SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision VS Basic features

Security Vision VS Basic features
14.05.2025

Security Vision announces the launch of a line of information security products designed specifically for small and medium-sized businesses (SMB). The flagship solution of the line is Security Vision VS Basic - a comprehensive tool for automating scanning processes, eliminating technical vulnerabilities and monitoring the state of assets from a cybersecurity point of view.


Security Vision VS Basic will allow small companies (up to 500 IP addresses) to proactively identify and eliminate weaknesses in their IT infrastructure before attackers can exploit them. The solution provides a clear assessment of the overall level of system security, helps to identify the most critical threats and ensures compliance with strategic security requirements, creating a reliable foundation for effective vulnerability management. Security Vision VS Basic supports the full vulnerability management cycle, including the ability to assign tasks to IT services and monitor their timely execution within the Security Vision VS Basic interface, as well as integration with third-party ITSM/SD systems.


Security Vision VS Basic includes the key functionality of the classic VS (vulnerability scanning), VM (vulnerability management) and AM (asset and inventory management) modules, with the exception of the advanced management of platform constructors, which are provided in the Security Vision VS solution for the Enterprise segment.


The Security Vision VS Basic line is designed to scan from 100 to 500 IP addresses.


The key advantages of Security Vision VS Basic:

   •   Includes all the necessary tools for asset management, scanning and vulnerability management out of the box.

   •   Quick installation and easy support due to deployment on a single virtual or physical server.

   •   Daily updates of the vulnerability database from the Security Vision expertise center, including information on trending threats.

   •   Built-in set of connectors for quick integration with the existing infrastructure.

   •   A special lightweight version of the platform to simplify operation and implementation.


The solution is certified by the FSTEC of Russia.


"In the current reality, having complete information about vulnerabilities and having tools for processing and eliminating them is a task that is as important for SMBs as it is for large companies," says Security Vision Commercial Director Ekaterina Cherun. "Our new product line, in particular Security Vision VS Basic, will allow small and medium-sized companies to obtain at an affordable price the capabilities and expertise that previously only large businesses could use."


Other products in the Security Vision Basic line are currently being developed to meet customer needs in the area of ​​incident management and compliance monitoring.


More detailed information is available at https://www.securityvision.ru/products/vs-smb/ and from authorized partners.

Recommended

Investigation of incidents and use of specialized tools
Investigation of incidents and use of specialized tools
Dynamic behavioral analysis and its tools
Dynamic behavioral analysis and its tools
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
Everything you wanted to know about web tokens, but were afraid to ask
Everything you wanted to know about web tokens, but were afraid to ask
Testing methods in IS - black box, grey box, white box technologies
Testing methods in IS - black box, grey box, white box technologies
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
What is Internet fraud (scam), what to be wary of and how to protect yourself
What is Internet fraud (scam), what to be wary of and how to protect yourself
Out of the box: alienable correlation mechanism
Out of the box: alienable correlation mechanism
CyBOK. Chapter 1: Introduction
CyBOK. Chapter 1: Introduction
What are sniffers and how are they used
What are sniffers and how are they used
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works

Recommended

Investigation of incidents and use of specialized tools
Investigation of incidents and use of specialized tools
Dynamic behavioral analysis and its tools
Dynamic behavioral analysis and its tools
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
What is the Trusted Platform Module (TPM Module) and how is it used to ensure the cybersecurity of endpoints?
Everything you wanted to know about web tokens, but were afraid to ask
Everything you wanted to know about web tokens, but were afraid to ask
Testing methods in IS - black box, grey box, white box technologies
Testing methods in IS - black box, grey box, white box technologies
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
What is Internet fraud (scam), what to be wary of and how to protect yourself
What is Internet fraud (scam), what to be wary of and how to protect yourself
Out of the box: alienable correlation mechanism
Out of the box: alienable correlation mechanism
CyBOK. Chapter 1: Introduction
CyBOK. Chapter 1: Introduction
What are sniffers and how are they used
What are sniffers and how are they used
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works