SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

New version of the Security Vision platform: focus on security, manageability and transparency of processes

New version of the Security Vision platform: focus on security, manageability and transparency of processes
08.12.2025

The next release of the Security Vision 5 platform has been released, focused on improving security, manageability and transparency of processes. The update brings enhanced API access control, in-depth logging, improvements in event and incident correlation, as well as significant workflow and interface improvements.


Updating the interface


The design of widget editors and object properties has been updated, input/output forms and group icons have been improved. Everyday scenarios have become easier due to visual consistency and unification of interface elements.


Security and API access


Now you can set a list of allowed IP addresses (whitelist) for API tokens, limiting API access to trusted infrastructure only. An API-only account type has been introduced for integration scenarios. Such users interact with the platform exclusively through the API, without logging into the web interface. Additionally, the secrets (connector passwords, tokens, etc.) stored in the database are re-encrypted using the organization's own master password.


Audit and compliance


The coverage of audit events has been expanded, which increases the reproducibility of actions and meets the requirements for logging. Now the shutdown of schedules and connectors, changes in the status of running workflows, as well as the creation of reports (from the RP and according to the schedule) are recorded. There is a setting of the logging level of actions in running RP for more detailed tracing.


Correlation and incidents


When the correlation rule is triggered, the platform can automatically create an incident and create a separate section with detailed information on such triggers. Criticality has been added to the rules themselves, and alerts have been displayed for workings, which helps to quickly assess the importance and visibility of an event.


Work processes


In the "Connector Call" action, a dynamic connection configuration is available — one block covers different environments and contours without duplication. Corporate chat rooms support messages on behalf of the "system" for uniform service notifications. In tables, you can run one workflow on all selected records at once, which reduces the load and reduces the time for bulk operations.


Analytics and visualization


A circular mode has appeared in the Indicator widget, which allows you to compactly display progress and KPIs. Axis signatures have been added to line and column charts, making graphs and reports more readable.


Administration and rights


In the custom menu type, you can hide the Settings section for the required roles, narrowing the administration surface for non-core users and reducing the risk of erroneous changes.


Filters and navigation


By default, the "Enter into" operator is used in fast filters (except for strings and date-time), which speeds up work with multiple values and directories.

Recommended

SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Security Vision launches a line of information security products for small and medium businesses – Security Vision Basic
Security Vision launches a line of information security products for small and medium businesses – Security Vision Basic
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision athletes go to the next level
Security Vision athletes go to the next level
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs

Recommended

SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Children and AI: Dmitry Semidotsky's comments in "CIPR-2025"
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Security Vision launches a line of information security products for small and medium businesses – Security Vision Basic
Security Vision launches a line of information security products for small and medium businesses – Security Vision Basic
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Security Vision athletes go to the next level
Security Vision athletes go to the next level
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs

Other news

Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Security Vision will become a strategic partner of Kaspersky Industrial Cybersecurity  Conference 2025
Security Vision will become a strategic partner of Kaspersky Industrial Cybersecurity Conference 2025
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025

Other news

Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
Security Vision became a sponsor of the Championship and Championship of Russia in ATV cross-country
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
The Government of the Republic of Tatarstan has strengthened the region's cybersecurity through the implementation of the Security Vision platform
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Welcome to the Security Vision VS Basic SMB Vulnerability Management Solution Webinar
Security Vision will become a strategic partner of Kaspersky Industrial Cybersecurity Conference 2025
Security Vision will become a strategic partner of Kaspersky Industrial Cybersecurity  Conference 2025
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025