We performed a comparison between Brinqa and RSA Archer based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management."The most valuable features of Brinqa are its data integration capabilities."
"It is a very friendly tool. We can easily understand what is going on inside the tool. I like this tool. We can work with the tool for the ERP platform. We can create automated applications based on the requirements."
"The last project was for an investment group that was using Excel. Shifting their records from one position to another took approximately 15 minutes. In Archer, we created a workflow for them to leverage it, and they could send the single record with one click to one person within seconds. The whole process went from 15 minutes to two minutes to get the approval for the records. The main purpose of Archer is to just make it easy."
"The solution has helped our organization manage our internal and external activities."
"RSA is a very rich application. I like its adaptive suggestion, where based on your users and the class of data, it can actually recommend you the proper control to choose. For example, we have been using PCI DSS as an NIST. So based on application feedback, it will provide you with a suggestion on which control objective needs to be set. Based on that, you can make a decision—you don't need to take the suggestion, but you can customize that particular provided suggestion. RSA Archer's workflow is also good, in terms of process automation."
"From my perspective, because I've always done it as a consultant, I do like the way it is configured. They've gone into changing the application builder interface, so it is even easier. When you're working with users, it is really easy to show them how to do things quickly and how to configure, change, and design stuff quickly."
"I have found all the features to be valuable, including those involving reporting, the dashboard, notifications, email modules, the database and data input."
"The part I liked about Archer was the risk assessment for deficiencies and being able to use it there."
"The most valuable features are the advanced workflow and the dashboards. This tool can present data wonderfully to management, and it is easy for them to manage the risk plans."
"Brinqa could improve in terms of the speed of their service and resource provision."
"The first improvement I would suggest for RSA Archer is a better search feature. The search criteria needs to be improved. Sometimes I do a search and the search doesn't return the exact item I'm looking for. RSA Archer could also be improved by being more user-friendly. Maybe I have been using a limited version of RSA Archer, but I'm not sure whether it has ESG, environmental and social governance. In the next couple of years, ESG is the next feature that will be integrated into GRC tools. I would recommend RSA Archer adds ESG."
"The design and advanced workflow need to be improved."
"Its customization features could be better."
"There should be a way to export and get data from the system in PDF or PowerPoint presentation format. This would be a great addition."
"I would like to see real-time data, from vulnerabilities, and threats."
"Solution could use more inbuilt applications."
"The bullet chart is the best graph for my purposes, and it should be available for inclusion in the dashboards."
"RSA Archer might be a bit expensive for small companies because it's a vast tool."
Brinqa is ranked 11th in Risk-Based Vulnerability Management with 1 review while RSA Archer is ranked 1st in GRC with 38 reviews. Brinqa is rated 7.0, while RSA Archer is rated 8.0. The top reviewer of Brinqa writes "Allows us to configure the risk algorithm to suit our specific needs". On the other hand, the top reviewer of RSA Archer writes "A rich application with good workflow, but search feature needs improvement". Brinqa is most compared with Vulcan Cyber, Axonius, Nucleus, Avalor and Tenable Nessus, whereas RSA Archer is most compared with OneTrust GRC, IBM OpenPages, MetricStream, Workiva Wdesk and AuditBoard.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.