SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Alexandr Padurin will speak at PHDays on "Is automatic conformity assessment possible and what does IS architecture have to do with it?"

Alexandr Padurin will speak at PHDays on "Is automatic conformity assessment possible and what does IS architecture have to do with it?"
24.04.2025

In his report, Alexandr Padurin, Head of Presale Management Group, Presale Architect at Security Vision, will examine whether it is possible to design an IS architecture in such a way that assessment is performed automatically, what to look out for and what pitfalls there are.


"Most organisations are in one way or another required to undergo compliance assessment as per the requirements of various regulations and in most cases it is a complex bureaucratic process involving questionnaires, spreadsheets and reports. In my presentation I will explain:

   - What the classic conformity assessment process looks like using one of the most common standards as an example;

   - Why an up-to-date and well-developed asset model is important in this process;

   - How much of this process is helped by automating information asset configuration scanners and why this is not enough;

   - What typical classes of solutions that are present in a comprehensive information security system can provide additional information in assessing compliance and how to automate the collection of such information;

   - What part of the requirements cannot be assessed automatically and what approaches are available to minimise the effort required to assess these requirements;

   - What are the peculiarities when building this process in holdings or in organisations with a large number of subsidiaries and affiliates", - commented Alexander.


 Alexandr Padurin's report will take place on 22 May in Turing Hall 12.

Recommended

The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets

Recommended

The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets

Other news

How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
Security Vision held its first partner conference
Security Vision held its first partner conference
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
SOC Security Vision at Bauman Moscow State Technical University was visited by a delegation from the Republic of Indonesia
SOC Security Vision at Bauman Moscow State Technical University was visited by a delegation from the Republic of Indonesia
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan

Other news

How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
Security Vision held its first partner conference
Security Vision held its first partner conference
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
SOC Security Vision at Bauman Moscow State Technical University was visited by a delegation from the Republic of Indonesia
SOC Security Vision at Bauman Moscow State Technical University was visited by a delegation from the Republic of Indonesia
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan