RSA Archer® Third Party Risk Management

Build and execute risk assessments to help manage third-party relationships.

  • Execute standardized risk assessments to understand inherent risk.
  • Evaluate contract risks and financial wherewithal.
  • Capture, analyze and manage supplemental documentation from third parties.
  • Capture and assess fourth-party risk.
Third Party Risk Management

Data Sheet

RSA Archer Third Party Risk Management

This data sheet provides an overview of the RSA Archer Third Party Risk Management use case for the RSA Archer Third Party Governance solution.

Get the Data Sheet


Document Management

Document Management

Captures and stores supplemental documents, such as SSAE-16s, financial statements and PCI assessments, and monitors when refreshed documents are due.



Provides a consistent approach for evaluating third-party controls and risk scoring.

Escalation Process

Escalation Process

Facilitates an organized, managed process for escalating third-party issues.

Fourth-Party Visibility

Fourth-Party Visibility

Tracks declared critical fourth-party relationships as well as your third parties’ methods for governing their third parties.


Provides a methodical and standardized approach for third-party risk assessments.

Improves management and mitigation of identified third-party issues.

Facilitates faster, more definitive responses to emerging vendor risks.

Reduces the occurrence of third-party related incidents and losses.

Cuts the cost and time it takes to resolve issues.

Leads to a reduction in repeat audit and regulatory findings.

RSA Archer Third Party Governance

Watch to learn how RSA Archer Third Party Governance helps you reduce risks inherited from third parties to the extended enterprise and supply chain and monitor performance of key vendors and suppliers.

"RSA Archer has brought many siloes together and we’re finding that linking business continuity to security and vendor risk provides a more comprehensive risk picture. These teams can connect what they’re doing, and we’re all on the same page now."
​Joe Watkins
Director of Technology Risk Management

Federal Home Loan Bank of Atlanta



Protecting Today’s Complex IT Infrastructures with RSA Business-Driven Security™ Solutions

This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.

Watch the Webcast


E-Book Compilation with Compliance Week: Playing the Game of Third-Party Risk

This compilation of five articles looks at supply chain risk, due diligence practices in emerging markets, and includes an interview with The Home Deport's vice president of internal audit and corporate compliance.

Read the E-Book


White Papers

  • Breaking Through the Value Ceiling Have GRC technologies reached the limits of their enterprise value? This paper uses the RSA Archer GRC reference architecture to answer that question.

Data Sheets


  • OCEG Infographic: The Journey to Advantaged GRC As organizations mature their approach to GRC, they transition from a structure of siloed departments and units to a fully engaged business operation. In a mature state, everyone has a part in managing risk, ensuring compliance and contributing to performance outcomes.

Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.