Perimeter
8/5/2009
10:35 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Archer Technologies Announces Quarterly Revenue Growth

Provider of enterprise GRC solutions reports 56 percent revenue growth in the second quarter versus the same period last year

OVERLAND PARK, Kan., Aug. 4, 2009 " Archer Technologies, a leading provider of enterprise governance, risk and compliance (GRC) solutions, today announced another record quarter, marked by continued blue-chip client acquisition, strong revenue growth, GRC technology innovation and widespread industry recognition. In the first half of 2009, the company added nearly 30 clients, including 14 Fortune 1000 accounts. In addition, Archer expanded its solution offerings based on customer demand to address financial risk management and internal audit initiatives. Third-party validation confirmed Archer's ongoing GRC leadership, in both the established IT-GRC segment and the emerging Enterprise GRC market.

"Archer is a disruptive force in the GRC market today," said Michael Rasmussen, a leading GRC authority and president of Corporate Integrity, LLC. "They offer one of the most versatile and easily customizable platforms on the market that can be swiftly tailored to meet any GRC process and content issue."

Increased Revenue and Market Presence Results include:

  • 56 percent revenue growth in the second quarter versus the same period last year
  • 100 percent client renewal rate in the second quarter (98 percent aggregate renewal rate since company inception)
  • Expanded client base within the technology, financial services, retail, healthcare, transportation and media industries to include 14 new Fortune 1000 clients—among them the worldwide leader in software, services and solutions—and an additional 15 global accounts
  • 27 percent of the Fortune 100 among the company's distinguished clients

    "We continue to see strong quarter-over-quarter growth and increasing adoption of our GRC solutions on a global scale. In fact, today the vast majority of our customers manage their GRC programs through multiple Archer solutions," said Archer CEO Jon Darbyshire. "As we expand our reach, Archer's focus will remain on our customers—providing them with best-in-class technology solutions and unparalleled service to help them meet their enterprise-wide risk management and compliance objectives. Archer's 100 percent renewal rate in the second quarter tangibly illustrates our commitment to customer success."

    GRC Technology Innovation In April, Archer launched its new mobile E-GRC solution. Using their Smartphones, clients can now rapidly access critical information from Archer's Policy, Risk, Compliance, Audit, Incident, Vendor, Threat, Business Continuity and Enterprise Management solutions. Archer Mobile keeps business professionals connected to their GRC data from remote facilities, satellite offices, warehouses, vendor locations, home offices and anywhere else business takes them.

    Third-Party Recognition Archer received the "Strong Positive" rating in Gartner's 2009 MarketScope on IT Governance, Risk and Compliance Management (IT-GRCM). Additionally, Forrester Research, Inc. positioned Archer as a "Strong Performer" in its July 2009 report The Forrester Wave: Enterprise Governance, Risk and Compliance Platforms, Q3 2009. Archer was the only vendor to be included in both the IT-GRC and E-GRC research, an indication of the breadth and depth of Archer's solution suite.

    In addition to recognition from the analyst community, Archer was the only GRC solution provider to be honored in the SC Magazine US Excellence Awards for the sixth consecutive year. Archer earned the Best Regulatory Compliance Solution Award, which it also took home in 2008.

    Expanding Partner Program World-class institutions continue to endorse Archer by joining the company's partner program, which expanded in the first half of 2009 to include Accenture, Accuvant, HITRUST, McAfee, Nova Datacom, UCF and Wipro. Julian Waits, the former CEO of GRC solution provider Brabeion Software Corporation, has rapidly developed Archer's strategic partnerships in his new role as vice president of business development. Waits is also expanding Archer's GRC application and services portal—the Archer Exchange.

    "I merged my company with Archer because they are the best in the business among GRC technology innovators," said Waits. "The deep content, flexibility and superior architecture of Archer's GRC platform allow us to engage partners on a global scale to deliver best-of-breed solutions that address the complex risk and compliance issues our mutual customers face. Combined with our direct sales approach, Archer's partner strategy will allow us to continue our rapid growth in the GRC market."

    About the MarketScope The MarketScope is copyrighted 2009 by Gartner, Inc. and is reused with permission. The MarketScope is an evaluation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the MarketScope, and does not advise technology users to select only those vendors with the highest rating. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    About Archer Technologies Archer Technologies delivers enterprise governance, risk and compliance (GRC) solutions. With more than six million licensed users and a client list that includes more than 25 percent of the Fortune 100, Archer enables highly regulated companies to manage enterprise risks, demonstrate compliance, automate business processes, and gain visibility into corporate risk and security controls.

    Archer's out-of-the-box solutions, including Policy, Risk, Compliance, Incident, Vendor, Threat, Business Continuity, Audit and Enterprise Management, are built on the flexible Archer SmartSuite Framework, allowing clients to tailor the solutions according to their unique requirements. Whether deployed on-premise or via Archer's SaaS model, the Framework has become a go-to GRC platform for many global organizations.

    Archer is the only vendor that delivers the Archer E-GRC Ecosystem comprised of out-of-the-box solutions, a flexible Framework, a robust user community, and an application and partner exchange, which provides clients the tools they need to build a best-in-class enterprise GRC program. For more information, visit www.archer.com or call 1-888-539-EGRC.

    # # #

    Danielle Millerick BluePoint Venture Marketing P: 781.861.7800 | F: 781.861.7810 danielle@bluepointmktg.com | www.bluepointmktg.com Blog: http://bluepoint.wordpress.com | Subscribe

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    Partner Perspectives
    What's This?
    In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

    As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
    Featured Writers
    White Papers
    Cartoon
    Current Issue
    Dark Reading's October Tech Digest
    Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
    Flash Poll
    Title Partner’s Role in Perimeter Security
    Title Partner’s Role in Perimeter Security
    Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-8243
    Published: 2014-11-01
    Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote a...

    CVE-2014-8244
    Published: 2014-11-01
    Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote a...

    CVE-2013-0334
    Published: 2014-10-31
    Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

    CVE-2014-2334
    Published: 2014-10-31
    Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

    CVE-2014-2335
    Published: 2014-10-31
    Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Follow Dark Reading editors into the field as they talk with noted experts from the security world.