Skip navigation
Log in to follow, share, and participate in this community.

Recent Activity

Susan Read-Miller
Click to view content  Looking for a specific RSA Exchange offering? The tables below provide a list of all available RSA Exchange offerings. Please note that videos, implementation guides and implementation packages require login access to the RSA Archer Community.    App-PacksApp-Pack Name and Overview Video Demonstration Implementation Guide Installation Package…
in RSA Exchange for RSA Archer
Susan Read-Miller
Click to view content  Rapid7 Nexpose provides live vulnerability management and endpoint analytics to view real-time risk. Clients can continuously identify and assess risk across cloud, virtual, remote, local, and containerized infrastructures. RSA Archer’s integration into Rapid7 Nexpose utilizes InsightVM's RESTful API v3.   The integration of Rapid7 Nexpose…
in RSA Exchange for RSA Archer
Susan Read-Miller
Click to view contentAs the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable.sc provides your organization the ability to accurately identify, investigate, and prioritize vulnerabilities.  With Tenable.sc you get a real-time,…
in RSA Exchange for RSA Archer
Susan Read-Miller
In the RSA Exchange R6 release, we introduced the RSA Archer Speak Up app-pack which empowers your first line of defense to Speak Up regarding concerns in the form of ideas, issues, or complaints.  Using the RSA Archer Speak Up app-pack, your employees don't have to worry about how to classify the information or where to submit it and you can… (Show more)
Susan Read-Miller
Thorough due diligence is a necessity when entering into an agreement or contract with another party, especially in the case of mergers and acquisitions.  However, due diligence activities can apply to any business situation requiring an investigation where proof that a "diligent" effort was put forth to obtain pertinent information in a… (Show more)
Susan Read-Miller
Recent high profile cyber attacks demonstrate that cyber incidents can significantly affect capital and earnings. Cyber incidents can have financial, operational, legal, and reputational impact. Costs may include forensic investigations, public relations campaigns, legal fees, consumer credit monitoring, and technology changes. As such,… (Show more)
Susan Read-Miller
Click to view content  As the organization’s business processes change and improve to meet business demands, it is sometimes necessary to change the advanced workflow business flow for an application.  When an advanced workflow process change is ready to be deployed, there are situations where a large number of jobs in the existing workflow process need to be…
in RSA Exchange for RSA Archer
Susan Read-Miller
Summary: RSA announces availability of RSA Exchange Release R7. Details: RSA Exchange Release R7 includes new and updated offerings:   App-Packs – pre-built applications addressing adjacent or supporting Integrated Risk Management processes (e.g. niche, industry, geo-specific) Aujas Duplicate Findings Prevention avoids duplicate open findings… (Show more)
Susan Jessee
Today, we’re pleased to announce availability of RSA Exchange Release R7, which introduces 10 new and two updated offerings, as well as new and updated content. We're thrilled that our RSA Exchange Technology Partners continue to develop and deliver innovation for RSA Archer customers via the RSA Exchange, and look forward to much more in future… (Show more)
Susan Read-Miller
Click to view contentAujas is a cybersecurity engineering specialist, helping organizations manage information security risks by protecting data, software, systems and identities in alignment with best practices and compliance requirements.  One of our services focuses on assisting in the design, deployment, configuration, integration and management of RSA Archer…
in RSA Exchange for RSA Archer
Load more items