Cyber Incident & Breach Response

Archer Cyber Incident and Breach Response enables you to centrally catalog organizational and IT assets, establishing business context to drive incident prioritization and implement processes designed to escalate, investigate and resolve declared incidents. The use case is designed for teams to work through defined incident response and triage procedures in preparation for a potential data breach.

Built-in workflows and reporting are designed for security managers to stay on top of the most pressing issues and streamline processes. Issues related to a declared incident investigation can be tracked and managed in a centralized portal that provides full visibility and reporting. If an incident escalates into a data breach, pre-built workflows and assessments are designed to help the broader business team work with the security team to respond appropriately.

With Archer Cyber Incident & Breach Response, declared cyber and security events can be escalated quickly and consistently. Advanced workflow and insight to the velocity of declared cyber and security incidents allow more efficient utilization of security team resources, resulting in faster response, analysis and closure rates for critical security incidents. With improved processes and capabilities, the security team can more effectively leverage existing infrastructure -- such as SIEMs, log and packet capture tools, and endpoint security technologies -- to focus on the most impactful incidents. These capabilities improve security team preparedness in the case of serious incidents involving potential data breaches, increasing the return on infrastructure investments while lowering overall security risk.

For the key features and benefits of this use case, see the Data Sheet on the Archer Community: https://community.rsa.com/docs/DOC-40093

Get started