SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

New Security Vision VM Product Features

New Security Vision VM Product Features
20.05.2025

Vulnerability Management (VM) scans assets, finds vulnerabilities, and implements a remediation process that includes timing, SLAs, and automatic updates. Security Vision VM consists of three main blocks:


   ·   Asset management, where the asset base is built, including scanning and discovery of new assets, their automatic identification, inventory, lifecycle management and execution of automated administrative actions;


   ·   Vulnerability scanning, which presents its own engine for searching for vulnerabilities on Windows/Linux hosts, containerization environments, application software, network devices, databases, etc., taking into account restrictions on the time of scanning and the use of technological "windows";


   ·   The process of eliminating discovered vulnerabilities, including automatic confirmation of elimination, integration with external Service Desk and auto-patching.


The new version of the product adds vulnerability scanning on iOS devices, as well as Linux systems SUSE, Alpine and Solaris.


For blackbox checks, a mode has been added to scan and detect vulnerable versions of services running on hosts. The mode does not require any credentials and is able to find a large number of vulnerabilities in services such as OpenSSH, SSL/OpenSSL, Nginx, Apache, PHP, LDAP, MSSQL, PostgreSQL, Oracle, MySQL and many others.


New SNMP, SSL/TLS, SSH, Telnet, RCE vulnerability exploitation checks have been added for pentest mode, as well as additional checks for web vulnerabilities. The mechanism for using user dictionaries for bruteforce checks has been improved.


The mechanism of recommendations from various sources for eliminating vulnerabilities has been supplemented, including the display in the vulnerability card of various workaround solutions for Microsoft vulnerabilities.


A new scan mode has been added to the product - standalone Agent. In this mode, a special Agent is installed on remote or isolated hosts, which, when gaining access to the corporate network, automatically requests and receives scan jobs from the central server (including through a chain of similar services - without direct access), and then performs them on a regular basis, sending scan results also when access to the corporate network.


As part of asset management, it is possible to build asset reachability routes automatically using routing rules and ACLs from network devices. The system supports a large number of types of network devices, for example, Usergate, Continent, Cisco, etc. This functionality is extremely important when analyzing identified vulnerabilities, since it allows you to effectively assess the potential risk of exploitation by attackers while moving through the corporate network and the risk of seizing an asset.

Recommended

Data-Centric Audit and Protection (DCAP)
Data-Centric Audit and Protection (DCAP)
What is Bruteforce and how can I protect myself from it?
What is Bruteforce and how can I protect myself from it?
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Flooding: from harmless noise to cyberattack
Flooding: from harmless noise to cyberattack
Basics of Cryptography: what is encryption, hash sum, digital signature
Basics of Cryptography: what is encryption, hash sum, digital signature
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
Testing methods in IS - black box, grey box, white box technologies
Testing methods in IS - black box, grey box, white box technologies
Vulnerability search methods and types of scanners
Vulnerability search methods and types of scanners
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities
Certification and safe development: in simple language
Certification and safe development: in simple language
CyBOK. Chapter 2. Risk management and information security management. Part 2
CyBOK. Chapter 2. Risk management and information security management. Part 2

Recommended

Data-Centric Audit and Protection (DCAP)
Data-Centric Audit and Protection (DCAP)
What is Bruteforce and how can I protect myself from it?
What is Bruteforce and how can I protect myself from it?
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Flooding: from harmless noise to cyberattack
Flooding: from harmless noise to cyberattack
Basics of Cryptography: what is encryption, hash sum, digital signature
Basics of Cryptography: what is encryption, hash sum, digital signature
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
Testing methods in IS - black box, grey box, white box technologies
Testing methods in IS - black box, grey box, white box technologies
Vulnerability search methods and types of scanners
Vulnerability search methods and types of scanners
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities
Certification and safe development: in simple language
Certification and safe development: in simple language
CyBOK. Chapter 2. Risk management and information security management. Part 2
CyBOK. Chapter 2. Risk management and information security management. Part 2