SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision has introduced the updated Security Vision SGRC product

Security Vision has introduced the updated Security Vision SGRC product
10.11.2025

Security Vision has launched an updated Security Vision SGRC product, which includes the Information Security Management (Governance) section. Together with the long-established sections of SGRC Risk Management, Compliance Management, and Business Continuity Management, the Information Security Management section allows for an integrated approach to information security management, providing the following processes:

 -  Forming a list of key roles
 -  Defining the organizational context
 -  Formation of a cybersecurity strategy
 -  Definition of information security management processes
 -  Formation of information security policies and procedures
 -  Monitoring the implementation of information security tasks and activities
 -  Improvement of information security management processes and procedures
 -  Assessment of the current and target information security status


The introductory stage


When starting to develop information security in an organization, it is necessary to form a mission and vision for information security, create a list of key roles and assign employees to them. The product contains the necessary templates for this, with the ability to adjust them taking into account the specifics of a particular organization. Roles will also be highlighted if the employee has not been assigned to them.


Organizational context


The organizational context of an organization is to define the scope of information security, as well as stakeholders, which come in two types:
 -  Internal (various departments, decision makers)
 -  External (information security regulators, partners, shareholders)


The requirements of each of the stakeholders, as well as their priority, are subsequently taken into account to assess information security risks.


Cybersecurity strategy


The cybersecurity strategy is the main document defining the direction of information security development in an organization. At this level, the framework that the organization plans to adhere to is selected. The product offers two main frameworks to choose from: NIST CSF 2.0 and ISO 27001. At the same time, it is possible to create your own framework or combine them with existing ones.


The main risk management elements are also defined, which will be used in the future in assessing and processing information security risks.:
 -  Business risks
 -  Risk management process
 -  Risk management methodology
 -  Risk appetite and risk tolerance


Based on the selected framework, an analysis of the current and target state of information security in the organization is carried out, on the basis of which a strategic plan for further actions is formed. The strategic plan can be flexibly divided into stages depending on the time frame, and at each stage tasks are created for a specific performer. It is convenient to track the progress of tasks and projects on the summary dashboard.


1.png


Information security processes and policies


The list of information security processes is automatically generated after selecting the framework. The product provides typical processes with a description of their stages or necessary actions. Also, private information security policies are linked to most processes, which regulate these processes, as well as define procedures for performing necessary actions within specific processes.


For most policies, including the basic information security policy, the product provides templates that will help you quickly generate final documents.


A continuous process of improvement and revision


To maintain the current state of information security, a flexible approach has been developed in which it is possible to set up notification intervals for the need to review, update or improve the main entities, each of which has the roles of the involved employees configured according to the principle of the RASCI matrix.


Reports and dashboards


In addition to the consolidated dashboard, which is convenient for tracking the current state of information security, the product has developed reports on the main components with the ability to use custom templates, which is especially convenient if the organization has accepted reporting forms.

Recommended

Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures
Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Evgeny Kunin will speak at the conference on information security of the United Shipbuilding Corporation
Evgeny Kunin will speak at the conference on information security of the United Shipbuilding Corporation
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal

Recommended

Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Alexander Padurin will speak at the AM online conference Live "Cybersecurity for Small and Medium Businesses (SMB)"
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures
Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Security Vision and IT Park join forces to develop cybersecurity in the Republic of Tatarstan
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Information security platform Security Vision entered the State System of Detection and Detection of Potential Effects of Computer Attacks (GosSOPKA) registry
Evgeny Kunin will speak at the conference on information security of the United Shipbuilding Corporation
Evgeny Kunin will speak at the conference on information security of the United Shipbuilding Corporation
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal

Other news

Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Security Vision held its first partner conference
Security Vision held its first partner conference
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company

Other news

Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Security Vision held its first partner conference
Security Vision held its first partner conference
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Security Vision presented its solutions to large and medium-sized industrial enterprises in Moscow
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company