SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision announces the release of a new version of the cybersecurity Threat Analysis and Cyber Intelligence (TIP) product

Security Vision announces the release of a new version of the cybersecurity Threat Analysis and Cyber Intelligence (TIP) product
17.11.2025

The Threat Intelligence Platform (TIP) product based on the Security Vision 5 platform meets the needs of each TI level. The solution helps to look for signs of attacks based on behavioral indicators and build an enterprise information security strategy in the long term, taking into account current threats and risks.


TIP provides the following functionality:


 · Receiving a stream of events from solutions of various classes (SIEM, NGFW, Proxy/e-mail server, data lakes, etc.), due to the large number of ready-made connectors, support for universal formats (Syslog, CEF, LEEF, EMBLEM, Event log), as well as a convenient constructor that allows you tocode to set up new integrations;

 · Automatic loading of all levels of indicators: technical (hash amounts, IP addresses, URLs, domains, e-mail, masks), tactical (registry keys, processes and JARM), operational (vulnerabilities, VPO, user data, etc.) and strategic;

 · Integration with dozens of different commercial and open-source feeds;

 · The ability to enrich both from external sources (VirusTotal, Shodan, LOLBAS, Kaspersky Parentip, IPGeolocation.io and others), and from embedded MITRE ATT&CK sources;

 · Integrated response and interaction with SPI, in particular, launching actions from an incident and an analytical graph of relationships, without the mandatory use of SOAR for automation;

 · Advanced indicator detection mechanics: phishing and DGA mechanisms using machine learning, match in the event stream, and retro-search through all collected data or specific IOCs.


In the new version of the product:


 · The deep cyber threat analytics engine second match has been significantly improved. It provides secondary verification of Compromise Indicators (IoC). The mechanism uses additional correlation with external systems (SIEM, VM, IDS) and internal data sources, which allows the formation of contextually enriched events, reducing the number of false positives, improving the quality of triage and increasing the effectiveness of incident response.

 · A package of feeds from Security Vision is integrated, with a daily update of about 50K IoC. It is available without a subscription and without a limit on the number of requests via the API or web interface (including in the customer's personal account). This package has key and operational feeds that allow you to immediately apply all TIP functionality out of the box. It also includes feeds from the Database of Information Security Threats of the FSTEC of Russia, NCCI, FinCERT, which take into account the specifics of attacks and threats for the Russian segment. By receiving Russian expertise in the form of feed data, you can use TIP to switch from a manual and reactive approach to a proactive one, when threats relevant to the Russian segment are automatically detected in your network as soon as possible.

 · Added support for more than a dozen new feed sources. New cyber intelligence data sources improve the elements of data analysis and exchange, improving the overall TIP user experience.

 · In order to make strategic decisions, the TIP product pays a lot of attention to working with newsletters. They help identify trends and plan an infrastructure protection strategy by providing operational information for analysts about new threats with descriptions of compromise indicators (malicious file hashes, suspicious IP addresses and domains, malicious URLs), tactics, techniques and procedures according to the MITRE methodology (i.e. how exactly an attacker acts and what he uses for his own purposes illegitimate actions), impact assessments, and recommendations for response. The product continues to develop the implementation of automatic integration and receipt of newsletters from individual suppliers and aggregators. ML models allow you to automatically process bulletins and link them to specific detection indicators with the ability to view them from the incident card or from the investigation graph.


The match analytical engine has been optimized to work on large data streams (from 100K EPS). The product also adds the possibility of an agent-based data collection scheme from individual high-load servers or collector servers, which also optimizes the processing of data flows.


рис 1.png


Recommended

Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal

Recommended

Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Ruslan Rakhmetov told Forbes what threats the use of open source code poses
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
The latest version of the Security Vision 5 platform has been unveiled
The latest version of the Security Vision 5 platform has been unveiled
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Matvey Sinev will speak at PHDays with a report "Windows Inventory via SSH"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Ruslan Gritsenko and Veronika Pyanova will speak at PHDays with a report "Custom product development according to customer requirements based on No Code / Low Code platform"
Security Vision presents an affordable SGRC solution for medium and small businesses
Security Vision presents an affordable SGRC solution for medium and small businesses
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
Large-scale Security Vision NG SGRC Update: Comprehensive Governance for Strategic Security of Organizations
How to react to cyber incidents: Roman Dushkov's article in BIS Journal
How to react to cyber incidents: Roman Dushkov's article in BIS Journal

Other news

Security Vision opens cybersecurity academy for young generation
Security Vision opens cybersecurity academy for young generation
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust

Other news

Security Vision opens cybersecurity academy for young generation
Security Vision opens cybersecurity academy for young generation
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Cybersecurity 2025: Security Vision experts reveals secrets of protection at "Moscow digital technologies"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
Security Vision will be a partner of the conference "Cybersecurity as the foundation of digital society and business"
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
The USSC SOC has expanded its technology stack with the introduction of Security Vision SOAR
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
New threats, methods of cybercriminals and the most attacked industries: interview with Nikolay Goncharov on RBC Company
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust