Archer

Archer

RSA Security
+
+

Related Products

  • Predict360
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • JSCAPE MFT Server
    186 Ratings
    Visit Website
  • WorkBright
    424 Ratings
    Visit Website
  • flowdit
    26 Ratings
    Visit Website
  • MOVEit
    621 Ratings
    Visit Website
  • Qualio
    841 Ratings
    Visit Website
  • Interfacing Integrated Management System (IMS)
    71 Ratings
    Visit Website

About

CIMCON Software minimizes operational risks inherent in end-user computing (EUC) files. Risks include regulatory reporting errors, non-compliance, cyber risk, and fraud. EUCs include documents such as spreadsheets, models, Access databases, scripted applications using VBScript, R, Python and self-service analytics tools such as Tableau and QlikView. Banks rely heavily on end-user computing applications (EUCs) such as Excel spreadsheets and scripts for day to day operations because they allow users to react quickly to changing market conditions or regulations. Whether they are used for creating financial models, finance, accounting or complying with regulatory requirements, they need to be managed effectively. CIMCON Software offers solutions that create an inventory of all EUCs in your organization, identify the most critical files, detect errors; provide a visual map of data dependencies, and provide on-going monitoring and control of your most important EUCs.

About

Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies in need of a complete Cyber Risk Management solution to reduce end user computing and model risk across entire life cycle

Audience

Organizations that need an integrated risk management platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CIMCON Software
Founded: 1988
United States
www.cimcon.com

Company Information

RSA Security
Founded: 1982
United States
www.archerirm.com

Alternatives

Alternatives

Predict360

Predict360

360factors
ClusterSeven

ClusterSeven

Mitratech
GOAT Risk

GOAT Risk

GOAT Risk™
Onspring

Onspring

Onspring GRC Software

Categories

Categories

GRC Features

Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management

Integrated Risk Management Features

Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management

Integrations

A10 Defend DDoS Mitigator
BitSight
CognitiveScale Cortex AI
Common Controls Hub
Cyble
Fidelis Halo
Imperva DDoS Protection
IrisAPT
IrisPOS
OctoXLabs
Panaseer
Polarity
Proofpoint Adaptive Email Security
RadiantOne
Recorded Future
SD Elements
Scuba Database Vulnerability Scanner
Swimlane
ThreatConnect Risk Quantifier (RQ)
ThreatWatch

Integrations

A10 Defend DDoS Mitigator
BitSight
CognitiveScale Cortex AI
Common Controls Hub
Cyble
Fidelis Halo
Imperva DDoS Protection
IrisAPT
IrisPOS
OctoXLabs
Panaseer
Polarity
Proofpoint Adaptive Email Security
RadiantOne
Recorded Future
SD Elements
Scuba Database Vulnerability Scanner
Swimlane
ThreatConnect Risk Quantifier (RQ)
ThreatWatch
Claim CIMCON Software and update features and information
Claim CIMCON Software and update features and information
Claim Archer and update features and information
Claim Archer and update features and information