SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Automated
information security
platform

Capable of robotizing about 95% of routine
operations of information security specialists

Get a demo of a
Security Vision product

Mail us to sales@securityvision.ru
or request a demo

Clients

View all

Clients

RT Protect SOC
RT Protect SOC
Rostec State Corporation
Rostec State Corporation
Rosbank
Rosbank
Special Communications of Federal Guard Service of the Russian Federation
Special Communications of Federal Guard Service of the Russian Federation
Sberbank
Sberbank
Gazprombank
Gazprombank
Norilsk Nickel
Norilsk Nickel
Magnit
Magnit
United aircraft corporation
United aircraft corporation
Otkritie Bank
Otkritie Bank
Alfa-Bank
Alfa-Bank
EVRAZ
EVRAZ
Megafon
Megafon
Rosneft Oil Company
Rosneft Oil Company
Russian Post
Russian Post
Gazprom-media Holding
Gazprom-media Holding
Rosenergoatom
Rosenergoatom
Rusagro
Rusagro
Moscow State University
Moscow State University
T‑Bank
T‑Bank
Severstal
Severstal
Х5 Group
Х5 Group
Renaissance Credit Bank
Renaissance Credit Bank
Cherkizovo Group
Cherkizovo Group
Capital Group
Capital Group
Angara MSS
Angara MSS
Uralchem
Uralchem
Sber Bank Belarus
Sber Bank Belarus
TRUST Bank
TRUST Bank
Transtelecom
Transtelecom
Rostelecom-Solar
Rostelecom-Solar
Rossia Bank
Rossia Bank
SMP Bank
SMP Bank
Scientific and Production Enterprise "Istok" named after Shokin
Scientific and Production Enterprise "Istok" named after Shokin
The General Radio Frequency Centre
The General Radio Frequency Centre
Glavgosexpertiza
Glavgosexpertiza
Multicarta
Multicarta
GMC Group
GMC Group
Mitro International Ltd
Mitro International Ltd
Ministry of Sports of the Russian Federation
Ministry of Sports of the Russian Federation
SDM-Bank
SDM-Bank
SME Corporation
SME Corporation

Security Vision
in numbers:

  • 100 %
    Domestic product
  • 26
    Professional
    awards in the field of information security
  • 10+
    MSSP information security service providers
    use the platform
    to provide services
  • 30+/100
    Companies from the TOP100
    list are customers
  • 7/10
    Banks from the TOP10 list
    are customers
  • 30+
    Banks from the TOP100
    list are customers
000 + Professionals
in the team
11 Competent
and trained
partner companies

Reviews

All reviews

Reviews

Based on the results of competitive procedures, the Security Vision SOAR/SGRC platform was selected to implement the implementation of the cyber incident response automation system.

Sergey Kramarenko

Head of the Cybersecurity Department

Sergey Kramarenko

MegaFon uses the Security Vision CII solution to automate routine tasks of protecting critical infrastructure facilities.

Alexander Osipov

Director of Cloud and Infrastructure Computing

Alexander Osipov

With the implementation of the Security Vision platform, Russian Post has gained the opportunity not only to atomically use individual security solutions, but also to build an ecosystem of the same security solutions, as well as to automate the aggregation of necessary data from a variety of internal and external sources for enrichment and contextualization.

Roman Shapiro

Director of the Information Security Department

Roman Shapiro

After looking at the market, we realized that the best solution for us is Security Vision.

Andrey Kashirin

Information Security Director

Andrey Kashirin

We use Security Vision solutions at Rostec State Corporation.

Artem Sychev

First Deputy General Director

Artem Sychev

The Security Vision solution, in terms of price-quality ratio, satisfied our needs to the maximum.

Andrey Nuikin

Head of Information Systems Security Department of Vice President for IT

Andrey Nuikin

We are actively working with colleagues from Security Vision, a Russian vendor whose security solutions successfully competed and defeated eminent Western rivals 10 years ago.

Dmitry Larin

Deputy Chairman of the Board

Dmitry Larin

To solve the problem of automating the response to cyber incidents, we chose the Security Vision SOAR solution.

Roman Morozov

The Head of Information Security

Roman Morozov

Security Vision SOAR is the very heart of rapid response.

Marina Pletneva

Leading Project Manager

Marina Pletneva

Interaction with Security Vision IRP will complement the boxed integrations available in KUMA and significantly expand our customers’ ability to automate even the most complex and resource-intensive information security processes, allowing, for example, to build multi-stage incident response chains.

Dmitry Stetsenko

Head of Development of the Unified Cybersecurity Platform

Dmitry Stetsenko