SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security

Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
23.07.2025

The Security Vision cybersecurity monitoring department Nikolay Goncharov took part in the Kaspersky Lab conference "CyberCamp". In his report "The world in which SOC works" he spoke about modern cybersecurity monitoring centers and how they use artificial intelligence.


After the presentation, the producers of the documentary and conversation podcast "Change Password!" invited Nikolai Goncharov to tell what is happening in the field of machine learning in terms of computer security, threats and protection against them. Nikolai shared what is behind the recent surge of interest in AI, where language models for SOCs come from and how machine learning helps in the fight against attacks.


You can read more about the episode here. Nikolai's speech starts at 20:00.

Recommended

Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Security Vision has released a platform update
Security Vision has released a platform update
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"

Recommended

Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Security Vision has released a platform update
Security Vision has released a platform update
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"

Other news

Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision introduces ASOC, a unified secure Development management platform
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Security Vision is a partner of the IT IS conf conference
Security Vision is a partner of the IT IS conf conference
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware

Other news

Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision introduces ASOC, a unified secure Development management platform
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Security Vision is a partner of the IT IS conf conference
Security Vision is a partner of the IT IS conf conference
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware