Manage the Internal Audit Lifecycle

A consistent, risk-based approach can help you execute your internal audit program with greater efficiency while meeting the needs of your senior management team and audit committee.

Manage the Internal Audit Lifecycle

As the responsibilities of internal audit groups expand, we provide targeted products and services to help these teams meet rising performance expectations through our RSA Archer® and RSA SecurID® portfolios.

RSA Archer® Audit Management

RSA Archer® Audit Management

Take control of the complete audit lifecycle with improved governance of internal audit activities and integration with risk management and compliance functions.

RSA Risk Management Practice

Implementation, support and advisory services that assist with internal audit transformation.

RSA SecurID® Suite

Identity and access management solution that provides a detailed audit trail by tracking who has access to what, when access was requested, by whom, if/when access was granted, and by whom.

Benefits

Get visibility into key risks and underperforming internal controls with real-time dashboards that help identify gaps and ensure internal audit teams are achieving their plans.

​Improve collaboration with business partners in risk management and compliance functions.

​Out-of-the-box best practices aligned with the latest Institute of Internal Audit (IIA) standards and Committee of Sponsoring Organizations (COSO) framework.

Meet demands from top executives, audit committees, regulators and other governing bodies for a risk-based audit approach.

Automate your entire audit process (audit entities, audit planning, engagements, findings) and consolidate it into one system.

Resources

White Papers
E-Books
  • Identity Crisis: Authenticating Users in Today's Changing Environment Identity and access management tools and processes have come a long way, but enterprises face increasing challenges when it comes to authenticating users from both personal and corporate networks and devices. The task of authenticating users will only increase as mobile use increases and IP protocols spread to other areas of the organization.
Videos
  • Integrating Identity and Authentication Events to Improve SIEM Threat Detection Most organizations have implemented SIEM as well as identity and access management technologies. But, are these systems talking to each other? Join RSA and Ultimate Windows Security to learn about the event information generated by access management and authentication technologies and how that data can be leveraged once it’s in your SIEM.
  • Tackling Identity Risks in Today's Modern IT Landscape In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s seamless and easy for our users. Learn how to get a grasp on identity risk and mitigate the risk of any breaches, audit failures and business slowdowns.
  • 6 Keys to Successful Identity Assurance Now that so many applications have moved to the cloud, and users continue to embrace mobility, your organization must work toward fully embracing the new opportunities this boundaryless world presents. It’s time to shift traditional thinking away from authentication as a static one-time event and move towards a more modern authentication strategy that doesn’t require a trade-off between security and convenience. Join RSA Identity expert, Jason Oeltjen, to learn about the six key elements to consider when implementing a successful identity assurance strategy at your organization. You’ll walk away with the knowledge to end the tug of war between the need for security and convenience.
  • Addressing the Identity Risk Factor in the Age of “Need It Now” In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. Ultimately, we need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s completely seamless and easy for our users.

The [RSA Archer] Audit Management and Compliance Management solutions support the organization's auditing efforts and compliance responsibilities by providing an automated, centralized platform for accessing information about previous assessments and managing those which are ongoing or due in the future. As well as supporting enterprise-wide compliance initiatives, these products also reinforce greater accountability and better working practices within individual business units through assessments focused on individual managers and delivery teams.

​HCL Technologies