RSA Archer® Third Party Engagement

Manage engagements and contracts with third parties

  • Establish accountability for each third party and their product and service engagements.
  • Manage contracts and services agreements and execute contract risk assessments.

Featured Resource

Data Sheet

RSA Archer Third Party Engagement

This data sheet provides an overview of the RSA Archer Third Party Engagement use case for the RSA Archer Third Party Governance solution.

Get the Data Sheet

Features

icon-remediation-plan-monitoring-blue-80px

Remediation Plan Monitoring

Facilitates the documentation and monitoring of remediation plans to bring risk within acceptable tolerance and track exceptions related to third-party engagements.

icon-2-3-new-users-sid-blue-80

Cataloging Capabilities

Lets you catalog third parties, their business hierarchy, and the products and services they deliver to your organization.

icon-holistic-third-party-profiles-blue-80px

Holistic Third-Party Profiles

Rolls up engagement risk assessments to provide an overall third-party risk profile.

icon-proof-of-insurance-blue-80px

Proof of Insurance

Captures third parties proof of insurance and evaluates the adequacy of the insurance relative to all of the engagements with your organization.

icon-risk-assessments-blue-80px

Risk Assessments

Allows you to perform inherent risk assessments on engagements across seven different risk categories.

icon-third-party-mapping-blue-80px

Third Party Mapping

Maps third-party products and services to the business processes they support.

icon-multiple-user-identity-types-sid-blue-80

Fourth-Party Risk

Captures and analyzes significant fourth-party relationships.

icon-contract-catalog-blue-80px

Contract Catalog

Catalogs contracts and master services agreements associated with engagements.

Benefits

Helps to reduce the number of audit and regulatory findings your organization incurs.

Gain a better understanding of the adequacy of each third party’s proof of insurance.

Brings to light inherently high-risk third-party products, services and relationships.

Achieve greater transparency into third-party relationships using robust reporting and notifications.

Get visibility into where, how and why third parties are being used throughout your organization and who is responsible for each relationship.

Allows you to administer your third-party management program more efficiently and allocate scarce resources based on your organization's most significant priorities.

Helps your organization attest to the adequacy of its third-party governance program to senior management, the board and regulators.

RSA Archer Third Party Governance

Watch to learn how RSA Archer Third Party Governance helps you reduce risks inherited from third parties to the extended enterprise and supply chain and monitor performance of key vendors and suppliers.

"[With RSA Archer,] people are talking to each other about risk governance in a way they never did previously. The community is very active, and they’re engaging with each other proactively, which is a big win for us. It shows that the culture change, which we knew would be one of the biggest challenges of this project, is happening."
Eric Le Martret
Corporate Risk Manager

T-Systems Ltd.

Resources

Video

Protecting Today’s Complex IT Infrastructures with RSA Business-Driven Security™ Solutions

This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.

Watch the Webcast

E-Book

E-Book Compilation with Compliance Week: Playing the Game of Third-Party Risk

This compilation of five articles looks at supply chain risk, due diligence in emerging markets, and includes an interview with The Home Depot's vice president of internal audit and corporate compliance.

Read the E-Book

Data Sheets

  • RSA Archer Third Party Engagement This data sheet provides an overview of the RSA Archer Third Party Engagement use case for the RSA Archer Third Party Governance solution.

Webcasts

White Papers

  • Breaking Through the Value Ceiling Have GRC technologies reached the limits of their enterprise value? This paper uses the RSA Archer reference architecture to answer that question.

Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.