RSA Archer® Continuous Monitoring
Prioritize security risk data and automate control assessments.
- Enhance FISMA and OMB compliance activities by verifying that information systems abide by authorization agreements and operate within acceptable levels of risk.
- Provide a faster, more targeted response to emerging risks.
- Use reporting and workflow to focus limited resources on remediation efforts that provide the greatest benefit.
Reduced exposure time
Increased visibility and better decision making.
Increased confidence based on current data.
Reduced risk overall
More current risk data.
Hardware and Software Inventories
Maintain up-to-date, authoritative lists of all the hardware and software in your environment that must be monitored for defects and vulnerabilities that create security risks.
Common Data Formats
Integrate scanner and sensor data from different tools and vendors into a centralized system using common data formats.
Defect Tracking and Remediation
Address defects more efficiently and prevent them from falling through the cracks.
Monitor and score individual defects and aggregate them at each level of business hierarchy, from the individual device up to the departmental level.
Scoring and Ranking Algorithms
Allow information assurance (IA) teams to designate a risk score for each defect, making it easier to prioritize remediation efforts that confer the greatest benefits.