SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade

Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
24.10.2025

On October 21, Roman Dushkov, Director of International Development at Security Vision, took part in the official Russian-Serbian business mission organized by the Moscow Chamber of Commerce and Industry and the Russian Trade Mission in Serbia.


During the visit, key meetings were held with representatives of local companies and government agencies of the Republic of Serbia, including Boris Bratina, Minister of Information and Telecommunications, and Mihailo Jovanovic, Director of the Office of Information Technology and E-Government.


During negotiations with local customers and potential partners in the field of digital technologies and cybersecurity, Roman demonstrated Security Vision's latest developments in the field of monitoring, analyzing and responding to cyber threats, including solutions that have already been successfully applied in large government and commercial projects in Russia.


"The work of the business mission allowed us to meet directly with potential foreign partners and present our developments and technologies. For Security Vision, this is an important step in expanding the international presence and export of Russian cybersecurity solutions," said Roman Dushkov.


Participation in the mission has become part of Security Vision's strategy to develop international cooperation and promote domestic technologies abroad. The company continues to actively build partnerships in Europe and other regions, offering proven, scalable and adapted to local requirements solutions in the field of information security.


Р.Душков1.jpg

Recommended

Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference

Recommended

Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision and Garda strengthen technological sovereignty
Security Vision and Garda strengthen technological sovereignty
Information security platform Security Vision received the status of a particularly significant project
Information security platform Security Vision received the status of a particularly significant project
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Security Vision has introduced the updated Security Vision SGRC product
Security Vision has introduced the updated Security Vision SGRC product
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision will be a partner of Kaspersky Future Conference
Security Vision will be a partner of Kaspersky Future Conference

Other news

How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision continues to confirm its leadership among low-code platforms
Security Vision continues to confirm its leadership among low-code platforms
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"

Other news

How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
How to manage cyber risk in the supply chain and avoid supply chain attack: comments by Nikolay Goncharov in Cyber Media
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Nikolai Goncharov in the podcast "Change Password!" spoke about the use of LLM in information security
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision continues to confirm its leadership among low-code platforms
Security Vision continues to confirm its leadership among low-code platforms
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"