SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Who and why attacks the public sector: comments by Maxim Repko in Cyber Media

Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
04.09.2025

Russian government structures have been and remain one of the most attractive targets for cybercriminals and hostile groups. The attacks are carried out not only by lone hackers or financially motivated cybercriminals, but also by hostile states. Hacking portals, infiltrating critical infrastructure, stealing data and undermining trust in government institutions - all this is no longer a movie scenario, but an everyday reality. 


Security Vision expert Maxim Repko told the editors of Cyber Media, why hackers attack the public sector, what types of cyberattacks are currently the most popular and gave recommendations for the early detection of hackers in infrastructure.


For more details, read the article.

Recommended

Security Vision is a partner of the conference "Critically important"
Security Vision is a partner of the conference "Critically important"
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage

Recommended

Security Vision is a partner of the conference "Critically important"
Security Vision is a partner of the conference "Critically important"
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage

Other news

Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025

Other news

Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
New version of Vulnerability Scanner from Security Vision even more sources, checks and analytics
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025