SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"

Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"
16.06.2025

On the next AM broadcast Live Head of Project Management Department Security Vision Evgeniy Bisovko and other speakers will discuss why configuration management is important not only for IT operations, but also for building a sustainable and secure infrastructure. Experts will share approaches to formalizing processes, using CMDB, automation tools, and deviation control. Special attention will be paid to the practice of identifying anomalies, the risks of "drift" and CM integration with information security systems. The broadcast will be useful for information security specialists, architects, operations engineers, and those responsible for the company's IT landscape.


The conference will take place on June 20, starting at 11:00.


You can register for the event here.

Recommended

Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Security Vision is among the leaders in the international SPARK Matrix™ rating
Security Vision is among the leaders in the international SPARK Matrix™ rating
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank

Recommended

Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Security Vision is among the leaders in the international SPARK Matrix™ rating
Security Vision is among the leaders in the international SPARK Matrix™ rating
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank

Other news

Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"
Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
Nikolai Goncharov commented on the new law on telephone and Internet fraud prevention on RBC TV
Nikolai Goncharov commented on the new law on telephone and Internet fraud prevention on RBC TV
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"

Other news

Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"
Evgeniy Bisovko will speak at the AM Live online conference "Control and management of IT infrastructure configurations"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
Nikolai Goncharov commented on the new law on telephone and Internet fraud prevention on RBC TV
Nikolai Goncharov commented on the new law on telephone and Internet fraud prevention on RBC TV
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"
Sergey Zelenin will speak at the AM Live online conference "Career in information security: how to grow and earn more"