1touch.io DLM Pro | Archer Data Governance Archer Third Party Catalog Archer Third Party Risk Management | Implementation Guide | - |
Allied Media Digital Testing and Controls Automation | Archer IT Controls Assurance Archer Issues Management | Implementation Guide | - |
Allied Media Michelle: AI Digital Agent | Archer Third Party Catalog Archer Third Party Engagement | Implementation Guide | - |
Apparity EUCA Risk Discovery and Analysis | Archer Data Governance | Implementation Guide | Installation Package |
AWS IAM Access Analyzer  | Archer Issues Management | Implementation Guide | Installation Package |
AWS Security Hub  | Archer Issues Management Archer IT Controls Assurance | Implementation Guide | Installation Package |
Axonius Cybersecurity Asset Management  | Archer Audit Engagements & Workpapers Archer Third Party Governance Archer Business Continuity and Disaster Recovery Planning Archer IT Controls Assurance Archer IT Security Vulnerability Program Archer IT Risk Management Archer Cyber Incident & Breach Response Archer PCI Management Archer Information Security Management System (ISMS) Archer Data Governance | Implementation Guide | Installation Package |
BigID Data Mapper | Archer Data Governance | Implementation Guide | Installation Package |
BitSight Security Ratings | Archer Third Party Catalog | Implementation Guide | Installation Package |
Bloomberg Law | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
Centers for Medicare and Medicaid Services (CMS) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Compliance.ai | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
CyberArk Privileged Access Security | Archer Platform | Configuration Guide | CyberArk Marketplace |
CyberSponse CyOPs | Archer Security Incident Management | Implementation Guide | - |
Cymulate Breach & Attack Simulation | Archer Cyber Incident & Breach Response | Implementation Guide | Installation Package |
Cysiv Command | Archer Cyber Incident & Breach Response | Implementation Guide | - |
Demisto Enterprise | Archer Security Incident Management | Implementation Guide | - |
Digital Defense, Inc. Frontline Vulnerability Manager | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
Emergynt Instinct Engine | Many | Implementation Guide | - |
erwin EDGE Platform | Many | Implementation Guide | - |
Everbridge | Archer Crisis Management | Implementation Guide | Installation Package |
Federal Deposit Insurance Corporation (FDIC) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Federal Trade Commission (FTC) Data Feed | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
Financial Accounting Standards Board (FASB) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Global-Regulation International Law Search | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
GovTrack Data Feed Content | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Gurucul | Archer Security Incident Management | Implementation Guide | Installation Package |
KONEXUS | Archer Business Continuity and IT Disaster Recovery Planning Archer Crisis Management | Implementation Guide | KONEXUS Connector Service Installation Package Archer Business Resiliency Use Case Updates Installation Package |
LexisNexis Regulatory Compliance  | Archer Policy Program Management Archer Corporate Obligations Management | Implementation Guide | Installation Package |
LexisNexis Regulatory Compliance - Enhanced Content  | Archer Policy Program Management | Implementation Guide | Installation Package |
LogicHub | Archer Security Incident Management | Implementation Guide | - |
Mendix | Many | Implementation Guide | Installation Package |
Monetary Authority of Singapore (MAS) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
NIST National Vulnerability Database (NVD) | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
Office of the Comptroller of the Currency (OCC) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Palisades @ Risk | Archer Operational Risk Management | Implementation Guide | Installation Package |
Panaseer Platform | Archer IT Controls Assurance Archer Key Indicator Management | Implementation Guide | Installation Package |
Panorays | Archer Third Party Catalog | Implementation Guide | Installation Package |
Perceptive Control Solutions - Audit Prodigy | Archer Audit Engagements & Workpapers | Implementation Guide | - |
Qualys Asset Discovery  | Many | Implementation Guide | Installation Package |
Qualys Vulnerability Management  | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
RapidRating Portfolio Health | Archer Third Party Catalog Archer Third Party Governance | Implementation Guide | Installation Package |
Recorded Future Third Party Risk | Archer Third Party Catalog | Implementation Guide | Installation Package |
| | | |
Recorded Future Vulnerability Enrichment Feed | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
Redis | Archer Platform | Documentation | Downloads |
Regology Regulatory Change Management  | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
Reserve Bank of India (RBI) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Risk Based Security VulnDB | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
RiskLens  | Archer IT Risk Management Archer Top-Down Risk Assessment Archer Information Security Management System Archer Operational Risk Management | Implementation Guides available for RiskLens Gen2 Release 6.2 P3 and RiskLens Gen3 Release 6.8 | Installation Packages available for RiskLens Gen2 Release 6.2 P3 and RiskLens Gen3 Release 6.8 |
RiskRecon Third Party Security Risk Monitoring  | Archer Third Party Catalog Archer Third Party Engagement Archer Issues Management | Implementation Guides available for 6.4 SP1 P1 and 6.7 | Packages available for 6.4 SP1 P1 and 6.7 |
RiskRecon Own Enterprise Monitoring  | Archer IT Security Vulnerabilities Program Archer Third Party Security Risk Monitoring | Implementation Guides available for Archer release 6.4 SP1 P1 and 6.7 | Installation Packages available for Archer release 6.4 SP1 P1 and 6.7 |
RSA Identity Governance & Lifecycle User Provisioning | - | Application Guide | Blueprint Repository |
Scaleout StateServer | Archer Platform | User Guide | - |
SecurityScorecard | Archer Third Party Catalog | Implementation Guide | Installation Package |
Securonix Snypr | Archer Security Incident Management | Implementation Guide | Installation Package |
SirionLabs CLM | Archer Third Party Catalog | Implementation Guide | Installation Package |
SOFTwarfare KillerAppz | Archer IT Security Vulnerabilities Program | Implementation Guide | - |
Splunk> Phantom | Archer Security Incident Management | Implementation Guide | - |
Supply Wisdom | Archer Third Party Catalog | Implementation Guide | Installation Package |
Swimlane | Archer Security Incident Management | Implementation Guide | - |
Symantec Control Compliance Suite | Archer IT Controls Assurance Archer IT & Security Policy Program Management | Implementation Guide | Installation Package |
Tableau Web Data Connector | - | Implementation Guide | Installation Package |
Tenable.sc Asset Discovery  | Many | Implementation Guide | Installation Package |
Tenable.sc Vulnerability Management  | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
Thomson Reuters Regulatory Intelligence  | Archer Corporate Obligations Management | Implementation Guide | Installation Package |
ThreatConnect | Archer Cyber Incident & Breach Response | Implementation Guide | - |
ThreatQuotient ThreatQ | Archer Cyber Incident & Breach Response | Implementation Guide | - |
ThreatWatch  | Archer IT Security Vulnerability Management | Implementation Guide | Installation Package |
Unified Compliance Framework Common Controls Hub  | Archer Policy Program Management | Implementation Guide | Installation Package |
U.S. Computer Emergency Readiness Team (US-CERT) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
U.S. Department of Homeland Security (DHS) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
U.S. Department of Health and Human Services (HHS) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
U.S. Department of the Treasury Specially Designated National and Blocked Persons List | Archer Third Party Catalog Archer Third Party Engagement Archer Issues Management | Implementation Guide | Installation Package |
U.S. Securities and Exchange Commission (SEC) Data Feed | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Venminder Third Party Risk Management | Archer Third Party Catalog | Implementation Guide | Installation Package |
Veracode Platform Integration | Archer IT Security Vulnerabilities Program | Implementation Guide | Installation Package |
Wolters Kluwer Regulatory Data Feed  | Archer Corporate Obligations Management Archer IT Regulatory Management | Implementation Guide | Installation Package |
Wolters Kluwer NILS INsource | Archer Corporate Obligations Management | Implementation Guide | Installation Package |