RSA Archer® Third Party Governance

Mitigate third-party risks and monitor performance

  • Automate and streamline oversight of third-party relationships
  • Get an accurate picture of third-party risk and prioritize the ones that matter most
  • Fulfill regulatory obligations related to third-party management
Third Party Governance

RSA Archer Third Party Governance

Learn how RSA Archer Third Party Governance can help you reduce risks inherited from third parties to the extended enterprise and supply chain and monitor performance of key vendors and suppliers.


Solution Brief

RSA Archer Third Party Governance

Find out how RSA Archer Third Party Governance can help your organization identify, assess, monitor and treat these risks consistently across all of your lines of business.

Read the Solution Brief


Elucidates Third-Party Relationships

Catalog and assess which third parties your organization is using and how much risk they pose. Understand your third- and fourth-party dependencies to prevent surprises.

Facilitates Third-Party Monitoring

Stay current with new or updated vendor relationships and monitor material changes to existing relationships. Ensure that no material risks exist.

Enables Consistent Management

Consistently evaluate third-party risks and apply controls, risk treatments and transfer techniques in accordance with your organization's risk tolerance.

Drives Accountability for Third-Party Risk

Track the individuals in your organization responsible for each vendor relationship, along with key contacts at each vendor company, in a single system.

RSA Archer Third Party Governance

Explore the Use Cases

RSA Archer Third Party Catalog

Document all of your organization’s third-party relationships and associated contracts, as well as the business units and named individuals in your organization who are responsible for each relationship. Use a single repository to aggregate all third-party information.

RSA Archer Third Party Risk Management

Leverage a series of risk assessment questionnaires to assess third parties’ control environments and collect relevant supporting documentation for further analysis. Analyze the results of these questionnaires to determine your organization’s residual risk across several categories.

RSA Archer Third Party Governance

Perform integrated third-party risk and performance management. Document performance metrics and service level agreement metrics for each third-party product and service to ascertain whether each engagement is delivering expected performance.

RSA Archer Third Party Engagement

Gain a holistic understanding of your organization’s dependency on various third parties across all of your business units. Catalog the products and services they deliver to your organization according to each business process and business unit they support.

RSA Archer Third Party Security Risk Monitoring

Assess third-party security risks quickly and more accurately with continuous, automated visibility into your vendors’ IT landscape. Get actionable, objective insights about the third-party security issues that pose the greatest risk to your business.

"We chose RSA Archer because of its ability to bring several platforms together. We can tie our vendor due diligence into the risks and controls surrounding that vendor, and then tie it into business continuity so that we know if a vendor fails what the impact would be to the bank. ... That ability to create a sort of GRC universe at Berkshire Bank was what attracted us to the [RSA] Archer tool."
​Melissa Taylor
AVP, GRC Officer

Berkshire Bank


RSA Archer Maturity Model Snapshot: Third Party Governance

RSA Archer Maturity Models guide organizations through the journey from baseline risk management to optimized processes that balance opportunities and risks. View the Maturity Model Snapshot to discover the stages of maturing your third-party management.

Read the White Paper


Protecting Today’s Complex IT Infrastructures with RSA Business-Driven Security™ Solutions

This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.

Watch the Webcast



White Papers

  • Breaking Through the Value Ceiling Have GRC technologies reached the limits of the enterprise value they can provide? This paper uses the RSA Archer reference architecture to answer that question.
  • Four Paths to Managing Third-Party Risk in the Digital Era Third-party risk is a multifaceted challenge, and successfully managing it requires an integrated, multifaceted approach. Learn the four vital issues organization must address in their effort to successfully manage third-party risk relationships.

Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.