SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
08.10.2025

The time when security systems only recorded events is behind us. Modern solutions are able to analyze, predict, and even recommend response scenarios.


Alina Drapeko, Chief Operating Officer of Antitrix, spoke in an interview with CNews about the company's flagship solutions, one of which, the module for verifying the trustworthiness and affiliation of legal entities and individuals, is implemented on Security Vision, the first Low code / No code IT platform in cybersecurity.


The Security Vision platform was chosen as a reliable and flexible core for building scalable security management systems: already used by many market players, it ensures rapid integration into existing processes and unified risk control. The architecture, designed for high-load scenarios, guarantees stable operation when scaling across tens and hundreds of departments, and the Low code approach simplifies the adaptation and development of functionality to customer requirements, including rapidly changing regulatory standards.


Full version of the interview: https://safe.cnews.ru/articles/2025-10-02_alina_drapekoantitriks_v_blizhajshie

Recommended

Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data

Recommended

Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data

Other news

New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"

Other news

New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"