SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management

New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
14.01.2026

Security Vision introduces updated Vulnerability Scanner, which significantly enhances security monitoring capabilities for corporate infrastructure. This version includes new analytics tools, expanded scanning capabilities, and improved vulnerability identification process management.


A scan log with vulnerability lifecycle tracking
Has been implemented, enabling monitoring of the full lifecycle of each vulnerability on an asset. The system automatically records the date a vulnerability was first detected and calculates its lifetime on the asset. All fixed vulnerabilities are stored in the log for analyzing the security team's performance. The log automatically compares the results of successive scans, highlighting new, resolved, and remaining vulnerabilities, allowing you to see the dynamics of problem resolution over time.

Enhanced support for Russian regulatory requirements.
An updated algorithm for calculating vulnerability severity and determining remediation deadlines has been implemented in accordance with the FSTEC methodology of June 30, 2025. The system takes into account new regulatory requirements and automatically generates recommendations for remediation deadlines, helping organizations comply with current regulatory requirements.

Enhanced network hardware scanning:
Support for network hardware from leading manufacturers has been significantly expanded. Full support for PaloAlto devices has been added. Networks – the system can scan firewalls and next-generation security solutions via SSH, retrieve vulnerability data and remediation recommendations from official vendor sources. For all supported vendors, vulnerability reports are automatically updated with remediation information.

Improved scanning process management.
New scanning task management features have been added: detailed real-time scanning status display with progress indicators, as well as monitoring of running processes with the ability to force them to stop. The interface for creating and managing scan templates has been completely redesigned to make it easier to configure parameters and reuse configurations.

Expanded BlackBox Testing Capabilities:
BlackBox scanning functionality has been significantly expanded. Checks for current critical vulnerabilities in popular libraries and frameworks have been added, along with integration of automated SQL testing tools. Injection, as well as automatic detection of web technologies used for a more accurate attack surface assessment. Specialized modules for security testing of popular DBMSs have been implemented.
The ability to control scanning intensity for both BlackBox and WhiteBox modes has been added. This allows for flexible adjustment of the load on target systems, avoiding overloading critical services during security checks.

Gentoo Support Linux
Added full support for the Gentoo distribution Linux – both as a source of vulnerabilities and for scanning. The system automatically detects installed packages and their versions, comparing them with up-to-date vulnerability data from official Gentoo sources.

APCS Testing:
Support for the Modbus protocol has been added for detecting vulnerabilities in automated process control systems. This allows industrial organizations to conduct a comprehensive security assessment of not only their IT but also their OT infrastructure.

WMI scanning Windows
Added the ability to scan Windows systems via WMI (Windows Management Instrumentation) to obtain information about installed software and updates. WMI scanning is available in both agent-based and agentless modes, providing deployment flexibility across various infrastructures. Extended WMI inventory includes data collection on installed Windows updates (KBs), DNS configuration, and installed applications.

Vulnerability Reachability Graph
A mechanism for constructing a vulnerability reachability graph based on the network infrastructure topology has been implemented. The system automatically analyzes firewall rules and routing, determining which vulnerable systems could be reached by a potential attacker from various points on the network. This allows for a more accurate assessment of real risks and prioritization of vulnerability remediation based on their actual reachability, not just their theoretical criticality.


1.png


Expanded vulnerability assessment and enrichment.
The entire vulnerability database is provided with a Russian translation while preserving the original text, allowing security specialists to work with information in their native language without losing access to the original wording.
Vulnerability cards are enriched with additional metrics and recommendations: exploitation probability assessments, data on vulnerable systems detected on the public internet, and expanded vulnerability remediation recommendations from the National Coordination Center for Cybersecurity and Information Security. All metrics are regularly updated, ensuring the relevance of information for decision-making.
For the FSTEC methodology, vulnerability and asset data is also automatically enriched to meet the regulator's requirements.


2.png


Dynamic Asset Groups and Categorization:
Dynamic asset groups have been implemented, automatically generated based on specified criteria (OS type, version, vulnerability presence, etc.). A directory of asset categories has been added, along with the ability to automatically classify them based on service banners and other characteristics. Automatic infrastructure inventory capabilities have been expanded, including scanning by FQDN list and inventorying various equipment types.


3.png


Results
Updated version of Vulnerability Scanner provides information security teams with significantly deeper capabilities to analyze their security posture, prioritize work based on real threats, and monitor the effectiveness of vulnerability remediation.

Recommended

Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Security Vision held its first partner conference
Security Vision held its first partner conference

Recommended

Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Vision is among the leaders in the international ranking of SOAR systems from SPARK Matrix™
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Security Vision joins forces with NCCCI, FSTEC and FinCERT in the fight against cyber threats
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Security Vision held its first partner conference
Security Vision held its first partner conference

Other news

Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision athletes go to the next level
Security Vision athletes go to the next level
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"

Other news

Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision athletes go to the next level
Security Vision athletes go to the next level
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"