerings, start by reviewing the Product Advisory. Also, please join me on Friday, February 21 for a Free Friday Tech Huddle for an overview of the RSA Exchange Release R11 offerings.

 

And last, but not least, there is a wealth of documentation, downloads, and more on the RSA Exchange on RSA Link.  I recommend that you bookmark the listing of all RSA Exchange offerings. And if you have new ideas for the RSA Exchange, please submit them on RSA Ideas

Compliance teams within different organizations, spread across industry verticals, work towards achieving regulatory requirements through different regulatory compliance, control assurance and monitoring programs.  A large part of the compliance team’s responsibility is managing and responding to regulatory interactions such as information, investigation and inspection requests, as well as documenting meeting notes, outcomes, correspondence, and formal orders.

 

The complexity of responding to regulators and tracking those responses creates challenges for compliance teams due to the number of regulators requesting information, internal review and governance processes, linkages to regulatory change processes, and impacts to other compliance and risk areas.

 

The HCL Regulatory Interactions Management app-pack was introduced as part of RSA Exchange Release R10 to help organizations streamline the complexity of interactions with regulatory bodies. 

 

It enables organizations to efficiently maintain a repository of regulatory requests along with associated responses to ensure organizational readiness in meeting underlying compliance requirements through other linked assurance processes.

 

With the HCL Regulatory Interactions Management
app-pack, RSA Archer customers can:

 

  • Register regulatory interactions, identify internal respondents, and track responses to closure
  • Consolidate responses and track supporting evidence
  • Track approvals for external communication readiness
  • Trigger regulatory reviews, policy change requests, findings, associated actions and impacted risks and controls
  • Streamline interactions with regulatory bodies
  • Efficiently maintain a repository of requests and associated responses
  • Ensure organizational readiness in meeting underlying compliance requirements

 

 

ADDRESSING HCL CUSTOMER’S NEEDS

HCL Technologies recently worked with a U.S.-based multinational finance and insurance corporation to assess their needs for responses to regulatory requests and an effective mechanism for collaboration with internal stakeholders. With a global presence in more than 75 countries and jurisdictions, the customer needed to address many complex regulatory challenges, including:

 

  • Managing interactions with a diverse set of regulators for various counties and jurisdictions
  • No central system and/or repository for these interactions and communications
  • Significant human effort required to manage and respond to interactions with regulators
  • Lack of understanding of the organizational impact of regulator interactions on policies, business processes, and product or services


HCL carried out a detailed analysis on the customer environment, including current processes for regulatory interactions and use of regulatory change management functionality within their RSA Archer implementation. Post review, HCL created a solution blueprint by proposing an on-demand application (ODA) built on top of the customer’s existing RSA Archer instance.
Based on this solution blueprint, HCL developed the HCL Regulatory Interactions Management app-pack to help streamline the process of managing the customer’s interactions with regulatory bodies.

 

HCL did a phased rollout of the app-pack to all business units and locations for the customer. In doing so, the HCL Regulatory Interactions Management app-pack enabled the customer to:

 

  • Streamline the process of managing interactions with regulatory bodies
  • Enable faster response to regulatory communications
  • Reduce efforts to manage regulatory interactions by 30%
  • Efficiently maintain a repository of requests and associated responses
  • Ensure organizational readiness for meeting underlying compliance requirements
  • Create a comprehensive repository of global interactions and communications to share knowledge with different business functions and locations

 

Interested in learning more about the HCL Regulatory Interactions Management app-pack? Register and join us for a Free Friday Tech Huddle on Friday, January 31, for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

About the author(s):

Deepak Arora
Senior Manager – HCL Technologies

Deepak is a seasoned GRC professional with industry experience of over ten years across different industry verticals including Financial Services, Telecommunications, Manufacturing and Retail. He is responsible for providing GRC technology advisory, blueprinting, and implementation services at HCL spanning across areas like Enterprise & Operational Risk, IT Compliance, Internal Audit, Business Continuity and Information Security and has been associated in driving various GRC Transformation programs for many esteemed organizations in the United States and Europe.

 

Gloria Higley

Product Manager - RSA 

Gloria is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, the RSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, and Tools & Utilities that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

 

Wow, 2019 sure was a great year for RSA Archer customers and the RSA Archer Suite.  It’s mind-blowing to realize how many incredible improvements and new offerings the RSA Archer Engineering and Product Management teams delivered in just 12 months. As we dive into 2020, I thought a look back would be a great way to reflect on everything that we accomplished in 2019 and set the stage for great things to come in 2020.

 

2019 was a busy year for RSA Archer teams, delivering several releases throughout the year, including new and enhanced use cases, improvements to the performance, scalability, and usability of the RSA Archer Platform, and of course, the new RSA Archer SaaS offering. We also continued to develop our solution ecosystem with the continued addition of RSA Exchange offerings each quarter.

 

In March, we introduced the new RSA Archer Third Party Security Risk Monitoring use case, which provides organizations visibility, insight, and actionable intelligence into their third and fourth-party IT risk environments.  This new SaaS-based use case discovers and analyzes each third party’s IT footprint using artificial intelligence to automatically measure the value of each asset. This enables analysts to quickly identify each vendor’s specific systems that pose the greatest risk, based on vulnerability severity and asset criticality. Third Party Security Risk Monitoring is available for SaaS, hosted, and on-premise implementations of RSA Archer.

 

In May, we launched RSA Archer Release 6.6.  This release marked the kickoff of our efforts to make marked improvements to the RSA Archer user experience. These improvements focused on reporting, workflow, and new search capabilities. We also introduced RSA Archer Enterprise Catalog, a new package that aggregates frequently-updated shared applications across multiple use cases to simplify the update process. In addition, updates to the RSA Archer Key Indicator Management use case leverage the new Advanced Workflow rules-based enrollment capability. This allows metrics to be automatically enrolled into a workflow for review when they reach a particular date or threshold.

 

In September, we introduced the new RSA Archer Regulatory Content Analysis use case. This SaaS-based use case enables compliance analysts to more quickly and efficiently focus on specific areas of regulations that impact the business. It incorporates patent-pending technology and utilizes natural language processing and machine learning to analyze how an organization maps existing regulations to controls. RSA Archer Regulatory Content Analysis is available for SaaS, hosted, and on-premise implementations of RSA Archer.

 

In October, we launched RSA Archer Release 6.7, delivering even more enhancements to modernize and simplify the user experience with RSA Archer Suite, in support of the growing importance of a cohesive view of risk and compliance at all levels of an organization. This release is the next step in the user experience evolution, providing cleaner, easier-to-use dashboards, and more direct, intuitive navigation. Release 6.7 provides a number of updates for reporting, including enhanced charting for added graphical context, and administration updates for improved functionality. The release also includes updates for RSA Archer Public Sector Solutions, RSA Archer Enterprise & Operational Risk Management, RSA Archer IT & Security Risk Management, and RSA Archer Third Party Governance use cases.

In November, we were very excited to announce the availability of our new RSA Archer SaaS offering. RSA Archer customers now have the option to leverage the flexibility, availability, and scalability of the cloud, coupled with the depth and breadth of the RSA Archer Suite, to comprehensively and proactively manage risk. Our SaaS offering enables us to support the changing needs of our customers with greater choice for their implementation of RSA Archer, while continuing to drive innovation in the market.

 

On a quarterly basis throughout 2019, we introduced new and updated offerings on the RSA Exchange for RSA Archer, including 11 App-Packs, 5 Tools & Utilities, 30 Integrations, and over 23 new and updated content packages. RSA Exchange continues to add new offerings that provide best practices and complement out-of-the-box RSA Archer capabilities.

 

On the heels of everything we delivered in 2019, 2020 is set to be another exciting year for RSA Archer.

 

Be sure to mark your calendars for RSA Conference 2020 Feb. 24-28 in San Francisco, California and RSA Charge 2020, Oct. 5-8 in sunny Orlando, Florida. Both of these events are great opportunities to learn more about exciting new RSA Archer solutions and network with your peers and industry experts.

 

So here’s to a fantastic 2019 and looking forward to all the great things to come in 2020!

In Deloitte’s 2019 Extended Enterprise Risk Management global survey, 83% of respondents reported experiencing a third-party incident within the past three years, with 11% reporting they had experienced a third-party incident that severely impacted their customer service, financial position, reputation, or regulatory compliance.

 

In the 2019 Gartner Magic Quadrant for IT Vendor Risk Management Tools report, Gartner states: “Through 2022, more than 5% of publicly traded companies will see a decrease in market capitalization as a result of mismanaged or unmanaged vendor risks.”

 

It is with these sobering statistics in mind that we are proud to announce that RSA has again been positioned as a Leader in the 2019 Gartner Magic Quadrant for IT Vendor Risk Management Tools. Published on Nov. 25, the report evaluates and positions  ITVRM software vendors on their ability to execute and their completeness of vision.

 

2019 Gartner Magic Quadrant for IT Vendor Risk Managemnt

We’d like to sincerely thank our customers who participate in analyst evaluations, including Gartner's ITVRM assessment this year.  We know you are very busy, but your feedback is invaluable in helping to inform others of your experience with the RSA Archer Suite.

 

Interested in learning more about RSA Archer Third Party Governance? Please contact RSA and download the MQ report for IT Vendor Risk Management Tools.

 

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Dell (RSA).  Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

Gartner Magic Quadrant for IT Vendor Risk Management Tools, 25 November 2019, Christopher Ambrose, Joanne Spencer

 

*Appeared as EMC (RSA) in Magic Quadrant for IT Vendor Risk Management, 2014, 2016.  Appeared as RSA in Magic Quadrant for IT Vendor Risk Management, 2017.

 

Today RSA announced it has completed an integration with Amazon Web Services (AWS) that will enable resource-based policy event information from AWS Identity and Access Management (IAM) Access Analyzer to be integrated into RSA Archer to better manage cloud resource access policy risks.

 

IAM Access Analyzer, which is launching at AWS Re:Invent 2019, is aimed at addressing a significant security challenge associated with cloud deployments, specifically the decentralized way in which resource-based policies are managed.  Prior to the launch of IAM Access Analyzer policies for Amazon Simple Storage Service (Amazon S3) buckets, AWS Key Management Service (KMS) Keys, AWS Lambda, Amazon SQS Queues, and IAM roles had to each be independently configured.  This required customers to manually monitor each resource for policy changes that allow access to users outside of the customer’s account.  The IAM Access Analyzer offering provides customers centralized visibility of resource-based policy changes, generated as findings when a resource is shared with a principal that is outside of the customer’s account.

 

IAM Access Analyzer capabilities have additional power to help manage cloud resource access risk when integrated into RSA Archer. To fully contain risks associated with resources sharing with outside accounts, organizations need to have visibility into their cloud resources, with business context, to quickly assess the IAM Access Analyzer findings to determine its actual risk to the business.  An RSA Archer integration with IAM Access Analyzer provides organizations with the necessary business context to understand the cloud resources role, business criticality, and state of compliance to help security and risk practitioners make risk-based decisions on how to address the IAM Access Analyzer finding. Out of the box dashboards and workflows within RSA Archer help customers in prioritizing and managing the risks of the IAM Access Analyzer findings.

 

We are excited to further extend the relationship with AWS, in an area that directly addresses managing one of the most common digital risks facing organizations today, specifically cloud transformation risk. This additional integration extends the ability for RSA customers to extend the value of managing security and risk around critical workloads in the cloud.

 

For current RSA Archer customers interested in taking advantage of this new capability, integration with IAM Access Analyzer can be built to bring findings and associated cloud resource information into the "Potential Unauthorized Activity" and "Cloud Assets and Services" on-demand applications (ODAs) currently available as a beta version and coming soon to RSA Exchange. These results can then be paired with the Asset Criticality, Risk and Business Context in RSA Archer IT Security Risk Management use cases. This context will help the customers in prioritizing and managing the findings to take quicker action.

 

RSA Archer customers interested in leveraging this new integration, you can learn more at the following link: https://aws.amazon.com/iam/features/analyze-access

What is DevSecOps and why is it so important? With the transformation to a DevOps model, companies need a way to introduce security into the picture. It’s not just about development and operations anymore. In the past, security was addressed in the final stages of development. In doing so, it became a bottleneck in the process stretching out the development cycle much longer than needed. With a DevOps model, companies are developing much more rapidly and have more frequent development cycles, and incorporating security early and frequently. Security is no longer an afterthought.

 

IT and security teams require tools to help document and track the security of products and remediation. On Nov. 19, we introduced the RSA Archer Product Security Development Assessment app-pack, our first RSA Exchange offering for the journey of DevSecOps. With IT Security Risk Managers and Product Security teams as its primary audience, this app-pack provides a consistent and repeatable process to identify security concerns early in the DevOps process and minimize the impacts of security risks prior to deployment.

 

RSA Archer Product Security Development Assessment allows you to:

  • Document product initiatives during the development lifecycle
  • Manage and track threat model information
  • Identify risks and mitigation strategies associated with security concerns during threat modeling
  • Track results and approvals for security testing and third-party libraries

 

Interested in learning more about the RSA Archer Product Security Development Assessment app-pack? Join us for a Free Friday Tech Huddle on Friday, Nov. 22 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

RSA Archer Product Security Development Assessment

Initiative Leader Dashboard

 

RSA Archer Product Security Development Assessment

Security Manager Dashboard

With today's launch of RSA Exchange Release R10, we are excited to share new offerings to help you navigate an integrated risk management (IRM) journey that's right for you.  In this release, the RSA Exchange is starting the journey into DevSecOps with the introduction of the RSA Archer Product Security Development Assessment app-pack. While it's important to put security into the design of your offerings, it's also important to track the risks that are identified in security testing to ensure the appropriate mitigation plans are in place and implemented. We would appreciate your feedback on this first offering in DevSecOps to help guide us with future offerings to support your journey.

 

RSA Exchange Release R10 also introduces a new offering from our partner HCL, which is designed to manage regulatory interactions. In addition, we have three integrations for asset discovery and updates to existing tools & utilities and content.

 

Here is a full list of the new and updated offerings available in Release R10:

 

 

  • Tools & Utilities – pre-built functions enabling administrators to more easily manage RSA Archer implementations

 

 

 

To learn more about each of these new and updated offerings, start by reviewing the Product Advisory. Also, please join me on Friday, November 22 for a Free Friday Tech Huddle for an overview of the RSA Exchange Release R10 offerings and a brief demo of the RSA Archer Product Security Development Assessment app-pack.

 

And last, but not least, there is a wealth of documentation, downloads, and more on the RSA Exchange on RSA Link.  I recommend that you bookmark the listing of all RSA Exchange offerings. And if you have new ideas for the RSA Exchange, please submit them on RSA Ideas

For a long time, we have received your feedback, “RSA Archer provides a fantastic set of features, but if only it had equally compelling User Interface…”

 

Well, the wait is over! With RSA Archer v6.7, we just delivered the first batch of many of the UI improvements we have planned for delivery in upcoming releases. We are excited about how new UI appearance and user interaction has turned out. And we want you to be equally excited, when you get to try it out!

 

So, what has improved?

 

Global Header, Navigation Menu and Environment Bar

We have replaced complex, monolithic, counterintuitive, access all-features-at-once Mega Menu with modern, responsive and easy to navigate Global Header and Navigation Menu. The simple yet efficient navigation will speed up the learning curve for new users and eliminate the fatigue of experienced users having to click through many places for frequent, repetitive activities. 

 

Re-organization of frequently used features that existed in Mega Menu plus addition of other frequently used features  such as Type ahead global search, recent activities, assigned tasks, Back office (administration) pages, contextual search, User Preferences, Home page, Workspaces, Flexible Workspace Management control as well as Master report list greatly improves ease of access from anywhere in RSA Archer with a single click.

 

In addition, ability to customize the background and text of the new Environment bar (located above the Global Header) will help you easily identify the environment you are working on and eliminate the mistakes of doing edits in the wrong environment.

 

Global Header and Nav Menu

 

Landing page iView for first line of Defense user

While we love RSA Archer for what it has to offer, navigating RSA Archer for a new user was a daunting experience. To tackle the problem, we have added a new "Landing page iView" type so that you can create a default landing page with links to frequently used features for the first line of defense users. You will also have opportunity to improve/customize the appearance with choice of adding an image as background to the iView.

 

First Line of Defense User Landing Page

 

Appearance and Record page updates

We have modified the appearance of the User Interface. Rather than you trying to set primary and secondary options and hope for color algorithm to churn out the right color combination (which rarely happened), now you have direct control over selecting the colors of your choice and modifying the appearance.

 

The User Interface uses the system defined neutral, high-contrast color scheme to display the content while allowing you to control the color selection for prominent locations in UI such as Nav Menu, Footer and Environment bar as well as the branding logo in Global Header and the background image in Landing page iView. For more insight on this topic, please visit our other blog.

 

We also updated the Record page header to give it a modern, clean appearance and improve visibility to frequently used functions. For the records associated with application that uses the Advance Workflow (AWF), the record header also optionally displays a progress tracker aka Workflow tracker.

 

 

Dashboard and iView improvements

Along with other UI changes, we also made number of changes to Dashboard and iView such as the layout of components, color, font size, padding and other related modifications including addition of Quicklink bar.

 

Dashboard and iViews improvements

 

For the demo and better insight to the Global Header, Navigation Menu, Record page header, Appearance, First line of defense landing page, Dashboard and iView improvements, please attend this week’s Free Friday Tech Huddle . We look forward to your attendance!

You’ve given us your input and shared your feedback on features and functionality. You’ve seen updates in customer product roadmap sessions. You’ve seen exciting sneak peeks at RSA Charge 2019. And today, it’s here – RSA Archer Release 6.7 is now available!

 

RSA Archer Release 6.7 delivers enhancements designed to modernize and simplify the user experience with the RSA Archer Suite, in support of the growing importance of a cohesive view of risk and compliance at all levels of an organization. This release is the next step in the evolution of the RSA Archer user experience, with cleaner, easier-to-use dashboards and more direct, intuitive navigation.

 

Updates in Release 6.7 provide improved usability and easier accessibility to key data. Improvements to the user interface allow business users to more quickly access the data they need and more easily interpret the data. Dashboard updates enable easier navigation, with a new Quick Links bar and links to frequently accessed user actions and dashboard options that remain at the top of the page when scrolling. A new “first line of defense” iView provides business users with a clean, simple dashboard and clear access to common tasks and reports. Reporting enhancements in Release 6.7 provide added graphical context for key data, more interactive functionality, and more chart type options.

 

RSA Archer Release 6.7 dashboard

 

For RSA Archer administrators, this release includes a number of updates to extend functionality and performance, including updates to the Data Gateway feature of the RSA Archer Platform. Introduced in Release 6.4, the Data Gateway allows organizations with large data sets in external systems to connect to RSA Archer. In Release 6.7, updates enable administrators to configure the Data Gateway without the need for professional services. The Data Gateway RESTful API provides commands to add, update, and delete Data Gateway connections, content mapping, and field mapping, and new documentation provides instruction for coding a Data Gateway connector. Other new administration features in Release 6.7 include automated deployment of packaging, secure connection for FTP data feeds, proxy bypass, and much more.

 

In addition to enhancements to the RSA Archer Platform, Release 6.7 includes updates for a number of RSA Archer use cases for Public Sector, Enterprise & Operational Risk Management, IT & Security Risk Management, and Third Party Governance.

 

To learn more about RSA Archer Release 6.7, please review details in the Product Advisory. RSA Archer customers are invited to join us for a Free Friday Tech Huddle on Nov. 1 (pre-registration is required). We'll have more Free Friday Tech Huddles over the next few months to take deeper dives into Release 6.7 features. You can also check out Release 6.7 documentation available on the RSA Archer Release 6.7 subspace on RSA Link.

One of the biggest commitments we at RSA make to our customers is to provide best-in-class security products that help manage digital risk.  Our goal is to do so with maximum reliability while also requiring minimum effort on your part.  However, we know, that even best-in-class products occasionally need help to install, use, and maintain them.  While we are continuously focused on improving our support services to ensure that every interaction you, our customers, have with us is positive and quick, we realize that even the best support interaction still requires time and effort on your part.  And what’s more valuable than time?

 

With that in mind, today I am happy to officially launch our Engineering Request dashboard within the RSA Case Management portal, which will allow you to monitor progress of Engineering Requests (ER) opened on your behalf*.  Not only will you be able to see progress of your ER’s, but you will be able to do so on your own, without the need to call support for an update. 

 

To access this information, navigate to the RSA Case Management portal by clicking on My Cases in the main menu on RSA Link.    Clicking on the Engineering Requests tab will display Engineering requests that have been opened on your behalf (linked to your support cases) since January 1, 2018.  For each of these, you will be able to see its Status to know when the issue has been addressed, and if a fix is included in a release, you’ll see the release number as well.

  

Click to enlarge

 

This is just another small improvement to your support experience.  Stay tuned for the more exciting upcoming changes.

 

In the meantime, if you have any feedback on this enhancement or other ideas to continue to improve your experience, please share! 

 

* This functionality is currently only available for the RSA Archer Suite and the RSA NetWitness Platform. Additionally, you will only be able to monitor Engineering Requests that were opened directly on your behalf and are not security issues that could have sensitive information.  We will encourage you to utilize the RSA Ideas portal to manage and monitor Enhancement requests.

RSA is pleased to announce that – once again -- Dell Technologies (RSA) has been named a Leader in the 2019 Gartner Magic Quadrant (MQ) for Business Continuity Management Program (BCMP) Solutions!

 

This comes on the heels of Leader designations for Dell Technologies (RSA) in the 2019 Gartner Magic Quadrant for Integrated Risk Management Solutions and the 2019 Gartner Magic Quadrant for IT Risk Management Solutions – making RSA the only vendor to be positioned as a Leader in all three of these Magic Quadrants!

 

RSA Named A Leader in 2019 Gartner Magic Quadrant for Business Continuity Management Program Solutions, Worldwide

 

In the BCMP Magic Quadrant report, Gartner states that “organizations need a consistent and repeatable process for all aspects of BCMP development and execution. With the growing focus on resilience in day-to-day business operations — rather than on out-of-band response and recovery activities only — BCMPs need to demonstrate maturity, status and effectiveness on an ongoing basis, not just once a year.” RSA Archer use cases for Business Resiliency bring together incident response; business impact analysis; recovery planning, testing and activation; and crisis management – all critical components of a program positioned to build resiliency throughout the organization.

 

Gartner also states that “the critical capabilities of BCMP solutions center on providing business leaders with a more effective means of evaluating operational risks and business impacts, as well as planning for, responding to, recovering from and restoring after a business disruption.” The RSA Archer Business Resiliency solution integrates with operational risk management, security and third-party risk use cases to dramatically improve coordination, alignment, and visibility across these often-separate functions.

 

Finally, Gartner defines “optimal BCMP solutions as holistic, addressing the following critical capabilities: ease of use and configuration; dashboarding and reporting; and BCM tool integration.” RSA Archer offers out-of-the box capabilities that are highly configurable, along with best-in-class dashboarding and reporting. The RSA Archer Business Continuity & IT Disaster Recovery Planning and RSA Archer Crisis Management use cases are integrated with emergency mass notification and mobile partners, to put RSA Archer in the hands of people on the move during a disaster.

 

We sincerely thank our customers for sharing their valuable insights and experiences working with RSA Archer Suite with Gartner. Our community of active and enthusiastic users continue to be a driving force behind what we do, and we thank you.

 

 

 

Figure 1. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Dell RSA.

 

*Gartner, Magic Quadrant for Business Continuity Management Program Solutions, David Gregory, Roberta Witty, 12 September 2019

 

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Filter Blog

By date: By tag: