SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2

Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
09.09.2025

First in information security Low code / No code platform Security Vision and all modules based on it received a certificate of conformity from the Ministry of Defense of the Russian Federation (No. 7564 dated 08.28.2025) in the information security certification system.

 

During the tests, the actual functional capabilities of the Security Vision platform and modules were confirmed to correspond to those declared in the operational and user documentation. Also, compliance with the requirements of the Guideline document "Protection from unauthorized access to information. Part 1. Software for information security tools. Classification by the level of control of the absence of undeclared capabilities" is confirmed. The document was approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation dated 04.06.1999 No. 114.

 

The received certificate allows the use of Security Vision in protected segments of the information infrastructure in organizations subordinate to the Russian Ministry of Defense, as well as other information systems where the use of information security tools certified according to the second level of control for the absence of undeclared capabilities (NDV 2) is required.

 

The certification applies to the Security Vision platform itself and modules developed on its basis within the framework of a certified configuration. Certified:

 

1. Security Vision platform with content designers (Low-code and No-code): object designer, workflow designer, report designer, widget and dashboard designer, menu and role designer, connector designer.

2. Ready-made modules on the Security Vision platform in any combination, in accordance with the product formula:

   1. Security Orchestration, Automation and Response (SOAR) is a module designed for automation response on information security incidents;

   2. Next Generation SOAR (NG SOAR) – Advanced incident management module;

   3. Asset Management (AM, CMDB) – asset and inventory management module;

   4. Vulnerability Management (VM) – module management vulnerabilities;

   5. Vulnerability Scanner (VS) – scanner vulnerabilities;

   6. Security Profile Compliance – security parameters control module;

   7. Security Information and Event Management (SIEM) – module monitoring information security events;

   8. GosSOPKA – module for interaction with the GosSOPKA regulator;

   9. FinCERT – module for interaction with FinCERT;

   10. Critical Information Infrastructure (CII) – module for managing compliance with Federal Law 187;

   11. Risks Management (RM) – cybersecurity risk management module;

   12. Operational Risks Management (ORM) – operational risk management module;

   13. Compliance Management (CM) – module for managing compliance with regulatory and methodological documents (RMD);

   14. Business Continuity Management (BCM) – business continuity management module;

   15. Threat Intelligence Platform (TIP) – cybersecurity threat analysis module;

   16. User and Entity Behavior Analysis (UEBA) – module behavioral analysis;

   17. Service Desk (SD) – application management module;

   18.  Portal Self-Assessment (SA) – module for managing the state of information security;

   19.  Product based on Low-code / No-code – a module that allows you to use all the designers to create your own blocks and solutions. For technology partners and customers of the company who create their own expert modules.

 

"Security Vision has established itself as a reliable partner in ensuring cybersecurity for the largest government and commercial structures. Obtaining a certificate from the Ministry of Defense of the Russian Federation is an important step confirming compliance with strict security requirements, - noted the General Director of Security Vision Ruslan Rakhmetov. - Security Vision platform is built on the principles of Low-code / No-code. This means that our Customers and Partners can independently adapt products based on it and create new ones that perfectly suit their unique needs. In the current rapidly changing environment, the ability to quickly respond to new threats and adapt protection tools to the specifics of the infrastructure is becoming a critical task. Continuous improvement of products and compliance with strict security requirements brings us closer to our common goal - increasing the country's defense capability."

 

Recommended

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media

Recommended

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media

Other news

Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Security Vision presented advanced information security solutions at a business forum in Belgrade
Security Vision presented advanced information security solutions at a business forum in Belgrade

Other news

Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Security Vision presented advanced information security solutions at a business forum in Belgrade
Security Vision presented advanced information security solutions at a business forum in Belgrade