SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
08.09.2025

Security Vision is expanding its line of products for small and medium-sized businesses (SMB) and is introducing the Basic CII solution, designed to automate the processes of categorization and protection of critical information infrastructure (CII) objects in accordance with the requirements of Russian legislation.


Security Vision CII Basic automates a number of procedures necessary to meet the requirements for categorizing critical information infrastructure facilities in accordance with RF Government Resolution No. 127, as well as assessing the compliance of critical information infrastructure facilities with the requirements of the by-laws of Federal Law No. 187 "On the Security of Critical Information Infrastructure of the Russian Federation".


The product ensures the formation of lists of critical processes and objects, determination of the category of significance of the OCII, possible sources of threats and actions of potential violators, as well as control over the implementation of the set of measures to ensure security for a significant object. The solution is certified by the FSTEC of Russia, which confirms its compliance with high security standards.


Key Features of Security Vision CII Basic:

• Step-by-step user guidance: simplifies the processes of categorization, threat modeling, compliance assessment and reporting.

• Unified management interface: ensures efficient management of key processes for ensuring critical information infrastructure security.

• Easy All - in - One installation: All components are installed on a single virtual or physical server, speeding up implementation and support.

• Formation of a digital register of critical information infrastructure: creates an up-to-date digital register of critical information infrastructure objects and their resource-service model.

• Budget-friendly license costs: makes the solution accessible to SMBs.


Security Vision will continue to develop the Basic product line for SMBs. The company has previously released Security Vision VS Basic is a comprehensive tool for automating scanning processes, eliminating technical vulnerabilities and monitoring the state of assets from a cybersecurity point of view. Other products in the line for small and medium businesses are currently being developed.


More information about Security Vision CII Basic is available in the section https://www.securityvision.ru/products/kii-basic/. And from the exclusive distributor of Security Vision for the Basic line OCS Distribution.


"We at Security Vision understands how important critical infrastructure protection is for small and medium businesses, and how difficult it can be to comply with all regulatory requirements. That is why we created CII Basic - to make the processes of categorizing and protecting critical infrastructure as simple, clear and accessible as possible. This solution will allow SMBs not only to comply with the law, but also to significantly improve their cybersecurity by protecting assets and business processes. We hope that CII Basic will become a reliable assistant for SMBs in this important matter," commented Marina Gromova, Head of Partner Relations Department, Security Vision.

Recommended

For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Integrating AI into application security solutions: Ruslan Rakhmetov's comments in Forbes
Integrating AI into application security solutions: Ruslan Rakhmetov's comments in Forbes
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision is a partner of Softline Security Summit
Security Vision is a partner of Softline Security Summit
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project

Recommended

For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Integrating AI into application security solutions: Ruslan Rakhmetov's comments in Forbes
Integrating AI into application security solutions: Ruslan Rakhmetov's comments in Forbes
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision is a partner of Softline Security Summit
Security Vision is a partner of Softline Security Summit
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project

Other news

Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty

Other news

Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty