ArcherRSA Security
|
||||||
Related Products
|
||||||
About
CIMCON Software minimizes operational risks inherent in end-user computing (EUC) files. Risks include regulatory reporting errors, non-compliance, cyber risk, and fraud. EUCs include documents such as spreadsheets, models, Access databases, scripted applications using VBScript, R, Python and self-service analytics tools such as Tableau and QlikView. Banks rely heavily on end-user computing applications (EUCs) such as Excel spreadsheets and scripts for day to day operations because they allow users to react quickly to changing market conditions or regulations. Whether they are used for creating financial models, finance, accounting or complying with regulatory requirements, they need to be managed effectively. CIMCON Software offers solutions that create an inventory of all EUCs in your organization, identify the most critical files, detect errors; provide a visual map of data dependencies, and provide on-going monitoring and control of your most important EUCs.
|
About
Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies in need of a complete Cyber Risk Management solution to reduce end user computing and model risk across entire life cycle
|
Audience
Organizations that need an integrated risk management platform
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCIMCON Software
Founded: 1988
United States
www.cimcon.com
|
Company InformationRSA Security
Founded: 1982
United States
www.archerirm.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
GRC Features
Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management
Integrated Risk Management Features
Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
|
||||||
Integrations
A10 Defend DDoS Mitigator
BitSight
CognitiveScale Cortex AI
Common Controls Hub
Cyble
Fidelis Halo
Imperva DDoS Protection
IrisAPT
IrisPOS
OctoXLabs
|
Integrations
A10 Defend DDoS Mitigator
BitSight
CognitiveScale Cortex AI
Common Controls Hub
Cyble
Fidelis Halo
Imperva DDoS Protection
IrisAPT
IrisPOS
OctoXLabs
|
|||||
|
|
|