RSA Archer and Axonius are competing solutions in IT security and risk management. RSA Archer is preferred for its robust risk management capabilities, while Axonius is favored for comprehensive asset visibility and integration capabilities.
Features:RSA Archer stands out for advanced workflow customization, policy management, and its robust governance features. It offers seamless integration with multiple data systems and a strong focus on governance. Axonius excels in asset management, providing comprehensive visibility and integration capabilities with various security systems. It offers efficient automation and easy integration with multiple security tools, enhancing its asset management features.
Room for Improvement:RSA Archer could benefit from simplifying its setup process and improving ease of customization to make it more accessible to users with varied technical skills. Its pricing model can also use more transparency for smaller enterprises. Axonius could enhance its query-building tools for more flexibility, improve reporting features, and expand support for even more IT security tools to cover emerging platforms and technologies.
Ease of Deployment and Customer Service:RSA Archer provides flexible deployment with strong customer support but often involves a more complex setup process. Axonius offers a streamlined deployment process with effective integration capabilities and responsive support, providing an edge in ease of deployment.
Pricing and ROI:RSA Archer's pricing is higher due to extensive customization options but promises strong ROI for organizations focused on comprehensive risk management. Axonius has a straightforward pricing model, delivering faster ROI through quick deployment and scalability, making it attractive for those prioritizing asset management and security integration.
Axonius offers robust asset management, enhancing network visibility by consolidating data from various devices. It excels in automatic device categorization for up-to-date inventories, crucial for compliance and risk assessments. Key features include automated policy enforcement and comprehensive reporting tools, which streamline workflows and improve organizational productivity and security compliance. Integrations with other IT tools further enhance its efficiency.
RSA Archer is a solution designed to help your organization manage policies, controls, risks, assessments, and deficiencies across your lines of business. RSA helps you manage your digital risk with a range of capabilities and expertise including integrated risk management, threat detection and response, identity and access management, as well as fraud prevention.
The solution also allows you to adapt a broad range of solutions to your requirements and is a good option for both big and small companies.
RSA Archer Features
RSA Archer has many valuable key features. Some of the most useful ones include:
RSA Archer Benefits
There are many benefits to implementing RSA Archer. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the RSA Archer solution.
A Specialist, RSA Archer at a tech services company, says, “RSA Archer is a valuable tool because it can manage the end-to-end functioning of any enterprise GRC module, such as compliance and risk management or business continuity plans and the entire BCM module. RSA Archer also provides many out-of-the-box solutions, which are use cases derived from the standards for GRC or risk management, governance, and compliance. It provides an end-to-end mechanism for business users on a single platform. That includes reporting, managing workflow, creating documentation, or tracking a process where you need to get approval from the various levels within the organization's hierarchy.”
PeerSpot user Krishnendu S., Vice President at a financial services firm, mentions, "It is enterprise-wide accessible. So, it is very helpful for all the employees in our bank. They can log in and do their risk management activities. It has a few inbuilt modules that are helpful for doing risk management activities, such as issue management, risk identification, risk assessment, and policy exception management. It also has some inbuilt workflows inside these modules. They are also helpful."
A Sr. Internal Auditor at an energy/utilities company comments, "Its user interface is pretty neat, and there is flexibility in generating the data. You can customize reports at any level. You can directly get reports in Tableau format. If you want to generate statistical data, you can create reports with graphs. There is an adequate amount of flexibility for changing the format, the type of graphs, etc."
Another PeerSpot user, Manash B., Technology Manager at a tech services company, explains, "RSA is a very rich application. I like its adaptive suggestion, where based on your users and the class of data, it can actually recommend you the proper control to choose. For example, we have been using PCI DSS as an NIST. So based on application feedback, it will provide you with a suggestion on which control objective needs to be set. Based on that, you can make a decision—you don't need to take the suggestion, but you can customize that particular provided suggestion. RSA Archer's workflow is also good, in terms of process automation."
We monitor all IT Vendor Risk Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.