SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Features of the updated Security Vision FinCERT product

Features of the updated Security Vision FinCERT product
30.10.2024

FinCERT's Security Vision automates and optimises interaction with the regulator FinCERT. The product allows you to send real-time notifications of IS events to FinCERT (incidents, attacks and non-consensual transactions), receive queries from FinCERT about the organisation's monitored resources or customers that have been affected by malicious activity, and receive bulletins on current threats and vulnerabilities. The system is designed to meet all FinCERT requirements.

 

рис 1.png

 

Handling incidents and attacks


The product ensures that the regulator is informed of recorded incidents and attacks in a timely and as complete as possible form. The lifecycle fully coincides with the regulator's requirements. Integration allows correspondence with the regulator directly from the incident card without going to FinCERT's personal cabinet, as well as sending and receiving files of all formats. To simplify the creation of incidents, cards can be pre-filled using templates. The entire history of incident actions and communication with the regulator is stored in a timeline.


Working with requests from FinCERT


Checks for regulatory enquiries, with the ability to provide specific information about the results of the incident investigation and actions taken or decisions made. The ability to correspond with the operator without going to your FinCERT account allows you to quickly ask clarifying questions or send required files. The chronology of communication is recorded in a timeline to maintain a complete history of requests.


FinCERT Bulletins


The product allows you to download regular bulletins on current vulnerabilities and threats sent by FinCERT. Flexible scheduling of bulletins and convenient alerts allow you to process the required number of documents in a timely manner.


Reports and Dashboards


The product includes both preconfigured reports that allow you to upload data on individual incidents and attacks, as well as summary reports that show the dynamics of interaction and consolidated information on the processed information.


Dashboard displays key information on incidents logged in FinCERT for a selected period and summary information on the status of current incidents. The operator is able to track in real-time incidents where an error occurred during submission to FinCERT so that they can respond in a timely manner and make the necessary corrections.


Integration with Security Vision products


The product integrates natively with all Secuirty Vision solutions, which allows not only to meet the requirements of the regulator, automating interaction with it, but also to build a full-fledged security complex, taking into account all processes and procedures of the SOC centre.

Recommended

Friendly security for an unfriendly world
Friendly security for an unfriendly world
Authorization
Authorization
10 Popular EDR Bypass Techniques
10 Popular EDR Bypass Techniques
Data-Centric Audit and Protection (DCAP)
Data-Centric Audit and Protection (DCAP)
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
When the database becomes an open book
When the database becomes an open book
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 1
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 1
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities
Technical knowledge of a first-class SOC specialist
Technical knowledge of a first-class SOC specialist
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
CyBOK. Chapter 3. Laws and regulations. Part 1
CyBOK. Chapter 3. Laws and regulations. Part 1
Education in IS. Expectation vs Reality
Education in IS. Expectation vs Reality

Recommended

Friendly security for an unfriendly world
Friendly security for an unfriendly world
Authorization
Authorization
10 Popular EDR Bypass Techniques
10 Popular EDR Bypass Techniques
Data-Centric Audit and Protection (DCAP)
Data-Centric Audit and Protection (DCAP)
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
When the database becomes an open book
When the database becomes an open book
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 1
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 1
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities
Technical knowledge of a first-class SOC specialist
Technical knowledge of a first-class SOC specialist
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
CyBOK. Chapter 3. Laws and regulations. Part 1
CyBOK. Chapter 3. Laws and regulations. Part 1
Education in IS. Expectation vs Reality
Education in IS. Expectation vs Reality