SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results

Security Vision: A Course toward Technological Sovereignty and Sustainable Security. 2025 Results
30.12.2025

Dear friends! 2025 has become a year for Security Vision is experiencing a period of systematic strengthening: from technological upgrades to growing trust among companies, government agencies, and think tanks. We believe that behind every achievement lies a central goal: making the digital environment reliable, accessible, and transparent. Therefore, our company continues to invest not only in product development but also in specialist training and educational initiatives for children and adolescents. This balance of technological development and social responsibility defines Security Vision course for the Future – it is a course aimed at the sustainable development of digital security in the country.


We present to you the key results achieved this year thanks to the work done and your trust.



Technological evolution and expansion of the product line


This year, we focused on the qualitative development of our flagship solutions and the creation of new ones:


Availability of No-Code Security Vision Platform for third-party developers: Our company provided them with a full set of tools for rapid development and deployment of solutions and comprehensive support for the successful launch of their products. Thanks to the certification of the Security Vision platform - based products are automatically trusted by regulators (FSB, FSTEC, and the Ministry of Defense) and comply with state standards. This significantly simplifies the process for partners to bring new information security solutions to market.


Deep modernization of flagship products Security Vision SOAR, VM, SIEM, TIP, SGRC: They have undergone a significant evolution, becoming even more effective under high load conditions.


Key updates:


SOAR

In Security Vision SOAR now includes AI assistants in the form of various models and a chatbot trained on global incident response best practices. The solution now includes an agent component: a built-in EDR allows for expanded on-site response. The built-in assistant responds to queries based on the context of a specific incident: its phase, related objects, action history, associated bulletins, etc., helping analysts interpret events and make decisions more quickly. The product now includes an ML scoring model that helps determine incident severity and ensures faster prioritization in the SOC, a model for analyzing similar incidents, triage, documentation search, and more. Read more .


VS

In Security Vision Vulnerability Scanner's vulnerability detection and analysis capabilities have been significantly expanded, integration with the National Center for Cybersecurity (NCCS) has been strengthened, new knowledge bases have been added (including our own daily updated database), and analytics processes have been optimized. Read more .


SIEM

Security Vision SIEM includes a powerful correlation engine with an extensive rule base and ML models. Flexible data collection and No-Code event normalization from multiple sources eliminates application boundaries. This significantly improves the accuracy of threat detection, false positive prediction, and incident severity assessment. The platform offers advanced incident response capabilities, retrospective rule validation, and a single monitoring pane of glass for continuous security improvement. Read more .


TIP

In Security Vision TIP has launched another deep cyber threat intelligence engine, the second match, which reduces false positives by enriching the context of indicators of compromise. The product comes with a comprehensive package of free feeds (50,000 IoCs daily), including feeds from the Federal Service for Technical and Export Control of Russia (FSTEK), the National Center for Crime Prevention (NKTsKI), and FinCERT, which take into account the specifics of attacks and threats to the Russian market. Bulletin management has been improved: automatic integration and ML processing automate strategic planning. Read more .


SGRC

With the addition of the "Information Security Management (Governance)" module, the solution has become a comprehensive tool for building an information security strategy – from role modeling to process maturity assessment. Read more .


Of particular note is the rapid development of the Critical Information Infrastructure module, which is part of the SGRC. The updated Security Vision СII is designed for the automated implementation of critical information infrastructure (CII) legislative requirements. The product automates the processes of listing and categorizing critical information infrastructure (CII) objects, threat modeling, assessing compliance with information security requirements, and processing regulatory requests. It is suitable for both small businesses and large geographically distributed enterprises, generating all necessary reporting documents in accordance with the requirements of the Federal Service for Technical and Export Control (FSTEC) of Russia. Read more .


Creating Security Vision ASOC: We have launched the first domestic platform in its class for managing secure development, covering all stages of the SSDLC. Read more .


Accessibility of technology: the launch of the Security Vision Basic line enabled small and medium-sized businesses to quickly upgrade their information security processes to a qualitatively higher level. Read more .



Market confidence and scale of presence


The year's results, in figures, confirm the maturity of our solutions and their relevance in the most critical areas of the economy:


Working with market leaders: today's customers of Security Vision are more than 40 out of 100 largest companies in Russia.


Leadership in the financial sector: our technologies are used 15 of the Top 20 the largest banks in the country.


Development of the service model: 16 MSSP providers have chosen our platform as the technological basis for providing information security services to their clients.


Affiliate network: We have expanded our circle of professional support by forming a network of 30+ certified partner companies.



State recognition and technological sovereignty


Security Vision confirmed its status as a strategic partner in matters of national digital security:


Cooperation with key regulators: Under agreements with the National Coordination Center for Cybersecurity, the Federal Service for Technical and Export Control (FSTEC), and FinCERT, we are developing a rapid exchange of threat intelligence. Our users receive thousands of up-to-date indicators of compromise daily. Read more .


Compliance with the highest standards: Security Vision Platform has been certified by the Federal Security Service (FSB), Federal Service for Technical and Export Control (FSTEC), and the Ministry of Defense, opening the door to the use of its products in the most secure infrastructure segments.


Conclusion of the 8th Center of the FSB of Russia


The Conclusion of the 8th Center of the FSB of Russia 149/3/6/908 dated October 1, 2024, received back in 2024, permits the use of Security Vision in special-purpose ITCS, created in accordance with the requirements of the FSB of Russia and processing restricted information that does not contain information constituting a state secret.


Certificate of Conformity of the Federal Service for Technical and Export Control of Russia


The FSTEC of Russia Certificate of Conformity for Trust Level 4 (No. 4964 dated August 19, 2025) permits the use of Security Vision at critical information infrastructure facilities up to and including category 1 of significance (Order of the FSTEC of Russia dated 25.12.2017 No. 239), in government information systems up to and including security class 1 (Order of the FSTEC of Russia dated 11.02.2013 No. 17), in automated control systems for production and technological processes up to and including security class 1 (Order of the FSTEC of Russia dated 14.03.2014 No. 31), in personal data information systems up to and including security level 1 (Order of the FSTEC of Russia dated 18.02.2013 No. 21).


Certificate of the Russian Ministry of Defense


Certificate No. 7564 of the Russian Ministry of Defense dated August 28, 2025, permits the use of Security Vision in protected segments of the information infrastructure in organizations subordinate to the Ministry of Defense, as well as other information systems that require the use of information security tools certified to the second level of control for the absence of undeclared capabilities (NDV 2).


Status of a project of particular significance: Security Vision solutions included on the list of the Ministry of Digital Development of Russia as critical to the country's technological sovereignty.


Inclusion in leading technology banks: the platform entered in the Moscow Technology Bank Solutions Catalog And in the Register of Innovative AI Solutions for Industrial Digitalization with the support of the Ministry of Industry and Trade .



Expert assessments and global rankings


The quality of our developments in 2025 was confirmed by leading analytical centers:


Stable leadership: For the second year in a row, the company has entered Top 3 Center for Strategic Research in the category "Infrastructure Protection Tools", confirming 1st place in the segment SOAR in the Russian Federation .


Recognition in the No-code category: Security Vision platform took 3rd place in a study by Skolkovo and TAdviser And 4th place In the Market . CNews rating , it received high scores for flexibility and integration capabilities. It's important to note that both ratings included all known No-Code platforms in the Russian Federation, regardless of their application area.


International recognition: Security Vision became one of the leaders in SPARK Matrix™ 2025 in two ratings of the international analytical company QKS Group: Exposure Management And Security Analytics and Automation . QKS experts noted the maturity, flexibility, and effectiveness of Security Vision solutions, as well as their extensive No-code/Low-code capabilities.



Education and enlightenment


We believe that the industry's development is impossible without educational activities and investment in human capital. Our achievements in this area include:


Representation in major media: This year, Security Vision experts has given numerous interviews and comments on information security issues to the largest business, socio-political and professional media outlets, including RBC, Forbes, Kommersant, Vedomosti, Izvestia, Radio Rossii, Business FM, Arguments and Facts, Expert, Public News Service, Secret Firmy, CNew, TAdviser , Anti-Malware and many others. And about successful experiences with implementing and using Security products. Vision was presented to the media by the heads of Russian Post, Agroeco, Mosoblbank, Chernogolovka Group of Companies, the Tyumen Region Information Technology Center, Genbank, and Spicatel. Read more .


Expansion of strategic partnership with Bauman Moscow State Technical University: As part of the Cybersecurity Monitoring Center (SOC), which was created to ensure the university's information security, students and participants in continuing professional education programs gain practical experience in dealing with real incidents. Read more .


Webinars on the practical application of Security Vision products: This year we held More than 20 webinars , during which they clearly demonstrated how our solutions help solve pressing information security challenges.


Cybersecurity Academy Security Vision: created a free one educational platform for children, students and applicants .


Promoting cyber hygiene among children and adolescents: Together with the children's cities of professions Kidburg and KidZania, we continue to develop a global project to teach children and adolescents how to safely navigate the information security environment and promote the profession of information security specialist. This year, we:

     • We have opened new Security Vision Cybersecurity Centers, so now 10 Cybersecurity Centers operating in Kidburgs across Russia, plus one in KidZania. Read more .

     • We have updated educational activities in the Centers .

     • The All-Russian Cybersecurity Day was held .

Recommended

Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision is among the leaders in the international SPARK Matrix™ rating
Security Vision is among the leaders in the international SPARK Matrix™ rating
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser

Recommended

Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Automation of incident handling via SOAR platforms: article by Ruslan Rakhmetov in CISO CLUB
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Alexander Padurin will speak at the AM Live online conference "How to build the vulnerability management process"
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Increase in attacks on Android devices: Maxim Repko's comments in Kommersant
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision introduces ASOC, a unified secure Development management platform
Security Vision is among the leaders in the international SPARK Matrix™ rating
Security Vision is among the leaders in the international SPARK Matrix™ rating
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser

Other news

Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"

Other news

Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
What the court's decision to verify the authenticity of websites may lead to: Ruslan Rakhmetov's comments in Forbes
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
We invite you to the webinar "How to manage vulnerabilities without chaos: functionality of the Security Vision scanner in detail»
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
How dangerous is it to connect to Wi-Fi in public places: comments by Viktor Goncharov in Komsomolskaya pravda
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"