SlideShare a Scribd company logo
1 of 2
Download to read offline
Aujas RSA®
Archer®
Center of Excellence (CoE)
Overview
RSA Archer is a powerful eGRC Automation technology. Gartner, Inc. has identified
RSA Archer as the market leader for several years in a row. Numerous large
organizations have invested in RSA Archer for automating IT GRC, Vendor
Governance and even for legal and financial compliance.
While choosing RSA Archer is a ‘no brainer’, making effective use of the technology
and keeping it aligned with evolving business requirements can be a challenge.
Organizations have to contend with customization to compliance requirements,
align with complex (in some cases overlapping or legacy) processes followed by the
organization, address integration with existing point technologies and deliver all of
this in the shortest time possible.
Unfortunately most RSA Archer service providers try to capitalize on the GRC
(governance, risk and compliance) automation as a point technology and focus
primarily on one time deployment and go live. After the roll out, often keys to
maintenance and administration are handed over to a large system integrator that
perceives the eGRC suite as yet another automation application, thereby limiting the
return on investment and its promise.
Our Services
As an information risk management specialist we at Aujas understand the power
and capability of RSA Archer and provide complementary services that allows our
clients to gain maximum value out of the eGRC suite. Aujas’ RSA Archer Center of
Excellence (CoE) brings together a global team of experienced and certified RSA
Archer professionals. Leveraging the CoE, Aujas offers a wide range of services to
support our client’s eGRC journey throughout its lifecycle.
 On-demand & Readiness Advisory – this service is intended to enable our
clients to consult with our specialists on ‘conceptualizing’ and ‘blue printing’
their eGRC initiatives. Many CISOs do have questions on the ideal way
forward on the GRC automation journey and our managing consultants work
with our clients to jointly brainstorm and arrive on the best way forward.
 Solution Design and Deploy – our CoE provides the capability to design and
deploy Archer using a hybrid delivery model. Aujas managing consultants
leverage executive workshops to build a solution blueprint by involving client
stakeholders from various business functions. Post design phase Archer
technology specialists build and deploy the solution using our proprietary
‘ArcherAssure’ methodology. We also assist in migrations and version
updates.
 Customization and Enhancements – we understand that each of our clients
has unique requirements and out of the box RSA Archer may be insufficient to
RSA and Archer are registered trademarks of EMC Corporation
Copyright 2016 Aujas Information Risk Services, All Rights Reserved Page 1 of 2
Contact us:
Web: http://www.aujas.com
Email: karl.kispert@aujas.com
Phone:
North America: +1 973 229 5566
Middle East Asia: +971 6 5528438
South East Asia: +91 80 2608 7878
 Laser sharp focus on
maximizing and returns
and value from RSA
Archer initiatives
 Specialization and
domain understanding of
Governance, Risk and
Compliance
 Services and specialists
for all project stages of
RSA Archer initiatives
 State of the art service
delivery methodology
leveraging global
delivery models
Page 2 of 2Copyright 2016 Aujas Information Risk Services, All Rights Reserved
International Airport Deploys RSA Archer
We assisted our client design their compliance framework,
policies, processes, control standards and procedures and
integrate the same on RSA Archer. We also assisted them in
deploying the RSA Archer eGIC suite and build an automated
incident management system by integrating their SIEM system
with RSA Archer.
National Identity Program Deploys RSA Archer
We developed the entire GRC program for our client, ground-up,
that included the policies, procedure workflows, control
standards, vendor management processes, etc. We deployed all
nine solutions of RSA Archer, integrated them with multiple
point technologies using data feed managers and API, modeled
the workflows and dashboards. We continue to nurture the
implementation with continuous sustenance and help it evolve
with enhancements.
Large Bank Deploys RSA Archer to Integrate GRC
We deployed the entire RSA Archer eGRC suite with all the
solutions in a complex multi stakeholder environment. The
implementation required stakeholder management across
various verticals of the bank and integrated them on a single
platform. Each silo required us to create custom workflows
integration with various point technology and dashboards for
their individual leaderships.
Telecom Automates Threat & Risk Framework
We designed an integrated threat and risk management
framework that allowed our client to automatically detect new
systems on the network and trigger their risk and threat
assessment workflow. We managed the implementation of the
framework on RSA Archer eGRC suite and its integration with
HRMS, asset management, threat management technologies
and we continue to sustain and enhance the implementation.
Our Peopleaddress their requirements. Our CoE’s enhancements team provides
advanced customization capabilities around ODA (On Demand
Application) development, Archer API & Data Feed integration with
external point technologies like HRMS, ERP, threat management systems,
asset management systems, SIEM, etc.
 Continuous Sustenance – like any other technology Archer too needs to
be maintained on an on going basis, our sustenance services assist our
clients to manage, administer and keep the system up-to-date. Our
services help our clients focus on leveraging the platform while our teams
manage the solutions, users, reports, dashboards and the platform itself.
Our Value
Our CoE brings together a set of globally distributed professionals performing
various roles. The team consists of managing consultants, technical specialists
and development specialists. The team not only leverages the standardized
processes, methodologies and accelerators emerging from the CoE but they
also contribute to the body of work.
We understand that security is essential and we ensure that our CoE central
operations are ISO 27001 compliant and demonstrate our commitment to
information security. Compliance with ISO27001 standard demonstrates the
nature of our security program and provides assurance to our customers
evaluating the strength of our security practices. We have deployed some of
the best security technologies, controls and processes to protect our CoE and
our client’s interests.
Our Work
Our CoE has been founded on the rich experience of RSA Archer deployments
globally; we have supported our clients across the RSA Archer lifecycle starting
from managing the deployments to supporting and enhancing them.
We have deployed several bespoke integrations of RSA Archer wherein
purpose built frameworks were designed to address our client’s need and then
were automated on RSA Archer along with integration with external point
systems. Our RSA Archer clients are spread across globally in various industry
verticals such as enterprises, telecoms, banks, govt. and energy.
Managing Consultant
Experience in leading and delivering IT GRC and Audit
engagements for clients across industry verticals.
Extensive experience with standards and in creating RSA
Archer automation strategy, blue prints and project
management.
Business Analyst & Functional Specialist
Possesses strategic depth and vision to understand
business requirements and design processes for
implementation on RSA Archer. She has worked with
Fortune 500 clients with banking, Insurance & technology
companies.
Technology Architect
Possesses strong experience in RSA Archer & Envision
implementation for clients in various industry
verticals. Significant amount of development expertise in
ODA, API development, UDS and parser designs, database
programming, etc.
Enhancement Specialist
Archer certified and ISO 27001 Lead auditor certified with
experience in Archer eGRC suite deployment, integration
using data feeds, custom ODA development and API
programming.

More Related Content

What's hot

Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Tunde Ogunkoya
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현Oracle Korea
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation EnglishTechnowave
 
Managed Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskManaged Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskAmit Panchal
 
Managed services for SXE Installation
 Managed services for SXE Installation Managed services for SXE Installation
Managed services for SXE InstallationAmit Panchal
 
Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet OverviewDebbie Lovis
 
Esquire Corporate Brochure
Esquire Corporate BrochureEsquire Corporate Brochure
Esquire Corporate BrochureShashwat Patra
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactCA Technologies
 
Lima cloud_digital 22
Lima cloud_digital 22Lima cloud_digital 22
Lima cloud_digital 22Lisa Thornton
 
Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...
 Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ... Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...
Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...Globe Testing
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...CA Technologies
 
The CareSmart Hosted Advantage
The CareSmart Hosted AdvantageThe CareSmart Hosted Advantage
The CareSmart Hosted AdvantageMichelle Harper
 
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...Katy Slemon
 
ARx Brochure
ARx BrochureARx Brochure
ARx Brochurekmchugh
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화Oracle Korea
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 

What's hot (18)

Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현
[2015 Oracle Cloud Summit] 6. BI Cloud Service -엔터프라이즈급 분석 플랫폼과 서비스를 클라우드에서 구현
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation English
 
Managed Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help DeskManaged Services - Functional & Customization Support Help Desk
Managed Services - Functional & Customization Support Help Desk
 
Managed services for SXE Installation
 Managed services for SXE Installation Managed services for SXE Installation
Managed services for SXE Installation
 
Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet Overview
 
Esquire Corporate Brochure
Esquire Corporate BrochureEsquire Corporate Brochure
Esquire Corporate Brochure
 
Datacore Tech Company Profile
Datacore Tech Company ProfileDatacore Tech Company Profile
Datacore Tech Company Profile
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business Impact
 
Lima cloud_digital 22
Lima cloud_digital 22Lima cloud_digital 22
Lima cloud_digital 22
 
Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...
 Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ... Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...
Estrategia HP Software "Libro de Recetas de TI. Indicadores de mercado para ...
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
 
The CareSmart Hosted Advantage
The CareSmart Hosted AdvantageThe CareSmart Hosted Advantage
The CareSmart Hosted Advantage
 
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...
Remote Outsourcing Services: Ensuring Business Continuity and Uninterrupted S...
 
ARx Brochure
ARx BrochureARx Brochure
ARx Brochure
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 

Similar to Aujas RSA Archer COE Brief

ADR Brochure
ADR  BrochureADR  Brochure
ADR BrochurePradeep M
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overviewjayallen77
 
Realtech Company Profile
Realtech Company ProfileRealtech Company Profile
Realtech Company ProfileDavid Milano
 
Zarlina Profile Presentation G
Zarlina Profile Presentation G Zarlina Profile Presentation G
Zarlina Profile Presentation G Ashutosh .
 
BrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionBrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionVinod Shintre
 
Solution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingSolution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingJisc
 
Saas solution PPT.pptx
Saas solution PPT.pptxSaas solution PPT.pptx
Saas solution PPT.pptxsonalibiswas22
 
Driving Insightful, Quantifiable Results
Driving Insightful, Quantifiable ResultsDriving Insightful, Quantifiable Results
Driving Insightful, Quantifiable Resultslshahs
 
1cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01CloudStar
 
Freight Forward System - Exaact.co
Freight Forward System - Exaact.coFreight Forward System - Exaact.co
Freight Forward System - Exaact.coexaactsolution
 
Best Outsource Java Development services.pdf
Best Outsource Java Development services.pdfBest Outsource Java Development services.pdf
Best Outsource Java Development services.pdfFullStackTechies
 
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...Marube Systems
 
Software development, Business Services, IT consulting, IT solutions
Software development,  Business Services,  IT consulting,  IT solutionsSoftware development,  Business Services,  IT consulting,  IT solutions
Software development, Business Services, IT consulting, IT solutionsDiscus Business Solutions
 
comspace technology profile
comspace technology profilecomspace technology profile
comspace technology profileWao Wamola
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008granicki
 
Alacrity Company Profile
Alacrity Company ProfileAlacrity Company Profile
Alacrity Company ProfileRobyn Clayton
 
TSG-Services-brochure-Web
TSG-Services-brochure-WebTSG-Services-brochure-Web
TSG-Services-brochure-WebMark Carlile
 
Itransition Custom Software Development
Itransition Custom Software DevelopmentItransition Custom Software Development
Itransition Custom Software DevelopmentItransition Group Ltd.
 

Similar to Aujas RSA Archer COE Brief (20)

ADR Brochure
ADR  BrochureADR  Brochure
ADR Brochure
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
CSSAGlobal Profile
CSSAGlobal ProfileCSSAGlobal Profile
CSSAGlobal Profile
 
Realtech Company Profile
Realtech Company ProfileRealtech Company Profile
Realtech Company Profile
 
Zarlina Profile Presentation G
Zarlina Profile Presentation G Zarlina Profile Presentation G
Zarlina Profile Presentation G
 
BrightStar SAP Solutions Introduction
BrightStar SAP Solutions IntroductionBrightStar SAP Solutions Introduction
BrightStar SAP Solutions Introduction
 
Solution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingSolution BluePrint v. Smart Parking
Solution BluePrint v. Smart Parking
 
Saas solution PPT.pptx
Saas solution PPT.pptxSaas solution PPT.pptx
Saas solution PPT.pptx
 
Driving Insightful, Quantifiable Results
Driving Insightful, Quantifiable ResultsDriving Insightful, Quantifiable Results
Driving Insightful, Quantifiable Results
 
1cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01cloudstar cloud track.v1.0
1cloudstar cloud track.v1.0
 
Freight Forward System - Exaact.co
Freight Forward System - Exaact.coFreight Forward System - Exaact.co
Freight Forward System - Exaact.co
 
Best Outsource Java Development services.pdf
Best Outsource Java Development services.pdfBest Outsource Java Development services.pdf
Best Outsource Java Development services.pdf
 
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...
marubesystems.com: Web Design, Web Development, Digital Marketing, SAP/Oracle...
 
Software development, Business Services, IT consulting, IT solutions
Software development,  Business Services,  IT consulting,  IT solutionsSoftware development,  Business Services,  IT consulting,  IT solutions
Software development, Business Services, IT consulting, IT solutions
 
comspace technology profile
comspace technology profilecomspace technology profile
comspace technology profile
 
ARITA Brochure
ARITA Brochure  ARITA Brochure
ARITA Brochure
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008
 
Alacrity Company Profile
Alacrity Company ProfileAlacrity Company Profile
Alacrity Company Profile
 
TSG-Services-brochure-Web
TSG-Services-brochure-WebTSG-Services-brochure-Web
TSG-Services-brochure-Web
 
Itransition Custom Software Development
Itransition Custom Software DevelopmentItransition Custom Software Development
Itransition Custom Software Development
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Aujas RSA Archer COE Brief

  • 1. Aujas RSA® Archer® Center of Excellence (CoE) Overview RSA Archer is a powerful eGRC Automation technology. Gartner, Inc. has identified RSA Archer as the market leader for several years in a row. Numerous large organizations have invested in RSA Archer for automating IT GRC, Vendor Governance and even for legal and financial compliance. While choosing RSA Archer is a ‘no brainer’, making effective use of the technology and keeping it aligned with evolving business requirements can be a challenge. Organizations have to contend with customization to compliance requirements, align with complex (in some cases overlapping or legacy) processes followed by the organization, address integration with existing point technologies and deliver all of this in the shortest time possible. Unfortunately most RSA Archer service providers try to capitalize on the GRC (governance, risk and compliance) automation as a point technology and focus primarily on one time deployment and go live. After the roll out, often keys to maintenance and administration are handed over to a large system integrator that perceives the eGRC suite as yet another automation application, thereby limiting the return on investment and its promise. Our Services As an information risk management specialist we at Aujas understand the power and capability of RSA Archer and provide complementary services that allows our clients to gain maximum value out of the eGRC suite. Aujas’ RSA Archer Center of Excellence (CoE) brings together a global team of experienced and certified RSA Archer professionals. Leveraging the CoE, Aujas offers a wide range of services to support our client’s eGRC journey throughout its lifecycle.  On-demand & Readiness Advisory – this service is intended to enable our clients to consult with our specialists on ‘conceptualizing’ and ‘blue printing’ their eGRC initiatives. Many CISOs do have questions on the ideal way forward on the GRC automation journey and our managing consultants work with our clients to jointly brainstorm and arrive on the best way forward.  Solution Design and Deploy – our CoE provides the capability to design and deploy Archer using a hybrid delivery model. Aujas managing consultants leverage executive workshops to build a solution blueprint by involving client stakeholders from various business functions. Post design phase Archer technology specialists build and deploy the solution using our proprietary ‘ArcherAssure’ methodology. We also assist in migrations and version updates.  Customization and Enhancements – we understand that each of our clients has unique requirements and out of the box RSA Archer may be insufficient to RSA and Archer are registered trademarks of EMC Corporation Copyright 2016 Aujas Information Risk Services, All Rights Reserved Page 1 of 2 Contact us: Web: http://www.aujas.com Email: karl.kispert@aujas.com Phone: North America: +1 973 229 5566 Middle East Asia: +971 6 5528438 South East Asia: +91 80 2608 7878  Laser sharp focus on maximizing and returns and value from RSA Archer initiatives  Specialization and domain understanding of Governance, Risk and Compliance  Services and specialists for all project stages of RSA Archer initiatives  State of the art service delivery methodology leveraging global delivery models
  • 2. Page 2 of 2Copyright 2016 Aujas Information Risk Services, All Rights Reserved International Airport Deploys RSA Archer We assisted our client design their compliance framework, policies, processes, control standards and procedures and integrate the same on RSA Archer. We also assisted them in deploying the RSA Archer eGIC suite and build an automated incident management system by integrating their SIEM system with RSA Archer. National Identity Program Deploys RSA Archer We developed the entire GRC program for our client, ground-up, that included the policies, procedure workflows, control standards, vendor management processes, etc. We deployed all nine solutions of RSA Archer, integrated them with multiple point technologies using data feed managers and API, modeled the workflows and dashboards. We continue to nurture the implementation with continuous sustenance and help it evolve with enhancements. Large Bank Deploys RSA Archer to Integrate GRC We deployed the entire RSA Archer eGRC suite with all the solutions in a complex multi stakeholder environment. The implementation required stakeholder management across various verticals of the bank and integrated them on a single platform. Each silo required us to create custom workflows integration with various point technology and dashboards for their individual leaderships. Telecom Automates Threat & Risk Framework We designed an integrated threat and risk management framework that allowed our client to automatically detect new systems on the network and trigger their risk and threat assessment workflow. We managed the implementation of the framework on RSA Archer eGRC suite and its integration with HRMS, asset management, threat management technologies and we continue to sustain and enhance the implementation. Our Peopleaddress their requirements. Our CoE’s enhancements team provides advanced customization capabilities around ODA (On Demand Application) development, Archer API & Data Feed integration with external point technologies like HRMS, ERP, threat management systems, asset management systems, SIEM, etc.  Continuous Sustenance – like any other technology Archer too needs to be maintained on an on going basis, our sustenance services assist our clients to manage, administer and keep the system up-to-date. Our services help our clients focus on leveraging the platform while our teams manage the solutions, users, reports, dashboards and the platform itself. Our Value Our CoE brings together a set of globally distributed professionals performing various roles. The team consists of managing consultants, technical specialists and development specialists. The team not only leverages the standardized processes, methodologies and accelerators emerging from the CoE but they also contribute to the body of work. We understand that security is essential and we ensure that our CoE central operations are ISO 27001 compliant and demonstrate our commitment to information security. Compliance with ISO27001 standard demonstrates the nature of our security program and provides assurance to our customers evaluating the strength of our security practices. We have deployed some of the best security technologies, controls and processes to protect our CoE and our client’s interests. Our Work Our CoE has been founded on the rich experience of RSA Archer deployments globally; we have supported our clients across the RSA Archer lifecycle starting from managing the deployments to supporting and enhancing them. We have deployed several bespoke integrations of RSA Archer wherein purpose built frameworks were designed to address our client’s need and then were automated on RSA Archer along with integration with external point systems. Our RSA Archer clients are spread across globally in various industry verticals such as enterprises, telecoms, banks, govt. and energy. Managing Consultant Experience in leading and delivering IT GRC and Audit engagements for clients across industry verticals. Extensive experience with standards and in creating RSA Archer automation strategy, blue prints and project management. Business Analyst & Functional Specialist Possesses strategic depth and vision to understand business requirements and design processes for implementation on RSA Archer. She has worked with Fortune 500 clients with banking, Insurance & technology companies. Technology Architect Possesses strong experience in RSA Archer & Envision implementation for clients in various industry verticals. Significant amount of development expertise in ODA, API development, UDS and parser designs, database programming, etc. Enhancement Specialist Archer certified and ISO 27001 Lead auditor certified with experience in Archer eGRC suite deployment, integration using data feeds, custom ODA development and API programming.