Archer IT Security Vulnerabilities Program 6.9.2

Archer IT Security Vulnerabilities Program enables security teams to systematically identify and prioritize threats and vulnerabilities based on the level of risk to the business. These teams can also proactively manage IT security risks by combining asset business context, vulnerability assessment results and comprehensive workflow in 1 place. IT assets can be cataloged with a full business context overlay to prioritize scanning and response. The consolidated platform for vulnerability management enables centralized tracking and remediation of related issues.

Benefits of the IT Security Vulnerabilities Program Use Case

With Archer IT Security Vulnerabilities Program, IT security analysts can implement alerts, explore vulnerability scan results and analyze issues as they arise, to help boost the closure rate for critical gaps. The ability to research known vulnerabilities helps prioritize efforts for IT operations, resulting in reduced cost, time and effort and enhanced visibility into dangerous vulnerabilities in critical assets.

A powerful and flexible rules engine highlights new threats, overdue issues and changing business needs. For business and IT managers, a consolidated management module integrates powerful analytics with reporting, workflow and a risk-management framework to enable data-driven security decisions. Using Archer IT Security Vulnerabilities Program, organizations can effectively manage the entire vulnerability lifecycle, from detection and reporting through remediation and verification.

For the key features and benefits of this use case, see the Data Sheet on the Archer Community: https://www.archerirm.community/t5/solution-use-case-overviews/archer-solutions-amp-use-cases/ba-p/572564

How IT Security Vulnerabilities Program Fits into a Risk and Compliance Program

IT Security Vulnerabilities Program is a use case in the IT Security & Risk Management solution area. The following sections describe the use cases that IT Security Vulnerabilities Program requires as a prerequisite, which use cases you can upgrade to as your program matures, and which use cases in other solution areas you can integrate for additional business context and functionality.

Prerequisite and Next Use Cases

This following table shows how this use case fits into the overall IT & Security Risk Management solution area.

For information on these Archer use cases, see the Archer Solutions Help.

Prerequisites

What you have

What's next

Issues Management

IT Security Vulnerabilities Program

N/A

  • Establish your business hierarchy.
  • Consolidate and coordinate findings and remediation plans from risk, compliance, audits, and other assessments.
  • Manage exceptions with appropriate risk sign-off acceptance.
  • Manage scan results using a streamlined advanced workflow process.
  • Manage asset discovery with data feeds.
  • Manage vulnerability asset knowledge base.

 

Get Started