RSA Archer® Third Party Catalog

Understanding the relationships you have with third parties is critical to managing risks

  • Catalog organizational elements of your business for third-party reporting.
  • Catalog suppliers, partners, service providers and other third parties.
  • Capture important details related to third parties, including contracts.
Third Party Catalog

Data Sheet

RSA Archer Third Party Catalog

This data sheet provides an overview of the RSA Archer Third Party Catalog use case for the RSA Archer Third Party Governance solution.

Get the Data Sheet




Allows you to catalog the organization elements of your business to facilitate third-party reporting.



Catalogs suppliers, partners, service providers and other third parties, along with the products and services they provide.

Third-Party Contracts

Third-Party Contracts

Captures important details related to third parties, including contracts.



Establishes accountability for third-party relationships.

Exception Tracking

Exception Tracking

Tracks exceptions related to third-party relationships.


Gain the ability to track contract terms, including notification of key contract events, such as contract obligations and renewal and expiration dates.

​​Improves your understanding of all third-party relationships throughout the organization.

​​Reduces the time it takes to identify third-party relationships and contracts.

​Drives accountability for individual supplier relationships and accelerates identification of relationship owners.

RSA Archer Third Party Governance

Watch to learn how RSA Archer Third Party Governance helps you reduce risks inherited from third parties to the extended enterprise and supply chain and monitor performance of key vendors and suppliers.



E-Book Compilation with Compliance Week: Playing the Game of Third-Party Risk

This compilation of five articles looks at supply chain risk, due diligence in emerging markets, and includes an interview with The Home Depot's vice president of internal audit and corporate compliance.

Read the E-Book


Protecting Today’s Complex IT Infrastructures with RSA Business-Driven Security™ Solutions

This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.

Watch the Webcast


  • OCEG Infographic: The Journey to Advantaged GRC As organizations mature their approach to GRC, they transition from a structure of siloed departments and units to a fully engaged business operation. In a mature state, everyone has a part in managing risk, ensuring compliance and contributing to performance outcomes.

White Papers

  • Breaking Through the Value Ceiling Have GRC technologies reached the limits of their enterprise value? This paper uses the RSA Archer reference architecture to answer that question.


Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.