RSA Archer® Security Operations & Breach Management
Implement and manage a security operations center and improve cyber incident response.
- Centrally catalog IT assets for incident prioritization based on business context.
- Monitor key performance indicators, measure control efficacy and manage the overall security operations team.
- Focus on the highest impact incidents to lower overall security risk and react promptly and appropriately to data breaches.
Reduce your organization’s cyber risk by understanding the impact of cyber incidents on specific IT assets and business processes, and responding accordingly.
Speed cyber incident response and analysis and increase resolution rates by better allocating the security team’s time and resources.
Decrease the time it takes security operations center staff to identify and aggregate alerts, assess business impact, initiate breach response and notify all affected parties.
IT Asset Catalog
Centralized catalog of organizational and IT assets.
Central repository and taxonomy for security alerts and integration with SIEM/log/packet capture infrastructure.
Enable analysts to aggregate alerts, filter false positives, and triage and confirm incidents.
Defined security incident response procedures and breach risk assessments.
We use RSA's GRC platform for governance risk and compliance, RSA Archer, which acts as the central workflow for all of our converged security areas. So it doesn't matter whether it's incident response, cyber operations, or operational risk management: all the information and business processes flow through Archer.
Global Chief Security Officer @ ADP