SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"

Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
26.03.2025

From the moment a person gets the account on any Internet resource, without knowing it, he becomes a potential target for cybercriminals. In order not to become a victim of scammers or a guinea pig for novice hackers the account need to be protected and additional measures should be used. But not all of them are equally useful.


Director of the Cybersecurity Monitoring Department of Security Vision Nikolai Goncharov told "The Firm's Secret" how the level of security correlates with the level of complexity of the authentication method and what to consider when choosing it.


Read more in the material.

Recommended

Security Vision is a partner of the IT IS conf conference
Security Vision is a partner of the IT IS conf conference
Security Vision opens cybersecurity academy for young generation
Security Vision opens cybersecurity academy for young generation
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision is a partner of InTech Belarus
Security Vision is a partner of InTech Belarus
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR

Recommended

Security Vision is a partner of the IT IS conf conference
Security Vision is a partner of the IT IS conf conference
Security Vision opens cybersecurity academy for young generation
Security Vision opens cybersecurity academy for young generation
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision is a partner of InTech Belarus
Security Vision is a partner of InTech Belarus
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR

Other news

Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
New version of the Security Vision platform: focus on security, manageability and transparency of processes
New version of the Security Vision platform: focus on security, manageability and transparency of processes
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC

Other news

Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
New version of the Security Vision platform: focus on security, manageability and transparency of processes
New version of the Security Vision platform: focus on security, manageability and transparency of processes
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC