SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Large-scale Security Vision SIEM update

Large-scale Security Vision SIEM update
16.12.2025

Security Vision announces the release of the SIEM product update, a unified security event analytics platform designed for companies of all sizes. The solution ensures the implementation of key processes for monitoring and responding to information security incidents:

 •  collecting and storing events from IT assets;

 •  correlation of events and identification of alerts indicating attempts to implement information security threats;

 •  Incident investigation and handling in a single operational loop.


The product is based on a single No-Code Security Vision 5 platform, which simplifies scaling and customization to meet the needs of each Customer, as well as provides opportunities to expand response scenarios, including through seamless integration with other Security Vision products.


Key components of the Security Vision SIEM


Scanning, identification and inventory of IT Assets


As part of Security Vision SIEM, a fully functional Assets Management module is available, which forms a single up-to-date showcase of IT assets. The module provides scanning, identification and inventory of hosts and services, asset group management and categorization by criticality and roles. This provides Analytics, when investigating incidents, the context of which asset is affected, which segment it belongs to, and what business significance it has.


The system is also able to detect and scan assets without directly connecting to their network segments: for these purposes, a separate dedicated connector service component is installed, through which (or through a chain of similar services) asset data is detected and collected from remote network segments.


рис 1.png


Additionally, Assets Management includes the management of whitelisted and blacklisted software, as well as the functionality of building reachability routes between assets based on routing tables and ACLs. Due to this, SOC specialists can assess how an incident on one node can affect other systems, how likely it is to reach critical assets and strategic systems, and which isolation points will be most effective.


Collecting events from multiple data sources


The system collects events from sources via a remote connection or using agents. Additionally, it is possible to use autonomous agents that receive data collection tasks and forward all accumulated events as soon as a connection to the corporate network is established. Remote data collection can be performed without direct access to end devices from a central server – through a chain of separate connector services distributed over separate segments of the corporate network.


Event source management is implemented based on the task management mechanism for standard profiles, which makes it possible to reuse settings and quickly scale the connection of new sources. The product includes ready-made profiles for various collection methods (for example, WMI, Syslog, JDBC/DBC, HTTP).


рис 2.png


The following functionality is also available in the Task Management console:

 •  automatic configuration and management of logging on hosts;

 •  automatic agent installation and management.


According to the created tasks, the system visualizes event flows on an interactive graph, with the volume of received or sent data and EPS displayed for each node. The system is able to track flows from all primary event sources, even those that are collected centrally via WEF or syslog. This ensures detailed control of the completeness of the collection, the search for bottlenecks and the diagnosis of problems.


рис 3.png


The platform includes mechanisms for optimizing the use of memory and disk space when storing received events. For example, you can set different retention periods for different types of events, or disable full logging mode for individual types and store only events necessary for the operation of correlation rules.


Normalization in No-Code format


The product includes normalization schemes for all popular log sources (such as Microsoft Server, Exchange Server, Syslog, DNS, VMware, 1C, Kubernetes, PostgreSQL, and others), which makes it possible to quickly connect the Customer's infrastructure to SIEM and receive normalized events.


рис 4.png


At the same time, for non-typical scenarios, normalization schemes in connectors can be edited and new ones created in No-Code mode, using additional enrichment and calculating the total values in variables in real time. Thus, the solution easily adapts to any infrastructure and has a low entry threshold for specialists.


Powerful correlation engine and rich rules expertise


Security Vision SIEM implements a high-performance correlation engine and a graphical No-Code correlation rule editor that does not require learning any syntax for setting rules and conditions, and provides the ability to work through a graphical interface:

 •  build rules with multilevel nesting of filter conditions;

 •  use complex sequences and conditions for the ratio of blocks to each other, including unlimited nesting of building blocks of various types;

 •  set conditions for blocks and bundles in the chain, including "denial" type scenarios (when the absence of an expected event is a signal, including for the first event in the chain – an example for a golden ticket);

 •  when events arrive from different sources in a disjointed order, the system performs time synchronization and supports the retrospective restoration of chains for correct processing.


рис 5.png


There are over 1000 correlation rules available out of the box, covering 73% of MITRE ATT&CK techniques. All rules are accompanied by mapping both on MITRE ATT&CK and on the FSTEC database. 

 

The correlation engine is capable of operating under heavy loads (more than 100K EPS) and is significantly optimized for operation on small resources used. 

 

Incident response


To investigate incidents, the product provides an incident card in which the analyst can access:

 •  Information about related assets — with the ability to perform response actions directly from the incident card;

 •  Information about identified artifacts (for example: process, external IP, URL, etc.);

 •  Expert recommendations on how to respond to this incident;

 •  Chat for interaction with colleagues and the response team;

 •  Data on initial alerts and events;

 •  The functionality of creating tasks, including in external ITSM with two-way integration, the ability to send and receive emails, sending messages to messengers.


рис 6.png


This set makes it possible to perform basic response actions from a single SIEM console. Integration with Security Vision SOAR and NG SOAR products is available for enhanced response.


The product includes a number of ML models:


 •  False Positive Scoring – the model is trained on data from closed incidents, and when a new incident arrives, the system evaluates how similar it is to previously closed ones with a verdict of False positive and outputs the result as a percentage match.;

 •  Similar incidents – the model analyzes the context of the incident, looks for and shows similar cases. This allows the analyst to both see similar incidents that are currently in progress and see how similar situations have been handled in the past.;

 •  ML criticality scoring – the service evaluates the criticality of an incident based on signs reflecting the mass and significance of the affected assets, taking into account the context of the alerts associated with the incident.


The results of all ML models are available in the incident card for convenient investigation and response.


Retrospective verification of correlation rules


In Security Vision SIEM, you can check correlation rules based on historical data: you can run a set of rules based on events that have already been collected and see how it would work. This simplifies quality control of changes and helps to find traces of previously undetected attacks after new rules and hypotheses appear, or conditions are adjusted, new IOCs are added, checks, etc.


рис 7.png


Single status monitoring window


The product includes a set of dashboards and reports, as well as a built-in constructor that allows you to create your own reports and dashboards in No-code mode, set up schedules for automatic uploading and sending via any communication channels.


A monitoring dashboard is implemented separately, which brings together key metrics of SIEM operation on one screen. The dashboard helps you quickly assess the current state and dynamics of changes in the "health" of the system, identify anomalies in the flow of events, problematic sources and rules with increased noise in order to take prompt action.


рис 8.png


Key advantages of Security Vision SIEM:

 •  Flexible and manageable data collection: built-in profiles and a task engine allow you to quickly scale the connection of typical sources;

 •  Normalization of popular sources "out of the box" with the possibility of customization in No-Code mode;

 •  More than 1000 correlation rules covering 73% of MITRE ATTACK techniques;

 •  Unified work area for investigation and response: the incident card combines events/alerts, artifacts, related objects, recommendations, communications, and tasks;

 •  Built-in ML analytics: models help to focus attention on the most important incidents.

Recommended

What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Security Vision presented its experience on the international arena
Security Vision presented its experience on the international arena

Recommended

What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Security Vision presented its experience on the international arena
Security Vision presented its experience on the international arena

Other news

The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Security Vision has released a platform update
Security Vision has released a platform update
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project

Other news

The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Security Vision has released a platform update
Security Vision has released a platform update
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project