SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities

Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
30.03.2026

Security Vision has released an update to its platform. Key changes include enhanced APIs and integration scenarios, expanded settings export and migration capabilities, improved analytics and data visualization, refined user forms, and enhanced security controls and auditing. With this release, the company continues to consistently develop the platform, making it a more flexible, visual, and manageable tool for automating cybersecurity processes.

 

API and integration scenarios

 

The API method for retrieving platform objects has been improved: it is now possible to export the properties of objects related to the source object. This expands integration scenarios with external systems and simplifies working with related data during automation and building complex selections.

 

The "Invoke Connector" workflow action now supports overriding the JEA configuration for the PowerShell connector. This provides greater flexibility when configuring integration operations and allows for more precise control over connector script execution parameters.

 

Export and transfer configuration

 

The ability to choose whether to export correlation rule settings with or without a handler has been implemented. This enhancement simplifies the transfer of settings between environments and allows for more flexible creation of export packages tailored to specific implementation and maintenance tasks.

 

The mechanism for setting the "Paste Only" flag in the prepared export package settings has also been improved. The logic for applying this option has become more accurate in relation to the source entity and its child elements, reducing the risk of errors during configuration transfer and making export package preparation more predictable.

 

Data analytics and visualization

 

The platform now allows you to limit the number of data categories on the widget: categories that are not included in the allowed number can be displayed in a single color or not at all, depending on the selected setting. This makes visualization more readable and convenient when working with large volumes of heterogeneous data.

 

An outline feature for object icons has been added to the "Graph" content block. This enhancement improves the clarity of the graphical representation of data and helps better highlight objects in complex diagrams and relationships.

 

Forms and working with linked data

 

A separate editor has been implemented for linked tables configured in input and output forms for properties of the "Table" type. This simplifies working with complex data structures and makes form customization more convenient for platform administrators and users.

 

Security and audit

 

The chat now validates attached files not only by format but also by their signature. This check improves the security of attachments and reduces the risk of downloading unwanted or potentially dangerous files.

 

Additionally, a parameter describing the IP address of the host from which the action was performed in the platform's web interface has been added to audit log entries. This expands the capabilities for monitoring, investigating, and analyzing user activity in the system.

 

These updates are part of Security Vision's long-term strategy to enhance its cybersecurity automation tools. A focus on API development, flexible configuration, and enhanced control allows customers not only to improve the operational efficiency of their information security departments but also to ensure seamless integration of the platform into complex IT infrastructures. The company continues to consistently develop the system's functionality, responding to current market challenges and requests from the expert community.

Recommended

Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Large-scale Security Vision SIEM update
Large-scale Security Vision SIEM update
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers

Recommended

Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Ruslan Rakhmetov's article "Incident management in critical information systems: organizing the process of identifying and responding to information security incidents" was published in CISOCLUB
Large-scale Security Vision SIEM update
Large-scale Security Vision SIEM update
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers

Other news

Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital

Other news

Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
Vladimir Potapov in an interview with RBC: AI is a game changer in cybersecurity
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Nikolay Goncharov on RBC told how to protect account from blocking under 115-FZ
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital