SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5

Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5
20.05.2025

Vulnerability Management (VM) scans assets, finds vulnerabilities, and implements a remediation process that includes timing, SLAs, and automatic updates. Security Vision VM consists of three main blocks:


· Asset management, where the asset base is built, including scanning and discovery of new assets, their automatic identification, inventory, lifecycle management and execution of automated administrative actions;


· Vulnerability scanning, which presents its own engine for searching for vulnerabilities on Windows/Linux hosts, containerization environments, application software, network devices, databases, etc., taking into account restrictions on the time of scanning and the use of technological "windows";


· The process of eliminating discovered vulnerabilities, including automatic confirmation of elimination, integration with external Service Desk and auto-patching.


The new version of the product adds vulnerability scanning on iOS devices, as well as Linux systems SUSE, Alpine and Solaris.


For blackbox checks, a mode has been added to scan and detect vulnerable versions of services running on hosts. The mode does not require any credentials and is able to find a large number of vulnerabilities in services such as OpenSSH, SSL/OpenSSL, Nginx, Apache, PHP, LDAP, MSSQL, PostgreSQL, Oracle, MySQL and many others.


New SNMP, SSL/TLS, SSH, Telnet, RCE vulnerability exploitation checks have been added for pentest mode, as well as additional checks for web vulnerabilities. The mechanism for using user dictionaries for bruteforce checks has been improved.


The mechanism of recommendations from various sources for eliminating vulnerabilities has been supplemented, including the display in the vulnerability card of various workaround solutions for Microsoft vulnerabilities.


A new scan mode has been added to the product - standalone Agent. In this mode, a special Agent is installed on remote or isolated hosts, which, when gaining access to the corporate network, automatically requests and receives scan jobs from the central server (including through a chain of similar services - without direct access), and then performs them on a regular basis, sending scan results also when access to the corporate network.


As part of asset management, it is possible to build asset reachability routes automatically using routing rules and ACLs from network devices. The system supports a large number of types of network devices, for example, Usergate, Continent, Cisco, etc. This functionality is extremely important when analyzing identified vulnerabilities, since it allows you to effectively assess the potential risk of exploitation by attackers while moving through the corporate network and the risk of seizing an asset.

Recommended

How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision presented its experience on the international arena
Security Vision presented its experience on the international arena
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"

Recommended

How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision presented its experience on the international arena
Security Vision presented its experience on the international arena
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"

Other news

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision has accepted participation at Jet Security Conference 2025
Security Vision has accepted participation at Jet Security Conference 2025
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays

Other news

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision has accepted participation at Jet Security Conference 2025
Security Vision has accepted participation at Jet Security Conference 2025
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
We invite you to the webinar "How can small and medium businesses protect themselves from cyberattacks without a full-time information security specialist?"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays