SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures

Nikolay Goncharov shared his opinion on the main challenges in industrial cybersecurity and security measures
26.09.2025

According to a study by Kaspersky Lab and VDC Research, about 40% of enterprises consider timely elimination of vulnerabilities one of the main tasks in industrial cybersecurity.


Nikolay Goncharov, Director of the Cybersecurity Monitoring Department at Security Vision, outlined the main features of ensuring security at industrial facilities and additional ways to protect them.


More information about the study and the commentary can be found at the link.

Recommended

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision continues to confirm leadership among low code/no code platforms
Security Vision continues to confirm leadership among low code/no code platforms
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration

Recommended

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Vision continues to confirm leadership among low code/no code platforms
Security Vision continues to confirm leadership among low code/no code platforms
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration

Other news

Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision is a partner of the conference "Critically important"
Security Vision is a partner of the conference "Critically important"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"

Other news

Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision is a partner of the conference "Critically important"
Security Vision is a partner of the conference "Critically important"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"