SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Comprehensive vulnerability management

Comprehensive vulnerability management
20.01.2026

Security Vision


We present Security Vision Next Generation Vulnerability Management (Security Vision NG VM), a comprehensive vulnerability management product that includes the detection of vulnerabilities on assets, providing the most detailed information on identified vulnerabilities and recommendations for their elimination (including update automation functionality), a confirmation control process, timing monitoring and SLA. The updated product consists of three main blocks:


   · Asset management, which builds an asset base, including scanning and detecting new assets, their automatic identification, inventory and lifecycle management, as well as performing automated administrative actions;

   · Vulnerability scanning, which provides its own vulnerability detection engine with time-limiting capabilities and the use of scanning windows on Windows/Linux hosts, containerization environments, application software, network devices, databases, etc.;

   · The process of eliminating detected vulnerabilities, including automatic confirmation of removal, autopatching, and integration with external Service Desks.


Asset management


As part of the Asset Management unit, the product provides functionality for automatically detecting and collecting asset data, categorizing and managing them in accordance with ITIL recommendations, as well as performing a wide variety of pre-configured actions on the assets themselves. Assets are automatically combined across subnets. The system builds a network map that is also available graphically.


In addition to scanning, assets can be automatically obtained or enriched from a large number of pre-configured external sources (with the ability to add your own sources and integrations): directory services (Active director, Open LDAP, FreeIPA, Astra Linux Directory, etc.), various SPIs (antiviruses, SIEM, DLP), infrastructure services, files of various formats, etc. Assets can also be created manually.


Various types of assets are pre-configured in the product: servers, armas, network devices, databases, printers, VoIP devices, etc. Each type of device has its own unique attribute composition, cards for visually displaying characteristics and working with the object, as well as its own unique set of actions that can be performed with the asset, both to collect data and to make changes to the device configuration. Each of the preset asset types can be customized: add new attributes, change the display on cards, in tabular lists or trees, adjust the lifecycle process, add new actions for each type of asset.


рис 1.png


рис 2.png


Part of Asset Management is a full-fledged resource and service model, which includes such objects as an Information System, a Business Process, an Application, Equipment, Suppliers, and Products. On place cards, you can fill in their data and build connections between the objects. All objects of the resource-service model can be created manually or downloaded from external systems.


рис 3.png


A large number of new scripts for interacting with assets have been added, which allow you to perform typical actions for obtaining information, administering and changing configurations on Linux/Windows hosts, various types of network equipment and databases.


The product has built-in functionality for managing and monitoring the Software used with the ability to maintain white/black lists, lists of authorized and unauthorized software, as well as centrally manage its updates.


The ability to execute complex scripts with automatic patching is implemented, including the ability to undo changes made.


As part of regular vulnerability database updates, Security Vision additionally provides information about trending vulnerabilities and performs additional checks to detect the most relevant and critical vulnerabilities.


Vulnerability scanning


To find vulnerabilities, the system has its own engine, as well as a built-in vulnerability elimination process with the possibility of flexible customization for each Customer and its internal processes. Scanning can be performed remotely or through your own "agents". It is possible to scan remote segments without direct network access to the server: for this purpose, a separate system component is installed as a service (or a chain of such components) through which all requests are proxied and information is received.


рис 4.png


When scanning for vulnerabilities, a large number of settings are available, including:

   · Scanning modes (fast, file-based, scan depth, etc.);

   · Scan time limits;

   · the ability to specify scan windows with a separate option to wait for the desired window (scan windows can be configured individually for each asset);

   · the ability to specify exclusion nodes for which vulnerability scanning will not be performed;

   · and much more.


Using templates, you can perform regular button scans or scheduled scans.


It is possible to download the inventory results from a file and scan them. This is convenient in the case of geographically remote branches or assets that do not have network access. In this case, a script is provided (for different operating systems) that can be executed on the host. Based on its results, the system will perform a vulnerability scan.


It also supports processing scan results from other vulnerability scanners (both open source and proprietary) with downloading from file reports or via API.


The product is able to search for vulnerabilities in a large number of operating systems, system and application software, as well as network devices. These are Astra Linux, Alt linux, RedOS, Ubuntu, RedHat, CentOS, AlmaLinux, Oracle Linux, Debian, including all possible Debian-based systems, Windows desktop and server versions, application software (including MS Office with click-to-run versions, exchange, sharepoint), databases (MS SQL, PostgreSQL, MySQL, Oracle, Elasticsearch, etc.), network devices (Cisco, Juniper, CheckPoint, PaloAlto, Sun, etc.).


Additionally, the product provides the ability to search for vulnerabilities in Docker containers (both running and stopped) and in container images, including in environments running Kubernetes.


The results are provided in detail for each object (IT asset), as well as for the entire scanning procedure. For each vulnerability, the ratings, description, tags and objects on which it is found are reflected. Recommendations are also reflected, the implementation of which will fix the detected vulnerabilities. Additionally, recommendations for installing security updates and information on operating systems that have been removed from support are provided.


рис 5.png


The vulnerability card contains a full description of the vulnerability obtained from various sources (including expert analytical Internet services), estimates, the attack vector, ways to eliminate the vulnerability (for various operating systems), the presence of an exploit, and many other information.


рис 6.png


Different scanning modes


   · Pentest – detection and verification of the possibility of exploiting network vulnerabilities, the possibility of using the most serious exploits, selecting weak passwords, checking outdated/vulnerable encryption algorithms, etc.

   · Web application scanning – checks for XSS, CSRF vulnerabilities, SQL injection, RFI, Code injection, disclosure of internal information and site settings, selection of weak passwords, user search, as well as checking the exploitation of specific Web vulnerabilities, etc.

   · Retro scan - search for vulnerabilities based on previously obtained data from assets, without connecting to them and waiting for scanning windows. This is the fastest verification mode, which is convenient to use for frequent checks for new vulnerabilities and urgent threats, as well as for spot checks of individual vulnerabilities based on internal and external requests. If there are containers, the scan will also be performed on them.


рис 7.png


The process of eliminating discovered vulnerabilities


The product has several vulnerability management policies built into it (based on CVSS and CIAT metrics of the asset, a custom "Decision Tree", etc.) indicating the SLA for elimination in business or calendar days and the possibility of their full customization for the internal processes of the Customer. Users can choose different scenarios for creating tasks and groupings: for example, create separate tasks for certain vulnerabilities and objects, group all vulnerabilities by one asset in other tasks, and create one task for each vulnerability for all assets where it is found, etc. for individual vulnerabilities.


The created elimination tasks provide complete information on the objects of elimination, detected vulnerabilities, their criticality and other characteristics. Vulnerability mitigation tasks can not only be created inside Security Vision, but also automatically transfer information to external Service Desk / ITSM systems (Naumen SD, Jira OTRS, Redmine, etc.), followed by automatic monitoring of the status of completion for all assigned tasks.


рис 8.png


Separately, it is worth noting the built-in task confirmation mechanism in the product. If the task has been completed, then this is not its final status. During subsequent scans, the system will automatically check whether everything specified in the task has been eliminated. If everything is fixed, the system will switch the task to the "Confirmed" status. However, if any of the vulnerabilities remain unresolved, the system will return the task to work and flag that the task has not been solved.


When fixing vulnerabilities, you can use the automatic "patching" mechanism - by clicking on a button or completely automatically, the system can update the vulnerable software to the current version. Settings for automatic "rollback" of changes in case of their unsuccessful application are also available.


рис 9.png


The product provides the ability to add vulnerabilities to exceptions, which allows you to remove them from statistics and not create elimination tasks for them as part of future scanning procedures.


Recent updates


Added the ability to upload the result of a node vulnerability scan in a machine-readable JSON extension.


рис 10.png


Additional sections with pre-configured filtering have been added so that users can quickly analyze information, in particular:

                a) The "Detected vulnerabilities" section has been added, which contains a list of only those vulnerabilities that were identified based on the results of the scans.

                b) Added the "Exploit vulnerabilities" section, which contains a list of only those vulnerabilities that already have exploits to exploit.


рис 11.png


The capabilities of the mechanism for adding vulnerabilities to exceptions have been expanded, in particular, only selected Common Platform Enumeration (CPE) can now be added to exceptions/Products.


рис 12.png


The list of expert scripts of the Pentest mode has been expanded, the total number of which is more than 80 pieces.


рис 13.png


All expert scripts of the Pentest mode are open. Users can edit them, as well as add any other scripts (without involving a developer).


рис 14.png