SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics

New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
02.10.2025

Security Vision Company announces the release of a new version of Vulnerability Scanner, which significantly expands the capabilities for vulnerability detection and analysis. The update enhances integration with National Computer Incident Response and Coordination Center (NCIRCC), adds new knowledge bases, expands web scanning functionality, and further optimizes analytics processes.


Interaction with regulators


Particular attention is paid to cooperation with key Russian regulators. NCIRCC bulletins are now automatically uploaded to the system and enrich vulnerability cards with additional information. For the FSTEC methodology, the asset vulnerability criticality level has been calculated, and recommendations for Windows updates (Knowledge Base updates) that have been tested by the FSTEC have been added. All this helps to prioritize tasks more precisely and act in accordance with the requirements of the regulator.


Expanded knowledge base and consideration of real threats


The Vulnerability Scanner knowledge base has become even richer. Additionally, information from the CISA KEV catalog of actively exploited vulnerabilities is considered, and exploitation probability estimates from the EPSS system are also used. This approach allows you to take into account the most pressing threats and predict real risks.


Network equipment audit


The new version has expanded the capabilities of network equipment auditing. Scanning, obtaining data on vulnerabilities and ways to fix them for devices from the largest vendors: Cisco, Huawei, Juniper, Check Point, Fortinet, etc. has been implemented. Data acquisition is available via SSH and SNMP protocols.


CVSS 4.0 support


Added support for the new CVSS 4.0 metric. Thanks to it, the system more accurately and in detail assesses the criticality of vulnerabilities, considering modern aspects of cyber threats. This helps you make informed decisions about fix prioritization.


Exception management


The exception management functionality has been expanded: vulnerabilities and products can now be excluded from scan results for one specific host, as well as for all at once. In subsequent checks, the excluded elements will not be taken into account.


Scan Control


Now, in the product, you can not only plan the "windows" for scanning in advance, but also flexibly manage the process itself. In addition to the delayed launch, the ability to pause or stop scanning has been added.


BlackBox improvements and Web application verification


The functionality of BlackBox has also expanded significantly. New web application security checks have been added, and the management interface allows you to implement more custom scanning scenarios. Verification of weak credentials has now been moved to a separate Bruteforce mode, which is complemented by support for password selection using remote management protocols (RDP, Radmin, NetBIOS) and databases (Sybase, PostgreSQL).


Support for legacy systems


The collection of information about software on legacy systems, such as CentOS 6, Windows Server 2008R2 and 2012R2, etc., has been improved.


Analytics and reporting


New tools have been added for analytics and reporting. Differential reports allow you to compare scan results over time and see the dynamics of corrections. The scan log for each asset keeps a history of changes and helps you quickly figure out what measures have already been taken.


Resume


The new version of Vulnerability Scanner helps information security teams work faster, see the full picture of risks, and make decisions based on up-to-date and reliable information.

Recommended

Spam protection for companies and households
Spam protection for companies and households
Certification and safe development: in simple language
Certification and safe development: in simple language
Scenarios of untyped UEBA attacks
Scenarios of untyped UEBA attacks
What is obfuscation? Part 2
What is obfuscation? Part 2
Masking data to protect personal data
Masking data to protect personal data
Confidentiality, integrity and availability of information
Confidentiality, integrity and availability of information
CyBОК. Chapter 3. Laws and regulations. Part 3
CyBОК. Chapter 3. Laws and regulations. Part 3
ARP spoofing (ARP spoofing, ARP poisoning): what it is
ARP spoofing (ARP spoofing, ARP poisoning): what it is
What is a deepfake, how to recognize it and protect yourself. Part 1
What is a deepfake, how to recognize it and protect yourself. Part 1
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
What is obfuscation? Part 1
What is obfuscation? Part 1
The resource-service model as a way of communicating technology and business
The resource-service model as a way of communicating technology and business

Recommended

Spam protection for companies and households
Spam protection for companies and households
Certification and safe development: in simple language
Certification and safe development: in simple language
Scenarios of untyped UEBA attacks
Scenarios of untyped UEBA attacks
What is obfuscation? Part 2
What is obfuscation? Part 2
Masking data to protect personal data
Masking data to protect personal data
Confidentiality, integrity and availability of information
Confidentiality, integrity and availability of information
CyBОК. Chapter 3. Laws and regulations. Part 3
CyBОК. Chapter 3. Laws and regulations. Part 3
ARP spoofing (ARP spoofing, ARP poisoning): what it is
ARP spoofing (ARP spoofing, ARP poisoning): what it is
What is a deepfake, how to recognize it and protect yourself. Part 1
What is a deepfake, how to recognize it and protect yourself. Part 1
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
What is obfuscation? Part 1
What is obfuscation? Part 1
The resource-service model as a way of communicating technology and business
The resource-service model as a way of communicating technology and business