Manage the Internal Audit Lifecycle

A consistent, risk-based approach can help you execute your internal audit program with greater efficiency while meeting the needs of your senior management team and audit committee.

Manage the Internal Audit Lifecycle

As the responsibilities of internal audit groups expand, we provide targeted products and services to help these teams meet rising performance expectations through our RSA Archer® and RSA SecurID® portfolios.

RSA Archer® Audit Management

Take control of the complete audit lifecycle with improved governance of internal audit activities and integration with risk management and compliance functions.

RSA Risk Management Practice

Implementation, support and advisory services that assist with internal audit transformation.

RSA SecurID® Suite

Identity and access management solution that provides a detailed audit trail by tracking who has access to what, when access was requested, by whom, if/when access was granted, and by whom.

Benefits

Get visibility into key risks and underperforming internal controls with real-time dashboards that help identify gaps and ensure internal audit teams are achieving their plans.

​Improve collaboration with business partners in risk management and compliance functions.

​Out-of-the-box best practices aligned with the latest Institute of Internal Audit (IIA) standards and Committee of Sponsoring Organizations (COSO) framework.

Meet demands from top executives, audit committees, regulators and other governing bodies for a risk-based audit approach.

Automate your entire audit process (audit entities, audit planning, engagements, findings) and consolidate it into one system.

Resources

Analyst Reports

  • Survey Report - Identity and Access Management Current Gaps Point to Needed Improvements This report discusses the critical role of having an Identity and Access management (IAM) technology plan in place is for today’s organizations. On behalf of RSA, an independent survey was conducted with over 170 IAM influencers and decision-makers weighing in on the challenges, compliance issues and top of mind concerns on protecting your most important assets and creating secure user access. What does a new and better approach to enterprise IAM, the strategy and execution look like? Learn more about new IAM capabilities, the need for better security, audit performance and end-user access in this thought provoking study.

White Papers

E-Books

  • Identity Crisis: Authenticating Users in Today's Changing Environment Identity and access management tools and processes have come a long way, but enterprises face increasing challenges when it comes to authenticating users from both personal and corporate networks and devices. The task of authenticating users will only increase as mobile use increases and IP protocols spread to other areas of the organization.
  • User Authentication Trends The landscape of user authentication is changing rapidly—and radically. A vanishing perimeter and increase in cloud-based applications and mobile devices are blurring the boundaries around organizations and networks. In this ever-changing threat landscape, both IT and the line of business users are facing an increasing list of challenges. Download this new eBook from RSA to learn how to address today’s most popular authentication questions.

Use Case

  • RSA SecurID® Access: Cloud Access Use Case RSA’s pure cloud multi-factor authentication solution helps a financial services company meet the needs of its highly mobile user base while improving audit performance.

Videos

  • Integrating Identity and Authentication Events to Improve SIEM Threat Detection Most organizations have implemented SIEM as well as identity and access management technologies. But, are these systems talking to each other? Join RSA and Ultimate Windows Security to learn about the event information generated by access management and authentication technologies and how that data can be leveraged once it’s in your SIEM.
  • Tackling Identity Risks in Today's Modern IT Landscape In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s seamless and easy for our users. Learn how to get a grasp on identity risk and mitigate the risk of any breaches, audit failures and business slowdowns.
  • 6 Keys to Successful Identity Assurance Now that so many applications have moved to the cloud, and users continue to embrace mobility, your organization must work toward fully embracing the new opportunities this boundaryless world presents. It’s time to shift traditional thinking away from authentication as a static one-time event and move towards a more modern authentication strategy that doesn’t require a trade-off between security and convenience. Join RSA Identity expert, Jason Oeltjen, to learn about the six key elements to consider when implementing a successful identity assurance strategy at your organization. You’ll walk away with the knowledge to end the tug of war between the need for security and convenience.
  • Addressing the Identity Risk Factor in the Age of “Need It Now” In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. Ultimately, we need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s completely seamless and easy for our users.
  • What's New in RSA SecurID® Access RSA SecurID Access, the world’s most widely deployed multi-factor authentication (MFA) solution, helps to secure access in a world without boundaries. RSA SecurID Access provides convenient, secure access to on-premises, web, mobile and cloud applications, and eliminates access blind spots by giving you visibility into and control over access across your organization. Watch our webinar to learn about the latest offerings and enhancements from RSA SecurID Access.
  • Webinar: User Authentication Trends 2017 The landscape of user authentication is changing rapidly. A vanishing perimeter and the continuing explosion of cloud-based applications and mobile devices are blurring old boundaries—creating more islands of identity and forcing organizations to reimagine identity and access strategies. Join RSA’s Identity expert, Tony Karam, to learn more about the user authentication trends of 2017 and how to address some of the most popular authentication questions.
"The [RSA Archer] Audit Management and Compliance Management solutions support the organization’s auditing efforts and compliance responsibilities by providing an automated, centralized platform for accessing information about previous assessments and managing those which are ongoing or due in the future. As well as supporting enterprise-wide compliance initiatives, these products also reinforce greater accountability and better working practices within individual business units through assessments focused on individual managers and delivery teams."
​HCL Technologies