RSA Archer and Amazon Inspector are products in the risk management and security assessment category. Amazon Inspector has an upper hand in automation and integration, while RSA Archer is favored for its compliance features.
Features: RSA Archer emphasizes risk management, compliance tracking, and incident response. It provides comprehensive governance frameworks and inbuilt modules like issue management and policy exception management. Amazon Inspector focuses on continuous monitoring with automated security assessments, seamless AWS integration, and vulnerability management.
Room for Improvement: RSA Archer could enhance usability by simplifying its setup process and customization options. Its user interface, although comprehensive, can benefit from more intuitive navigation. Amazon Inspector would improve by adding support for custom compliance rules. Expanding beyond AWS-centric environments could enhance its applicability and market reach.
Ease of Deployment and Customer Service: Amazon Inspector excels in deployment within AWS environments, offering robust support through AWS services. This makes it ideal for businesses using AWS. RSA Archer is versatile but may need more time for deployment due to complexity, and its support leans more on consultancy services.
Pricing and ROI: RSA Archer generally involves higher initial costs because of customization necessities, offering significant ROI for enterprises with detailed risk management needs. Amazon Inspector has a scalable pricing model aligned with cloud usage, potentially delivering quicker ROI for businesses concentrating on cloud security assessments.
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.
Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Examples of built-in rules include checking for access to your EC2 instances from the internet, remote root login being enabled, or vulnerable software versions installed. These rules are regularly updated by AWS security researchers.
RSA Archer is a solution designed to help your organization manage policies, controls, risks, assessments, and deficiencies across your lines of business. RSA helps you manage your digital risk with a range of capabilities and expertise including integrated risk management, threat detection and response, identity and access management, as well as fraud prevention.
The solution also allows you to adapt a broad range of solutions to your requirements and is a good option for both big and small companies.
RSA Archer Features
RSA Archer has many valuable key features. Some of the most useful ones include:
RSA Archer Benefits
There are many benefits to implementing RSA Archer. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the RSA Archer solution.
A Specialist, RSA Archer at a tech services company, says, “RSA Archer is a valuable tool because it can manage the end-to-end functioning of any enterprise GRC module, such as compliance and risk management or business continuity plans and the entire BCM module. RSA Archer also provides many out-of-the-box solutions, which are use cases derived from the standards for GRC or risk management, governance, and compliance. It provides an end-to-end mechanism for business users on a single platform. That includes reporting, managing workflow, creating documentation, or tracking a process where you need to get approval from the various levels within the organization's hierarchy.”
PeerSpot user Krishnendu S., Vice President at a financial services firm, mentions, "It is enterprise-wide accessible. So, it is very helpful for all the employees in our bank. They can log in and do their risk management activities. It has a few inbuilt modules that are helpful for doing risk management activities, such as issue management, risk identification, risk assessment, and policy exception management. It also has some inbuilt workflows inside these modules. They are also helpful."
A Sr. Internal Auditor at an energy/utilities company comments, "Its user interface is pretty neat, and there is flexibility in generating the data. You can customize reports at any level. You can directly get reports in Tableau format. If you want to generate statistical data, you can create reports with graphs. There is an adequate amount of flexibility for changing the format, the type of graphs, etc."
Another PeerSpot user, Manash B., Technology Manager at a tech services company, explains, "RSA is a very rich application. I like its adaptive suggestion, where based on your users and the class of data, it can actually recommend you the proper control to choose. For example, we have been using PCI DSS as an NIST. So based on application feedback, it will provide you with a suggestion on which control objective needs to be set. Based on that, you can make a decision—you don't need to take the suggestion, but you can customize that particular provided suggestion. RSA Archer's workflow is also good, in terms of process automation."
We monitor all IT Vendor Risk Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.