SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

How the Security Vision Platform has changed for the 2025 year: main highlights

How the Security Vision Platform has changed for the 2025 year: main highlights
22.01.2026

Security Vision summarized the development of the Security Vision 5 platform (SV 5) for 2025. During this period, 12 updates were released, including over 300 improvements. Key priorities included managed automation, expanded integrations and data sources, and improved manageability and usability of the platform in corporate infrastructures.

 

Key results for 2025

 

Development of the Security Vision Platform 2025 focused on five practical areas:

 · Automation and orchestration: more managed workflows and scenarios without manual routine.

 · Integrations and data collection: Expanding connectors and network flexibility for real-world use cases.

 · Security and control: strengthening access mechanisms, auditing and transaction security.

 · Interface and visualization: improved dashboards, widgets, object cards, and editors for daily work.

 · Deployment and Maintenance: More standardized scenarios for system installation and diagnostics.

 

Key updates by area

 

Automation and workflows. Workflows continued to evolve in 2025, with the addition of synchronous launch scenarios, execution result return mechanisms, and a parameter library. Connector invocations from workflows also became more flexible, and performance-impacting scenarios were optimized.

 

Integrations and connectors. The platform has expanded its connectors and network conditions, including new telemetry sources and additional query settings. This improves the completeness of data for investigations and analytics and reduces the number of manual workarounds in integration chains.

 

Safety and controllability. Over the course of the year, improvements were implemented in access control and auditing, including additional audit events, improved log settings, and mechanisms for restricting API access.

 

UX and visualization. In 2025, dashboard and widget workflows were improved, including time-range filtering and enhanced map visualization. Updates to editors and object cards made day-to-day operations faster and more predictable.

 

Deployment and operation. Delivery and installation options have been expanded, and certain deployment and maintenance scenarios (including installation logging) have been simplified. This reduces the complexity of implementation and speeds up operational diagnostics.

 

Practical impact for customer teams

 

The 2025 updates provide measurable value to key roles:

 ·  SOC and Analytics: Gain context on events and incidents faster with improved dashboards, widgets, and visualizations.

 ·  IR and investigations: reducing manual operations through the development of automation and managed workflows.

 · Administrators and Operations: More transparent and expanded installation and maintenance scenarios, enhanced auditing and API access control.

 

"By the end of 2025, the Security Vision 5 platform has strengthened its automation and integration capabilities and received a number of improvements in manageability and operation. These updates are aimed at reducing manual operations and increasing process predictability for SOC and IR teams," – the Security Vision Product Team noted.

Recommended

For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar

Recommended

For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar

Other news

Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
New version of the Security Vision platform: focus on security, manageability and transparency of processes
New version of the Security Vision platform: focus on security, manageability and transparency of processes
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR

Other news

Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
New version of the Security Vision platform: focus on security, manageability and transparency of processes
New version of the Security Vision platform: focus on security, manageability and transparency of processes
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR