LogicGate vs RSA Archer

Last Updated:

Our analysts compared LogicGate vs RSA Archer based on data from our 400+ point analysis of Risk Management Software, user reviews and our own crowdsourced data from our free software selection platform.

Product Basics

LogicGate provides scalable GRC solutions and automates daily surveillance activities, verifications and test processes for an airtight risk posture. The Risk Cloud module puts together an end-to-end package of enterprise, IT and third-party risk, incident management, audit and controls, governance, compliance, and regulation management portals.

It provides complete visibility over the entire process, from risk identification to mitigation. Create, test and assign controls to common issues and run automated audits. Stay compliant with state standards and data privacy regulations. The policy management offering simplifies understanding and adoption of company policies. Prepare contingency plans for potential disasters and be prepared for any crisis.
read more...
RSA Archer provides enterprise solutions to manage governance, policies, deficiencies, risk and compliance. Its interface allows even entry-level users to integrate external technologies , explore a broad range of functions, automate business processes, streamline critical workflows and configure the interface for better data visualization, reporting and analytics. Organizations can automate task ownerships, escalate essential issues and control user access at various escalating levels.

Supports on-premise deployment or a SaaS model with localized multilingual support for global use. It provides seamless data integration for collaboration across different teams and environments.
read more...
Undisclosed
Free Trial is unavailable →
Get a free price quote
Tailored to your specific needs
$14,000 Annually
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Simplify Processes: Streamline the risk management process with visual maps created with a drag-and-drop interface. 
  • Automation: Automatically perform a large chunk of daily tasks with pre-defined logic, set rules and workflows. 
  • Minimum Time to Market: Hit the ground running immediately after implementation with a range of prebuilt process apps designed specifically for governance, risk and compliance. 
  • Versatility and Scalability: Quickly adapt to sudden changes in the business environment with customizable processes. 
read more...
  • 360-Degree Risk View: Secure points of vulnerability with a loaded risk management strategy that incorporates environmental social and governance (ESG) initiatives and covers all business areas. 
  • Flexible Analysis: Readily customize the platform to focus on specific risk areas and adapt to changing needs. 
  • Common Risk Language: Improve visibility, collaboration and efficiency across risk management departments with a common risk language. 
  • Build Resilience: Look past recovery options and invest in business resilience with integrated continuity and disaster recovery procedures. 
  • Real-time Tracking: Track identified risks, remediation measures and workflows directly from the dashboard with data visualization. 
read more...
  • Enterprise Risk Management: Continuously monitor critical processes for any sign of vulnerability. Perform customizable calculations to predict the potential impact of a disaster. 
    • Workstreams: Set up automation-driven workflows for document collections, notifications, deadline-triggered requests and transparent tracking. 
    • Assessments: Stakeholders can assess the risk register across multiple business domains. Use assessment data to prepare effective mitigation strategies. 
    • Questionnaires: Prepare dynamic questionnaires to process data from interview and survey inputs. 
    • Risk Alignment: Convert assessment data into task items with deadlines and notifications and assign them to individual risk owners. Track the status of ongoing remediation activities and send alerts to related stakeholders. 
    • Visual Data: Run custom analytics and reporting for a real-time heat map of critical risks across the program. 
  • COSO Framework: Integrate the Committee of Sponsoring Organizations (COSO) framework guidance on risk strategy and performance. Automatically calculate risk scores and perform risk assessments based on enterprise and operational risks, impact, likelihood, and vulnerability rubrics. 
    • Centralized Tracking: Eliminate information silos and track logged risks and remediation measures from a centrally accessible location. Run built-in reports with complete transparency. 
    • Analytics: Study the relationship between the organization’s operational and functional level goals and available risk scores. Notify risk owners of pending tasks and deadlines. 
  • Issues Management: Prioritize issue mitigation based on automatically calculated issue urgency scores and track progress with built-in reporting and dashboard. Send in-app and email notifications to keep risk owners informed. 
    • GRC Initiatives: Track and manage issues, remediation strategies and risk ownership via one central location. 
    • Visibility: Get granular details on logged issues and mitigation responses with out-of-the-box reporting and status reports. 
  • Regulations: Leverage a regulatory inventory index to define regulatory categories. Run compliance assessments to identify potential non-compliance risks and sanctions. Create plans to incorporate regulatory changes and assign task ownership to relevant personnel. 
    • Tracking: Use the corrective action plan (CAP) module to solve existing issues, track previous violations and minimize negative publicity. 
    • Regulation Partnership: Partner with Ascent to track compliance using AI. Get access to over 125 regulators, gain insights from new markets, products, industries and regions, and identify coverage gaps. Available regulators include SEC, FDIC, OCC, FINRA, CFTC, FinCEN and more. 
    • Obligations: Use AI to identify important obligations. Automatically update regulators and get granular data on all obligations, including laws and standards. 
  • IT Security: Protect IT assets and infosec risk processes with effective controls in compliance with industry standards. 
    • ISO 27005: Track risks in the framework with content designed for ISO/IEC 27005:2018(E)’s information security risk management process. Identify, assess and mitigate risks and record all vulnerabilities in a secure database. Calculate risk scores of assets with NIST 800-206 guidance following ISO 27005 recommendations. 
    • Real-Time Protection:  Continuously update residual risk reports, assessments and controls testing activities. Assign risk tolerance thresholds and automatically administer mitigation measures on crossing over. Eliminate ineffective controls and processes. 
    • Evaluation: Evaluate critical procedures for vulnerabilities. Use a flexible data model to record elements and identify threat actors and events. Follow up on evaluations with reports and remediation plans. 
    • Controls Register: Prepare a custom risk assessment methodology with personalized controls and rules. Apply appropriate control frameworks, including ISO 27002, NIST 800-53 and NIST CSF. 
    • Vulnerability Management: Prioritize mitigation of vulnerabilities with the most impact on critical business processes. Keep a record of essential assets, assessments, vulnerabilities and treatments with built-in workflows. Run reports to map the company’s vulnerability status and import records from Risk Cloud Tenable.io integration, third-party integrations or CSV files. 
  • Third-Party Risk Management: Access templates and applications to manage relationships from the same portal. 
    • ISO 27001: Map relationships with third-party vendors with pre-built questionnaires aligned with Annex A information security requirements framework. Record proprietary data, financial information, intellectual property and employee details according to ISO/IEC 2700 family of standards. 
    • SIG Lite: Optimize vendor relationships with a questionnaire created by Risk Cloud’s third-party risk management SIG Lite app. Quickly verify all incoming vendor information, automate daily tasks and collect vendor responses for maximum visibility. Get significant insights into third-party relationships with 329 questions covering 18 domains. 
    • Procurement and Contract Management: Monitor service level agreements (SLAs) and vendor contracts and schedule due diligence on all associations. Send automated notifications for key events and maintain a central database of vendor data, including billing information, contract details, SLAs and payment terms. 
    • Compromise Assessment: Measure the impact of third-party vulnerabilities to manage risks. Use automated workflows and templates to initiate impact assessments, link vulnerabilities and register information for complete visibility into vendor relationships. 
  • Audit Controls Management: Use comprehensive reports and automated workflows to track audits and control processes. Assess internal controls and policies against AICPA’s five Trust Services Criteria and obtain SOC 2 compliance. The platform is HITRUST approved and includes SOX compliant financial reports. Run CMMC compliant self-assessments. Audit management frameworks include PCI DSS, FedRAMP, HIPAA, FFIEC CAT, NIST 800-171 and more. 
    • Controls Management: Set up automated control assessments at custom intervals. Run real-time auto-generated reports and link controls to the Risk Cloud Controls repository. 
    • Audit Management: Regulate the internal audit process with audit-control testing, reporting and due date reminders. Create and execute a centralized Audit Universe and plan for the entire company. Maintain a central evidence database and prepare in advance for external audits. 
  • Compliance: Provides clearly defined regulatory categories and an inventory index. Automatically assign ownership, stay up-to-date on laws and perform risk assessments to identify potential non-compliance penalties. Implement and collaborate on corrective action plans. 
    • Employee Compliance: Maintain a centralized inventory of employee information and policy acknowledgments. Schedule automated reminders and due date alerts for policies. Automatically assign policy acknowledgments and certification requests and get status updates. Create customized workflows to keep up with training requirements and policy attestations. 
  • Policy Management: Leverage process automation to request, write, approve and update policies, eliminate duplicate policies, and set up reminders. Centralize the policy administration system to directly link policies and procedures and eliminate information silos. Create hierarchical maps connecting risks, regulations and business units. 
  • Incident Management: Build a single incident repository to respond faster and standardize the incident playbook. Automate processes with conditional workflow logic and custom rules handling, alerts and activity routing. Identify vulnerabilities, bottlenecks and compliance failures by auditing incident management procedures. 
  • Privacy: Stay compliant with consumer privacy laws, including GDPR and CCPA. 
  • Business Continuity: Carefully document and execute crisis response tasks in the event of a major crisis or disaster. Set up workflows to identify and safeguard crucial processes and physical, intellectual and financial assets. 
    • Disaster Response Resource Repository: Create a standardized repository of instructions and procedures for reference in an emergency. Store important company information such as asset locations, processes, passwords and business functions in a centrally accessible database. 
  • Security: Encrypt all end-user data both during transit and at rest using best-practice services. Provides fine-grained access controls and Single Sign-On (SSO) delivered via SAML 2.0. Protect the entire infrastructure with firewalls. 
  • Integration: Integrate with third-party apps via a secure RESTful API. Application Programming Interface requires OAUTH 2.0 authentication. 
read more...
  • Application Builder: Build custom applications via simple point-and-click setup. Streamline workflows, implement controls, automate operations, run reports and do more, according to the organization’s methodologies and business objectives. 
  • Dashboard and Reports: Customize the dashboard interface and run reports with preconfigured templates. Use keyword search to review risk and compliance ratings. 
  • Business Workflow: Automatically manage tasks, reviews, approvals and statuses. Create custom workflows to assign tasks based on the administration’s obligation, prioritization and escalation policies. Use the advanced workflow engine to define processes as flowcharts. 
  • Role-Based Controls: Implementing role-based controls to limit access to application, system, record and field data. 
  • Integration: Integrate with various third-party applications to manage governance, risk and compliance from within the same platform. The Archer GRC Community provides access to multiple pre-configured applications and integrations. 
  • Data Visualization: Run reports to find hidden connections between risks and incidents. Visualize relationships to predict future risks and make data-driven decisions. 
  • Global Support: Process multiple languages with double-byte character support. Deploy the platform in numerous regions and languages. 
read more...

Product Ranking

#27

among all
Risk Management Software

#31

among all
Risk Management Software

Find out who the leaders are

Analyst Rating Summary

86
95
83
99
77
99
86
88
Show More Show More
Regulatory Management
Reports and Dashboards
Risk Management
Incident Management
Compliance
Regulatory Management
Reports and Dashboards
Risk Management
Audit Management
Business Continuity Management

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

LogicGate
RSA Archer
+ Add Product + Add Product
Audit Management Business Continuity Management Compliance Incident Management Operational Risk Management And IT Security Platform Capabilities Policy Management Regulatory Management Reports And Dashboards Risk Management Vendor Risk Management 83 77 86 90 71 86 86 100 100 100 83 99 99 88 90 98 99 96 100 100 100 92 0 25 50 75 100
85%
0%
15%
100%
0%
0%
80%
0%
20%
100%
0%
0%
88%
0%
12%
88%
0%
12%
90%
0%
10%
90%
0%
10%
75%
0%
25%
100%
0%
0%
77%
0%
23%
100%
0%
0%
88%
0%
12%
100%
0%
0%
100%
0%
0%
100%
0%
0%
100%
0%
0%
100%
0%
0%
100%
0%
0%
100%
0%
0%
83%
0%
17%
83%
0%
17%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

80%
0%
20%
80%
0%
20%

User Sentiment Summary

Excellent User Sentiment 32 reviews
Great User Sentiment 143 reviews
95%
of users recommend this product

LogicGate has a 'excellent' User Satisfaction Rating of 95% when considering 32 user reviews from 1 recognized software review sites.

80%
of users recommend this product

RSA Archer has a 'great' User Satisfaction Rating of 80% when considering 143 user reviews from 4 recognized software review sites.

n/a
3.8 (17)
4.74 (32)
n/a
n/a
4.1 (9)
n/a
4.1 (98)
n/a
3.5 (19)

Awards

SelectHub research analysts have evaluated LogicGate and concluded it earns best-in-class honors for Regulatory Management. LogicGate stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.

User Favorite Award
Regulatory Management Award

SelectHub research analysts have evaluated RSA Archer and concluded it deserves the award for the Best Overall Risk Management Software available today and earns best-in-class honors for Audit Management, Business Continuity Management and Regulatory Management.

Analysts' Pick Award
Audit Management Award
Business Continuity Management Award
Regulatory Management Award

Synopsis of User Ratings and Reviews

No-Code Platform: Users appreciate the platform's user-friendly, no-code approach, which allows those without coding experience to easily build and customize workflows, forms, and reports. This empowers business users to take ownership of risk management processes without relying on IT support.
Flexibility and Customization: LogicGate's flexibility allows users to tailor the platform to their specific needs. Users can create custom objects, fields, and relationships to model their unique risk and compliance requirements. This adaptability ensures the platform can evolve alongside changing business needs.
Integrations: LogicGate offers integrations with various third-party applications, such as GRC platforms, single sign-on providers, and data visualization tools. These integrations enable users to connect LogicGate with their existing technology stack, streamlining data flow and enhancing overall efficiency.
Scalability: The platform is designed to scale with organizations as they grow. Whether managing a small team or a large enterprise, LogicGate can accommodate increasing data volumes and user numbers without compromising performance.
Show more
Centralized Risk Management: Provides a single platform to manage various types of risks, including IT, operational, third-party, and compliance risks, offering a holistic view of an organization's risk landscape.
Flexibility and Customization: Caters to diverse risk management needs with its flexible framework and customizable features, allowing organizations to tailor the platform to their specific requirements and workflows.
Advanced Reporting and Analytics: Offers robust reporting and analytics capabilities, enabling organizations to gain insights into their risk data, identify trends, and make data-driven decisions to mitigate risks effectively.
Compliance Management: Supports compliance with various industry regulations and standards by providing tools for managing policies, controls, and assessments, helping organizations meet their compliance obligations.
Integration Capabilities: Integrates with other business systems and applications, such as GRC platforms, vulnerability scanners, and threat intelligence feeds, to streamline risk management processes and improve data accuracy.
Show more
Steep Learning Curve: The platform's interface can be challenging for new users due to its complexity and lack of intuitive design, leading to a longer onboarding process and potential frustration.
Customization Limitations: LogicGate may not offer the level of customization required by some organizations with unique risk management workflows or reporting needs, potentially hindering their ability to tailor the platform to their specific requirements.
Reporting Challenges: Generating reports can be cumbersome, and the available reporting features may not provide the flexibility and depth of analysis needed for comprehensive risk assessments and decision-making.
Show more
Usability Challenges: Users frequently mention a steep learning curve due to the platform's complexity and lack of intuitive design, leading to frustration and decreased efficiency. Archer's interface can feel clunky and outdated, hindering user adoption and requiring extensive training for new team members.
Reporting Limitations: Generating reports can be cumbersome and time-consuming, often requiring manual data manipulation or custom scripting. While Archer offers reporting capabilities, they may not meet the specific needs of all organizations, leading to reliance on external tools or workarounds.
Customization Complexities: Tailoring Archer to specific workflows and requirements can be challenging and may necessitate specialized technical expertise. The platform's flexibility can be a double-edged sword, as extensive customization can introduce complexity and increase maintenance overhead.
Performance Concerns: Some users report performance issues, particularly with large data sets or complex configurations, leading to slow response times and decreased productivity. As the volume of data and users grows, Archer's performance may become a bottleneck for risk management operations.
Show more

LogicGate's Risk Cloud platform has attracted attention for its ability to streamline risk management processes. Users frequently highlight its user-friendly interface and intuitive design, making it accessible even for individuals without extensive risk management experience. The platform's flexibility allows it to adapt to various risk types, including operational, financial, and compliance risks, making it a versatile solution for diverse organizations. Additionally, LogicGate's automation capabilities, such as automated risk assessments and control evidence collection, save time and effort for risk management teams. While LogicGate receives praise for its strengths, some users note areas for improvement. Some users mention that the platform's reporting features could be more robust, offering greater customization and data visualization options. Additionally, while LogicGate integrates with various third-party tools, expanding its integration ecosystem could further enhance its value proposition. Despite these considerations, LogicGate remains a strong contender in the risk management software market. LogicGate distinguishes itself through its no-code approach, empowering users to build custom workflows and applications without requiring coding expertise. This feature democratizes risk management, enabling broader participation from various departments within an organization. Furthermore, LogicGate's graph database technology facilitates the identification of complex relationships between risks and controls, providing a holistic view of an organization's risk landscape. This comprehensive approach aids in informed decision-making and proactive risk mitigation. LogicGate is well-suited for organizations seeking a user-friendly and comprehensive risk management solution. Its adaptability to different risk types and its automation capabilities make it valuable for businesses of all sizes. Organizations with limited IT resources or those looking to empower non-technical users in risk management processes will particularly benefit from LogicGate's no-code platform. However, organizations requiring highly customized reporting or extensive integrations with niche tools may need to consider additional solutions or customizations to fully meet their needs.

Show more

RSA Archer is frequently lauded for its comprehensive approach to risk management. It provides a centralized platform where organizations can identify, assess, and mitigate risks across various domains, including IT, finance, and operations. Users appreciate the ability to consolidate risk information from different sources, creating a holistic view of their risk landscape. This comprehensive approach is particularly valuable for organizations with complex risk profiles or those operating in highly regulated industries. Additionally, RSA Archer's scalability allows it to adapt to the needs of organizations of all sizes, making it a versatile solution for growing businesses. However, some users note that RSA Archer's extensive features can lead to a steeper learning curve compared to simpler risk management tools. Implementing and customizing the platform may require dedicated resources and expertise. While RSA Archer offers robust capabilities, its strength can also be its weakness for organizations seeking a more straightforward solution. Despite this, RSA Archer remains a top choice for organizations that prioritize a comprehensive and scalable risk management approach. Its ability to provide a centralized view of risk, automate workflows, and facilitate compliance makes it well-suited for businesses seeking to mature their risk management programs and navigate the complexities of today's ever-evolving risk landscape.

Show more

Screenshots

Top Alternatives in Risk Management Software


ARMATURE Fabric

Cura

Diligent

LogicManager

MetricStream

NAVEX Global

OneTrust GRC

Onspring

Resolver

Riskonnect

RSA Archer

SAI360

ServiceNow GRC

StandardFusion

Related Categories

Head-to-Head Comparison

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings