Because for us
security is not just a product
It's a process.


Automate, integrate, manage and report across your enterprise

The RSA® Archer ® GRC Platform supports business-level management of enterprise governance, risk and compliance. As the foundation for all RSA Archer GRC Solutions, the Platform allows you to adapt the solutions to your requirements, build new applications and integrate with external systems without touching a single line of code. RSA Archer’s flexible strategy has won over some of the most demanding Fortune 500 companies. These businesses have seized the power of the Platform to make RSA Archer Solutions their own, modeling additional business processes in a fraction of the time it would take to develop traditional custom applications.


The RSA Archer GRC Platform is:

  • Flexible. The Platform offers a point-and-click interface for building and managing business applications. Non-technical users can automate processes, streamline workflow, control user access, tailor the user interface and report in real-time.
  • Unified. RSA provides a common platform to manage policies, controls, risks, assessments and deficiencies across lines of business. This unified approach eases system complexity, strengthens user adoption and reduces training time.
  • Collaborative. The Platform enables cross-functional collaboration and alignment. Business users across IT, finance, operations and legal domains can work together in an integrated framework using common processes and data.


Application Builder:

Tailor RSA Archer GRC Solutions to your unique methodologies, and build on-demand applications through point-and-click configuration.

Reports and Dashboards

Take advantage of RSA Archer’s pre-built reports and dashboards, and create your own with the user-friendly web interface.

Business Workflow

Define and automate business processes for streamlining the management of content, tasks, statuses and approvals.

Access Control

Enforce access controls at the system, application, record and field levels so users interact only with the information that is relevant for their roles.

User Experience

Brand the RSA Archer GRC Platform with your corporate colors, graphics and naming conventions to maximize end-user adoption and facilitate self-training.

System Integration

The vendor-neutral RSA Archer GRC Platform serves as a point of consolidation for governance, risk and compliance information of any type. The Platform allows seamless integration of data systems without the need for additional software. You can automate the movement of data into and out of the Platform to support data analysis, process management and reporting.

Mobile Capabilities

Conduct audit, risk and compliance assessments anywhere from your iOS mobile device.


RSA Archer continues to enhance the Platform for use in markets around the globe, including double-byte support. Localization provides region or language locale-specific components, and multilingual developments enable customers to support multiple languages within their RSA Archer environment.

Deployment Flexibility

RSA supports both on-premise and hosted (SaaS) deployments of the RSA Archer GRC Platform, allowing you to balance administrative control, time to value and cost considerations when planning your implementation. You have the freedom to deploy the Platform in the most appropriate environment based on your current needs and to move applications from one environment to another as your needs change.

RSA Archer Exchange

Visit the RSA Archer Exchange to take advantage of pre-built applications and integrations for the RSA Archer GRC Platform. All Exchange applications undergo stringent certification testing to ensure that they provide the quality, performance and ease of use that you require.

Product Features Benefit FireEye Network Security Essentials FireEye Network Security Power
Advanced Threat Detection
Hardened Hypervisor Provides evasion proofing Yes Yes
Multi - OS and Multi - file Support Supports heterogeneous endpoint environments for wide range of applications Yes Yes
Signature - less MVX Detection Detects attacks variants and unknown attacks Yes Yes
Signature - based IPS Detection Consolidates traditional and advanced threat detection into one device Yes Yes
Riskware Detection Categorizes non-breach malware Yes Yes
Tactical Intelligence Sharing (DTI) Faster detection of attack variants and unknown attacks Yes Yes
Advanced Threat Prevention
Real - time Inline Blocking Immediately stops attacks Yes Yes
Threat Visibility and Containment
Automated Noise Reduction Pinpoints breach-class alerts Yes Yes
Proactive Machine Learning Detects future attacks   Yes
Actionable Contextual Intelligence Facilitates containment of advanced threats   Yes
Cloud-based Event Analytics Detects threats across entire organization   Yes
Mobile VIP Threat Protection Detects mobile attacks for key employees Yes
Security Infrastructure Integration
Integrated Security Workflows Pivots from detection to response   Yes
Orchestration API Automates deployment and management   Yes