SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring

Security Vision announces the release of the SOAR update: local AI assistant, ML summary and ML scoring
15.12.2025

Security Vision SOAR is a comprehensive solution for managing and automating information security incident handling at all stages of the lifecycle according to NIST/SANS best practices: preparation, detection, analysis, containment, elimination, recovery, and post-incident.


Key Features of Security Vision SOAR

 ·  An object-oriented approach to responding: each element of an incident (host, account, process, artifact) is considered as an object with its own attributes, history, relationships, and available actions.

 ·  Dynamic playbooks: Investigation and response scenarios adapt as the context of an incident changes — as new facilities, MITRE ATT&CK techniques, analysis results, and enrichment become available.

 ·  Building a Kill Chain: the mechanism automatically combines incidents into a single sequence of steps (including through additional requests for missing information), shows the attacker's path and the evolution of the attack.

 ·  Expert recommendations: the system suggests what the next steps of incident handling should be. The context of the incident and the accumulated experience within the SOC are taken into account. Based on the expert base and ML models, the probability of FP is estimated, the system finds similar incidents and recommends actions performed in similar cases.


The functionality of orchestration, analytics and process management


Security Vision SOAR provides the orchestration of security tools, analytical services, and infrastructure facilities:

 ·  Integration with SPI: the main sources of incidents are SIEM, EDR, AV, NGFW, WAF, antispam and other classes of solutions. Most integrations are two—way, from data acquisition to active response from a single management console.

 ·  Asset Interaction: The asset management module supports identification, inventory, and data acquisition both through external systems and through direct access to infrastructure facilities.

 ·  Artifact enrichment: The product includes a rich set of integrations with both publicly available and subscription-based analytical services.

 ·  Analytical tools: Built-in analytics services evaluate potential impact areas and possible incident development directions, as well as automatically link incidents to TI bulletins.

 ·  Asset reachability calculation: the system automatically builds routes to the most critical and strategic assets of the Company, allowing you to predict the development of an attack and future actions of an attacker.

 ·   The built-in lifecycle task system and integration with popular application/ITSM systems (Jira, Naumen, OTRS, etc.) allow you to coordinate the work of SOC and interact with related departments in a single loop.


New functionality added in the release


Local AI assistant: assistance based on the context of the incident is completely in the customer's loop


Security Vision SOAR has an AI assistant in the chatbot format, trained on the world's best incident response practices, product documentation, and practical background data on administration and information security. The model answers questions based on the context of a particular incident: its phase, related objects, the history of actions on it, the history of processing similar cases and related bulletins — helping analysts to interpret events and make decisions faster.


The model is not static, it is trained during use in SOC on the results of incident handling, as well as on bulletins issued by the expert community or individual analytical centers. Further training of the model is performed entirely in the Customer's contour.


The AI assistant will help with issues such as confirming an incident, decoding events (for example, Windows Event ID), or building commands to diagnose the system and network, as well as provide explanations on the attacker's utilities and techniques.


A separate use case is interactive help on the product and its functionality: users can ask questions and receive answers in the chat interface.


The main feature of the solution is completely local placement. The AI assistant is deployed in the customer's contour and does not interact with external systems, which allows it to be used in isolated infrastructures and environments with high confidentiality requirements.


ML-scoring of incident criticality


The product includes a scoring ML model that helps determine the criticality of information security incidents and provides faster prioritization in the SOC.


The model generates a criticality score based on a set of features reflecting the scale of the event and the significance of the affected assets.


рис 1.png

 

ML-summary - automatic incident report: a single standard for investigation results


When an incident is closed, the ML model generates a short summary, which is displayed in the closed incident card and included in the report on it. In it, the model captures the outcome of the investigation in a single format, including:

 ·  what happened;

 ·  what was done during the investigation;

 ·  what actions have been taken;

 ·  what is the result?;

 ·  whether the attacker has succeeded in anything.


The feature helps to maintain knowledge about incidents, simplifies transfer between shifts, and improves the quality of management reporting.


Effect for SOC and information security departments


The new releases are aimed at practically accelerating the daily operation of the SOC, allowing:

 ·  faster interpretation of events and artifacts;

 ·  get more accurate recommendations on how to respond;

 ·  reduce the entry threshold for new employees by maximizing the use of best practices, including those accumulated within the organization when handling incidents;

 ·  reduce the time for triage incidents thanks to ML criticality assessment;

 ·  reduce the loss of context by generating standard and easy-to-read investigation results.

Recommended

Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade

Recommended

Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Artem Gribkov, Angara Security: We chose the Security solution for ourselves back in 2021 Vision IRP/SOAR
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
Introduction of turnover fines for data breaches: comments by Nikolay Goncharov in TAdviser
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
The new version of the Security Vision platform improves visualization, logging, and administration
The new version of the Security Vision platform improves visualization, logging, and administration
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Who and why attacks the public sector: comments by Maxim Repko in Cyber Media
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade

Other news

Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Security Vision received a GosSOPKA award for its contribution to the development of the Russian cybersecurity system
Security Vision received a GosSOPKA award for its contribution to the development of the Russian cybersecurity system
Security Vision is a partner of Softline Security Summit
Security Vision is a partner of Softline Security Summit
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management

Other news

Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
How businesses can fight off hacker attacks: comments by Ruslan Rakhmetov in Expert-Ural
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Ekaterina Cherun became a guest of the show about information security and cooking «Infosecurity with taste»
Security Vision announces update for SOAR and NG SOAR products
Security Vision announces update for SOAR and NG SOAR products
Security Vision received a GosSOPKA award for its contribution to the development of the Russian cybersecurity system
Security Vision received a GosSOPKA award for its contribution to the development of the Russian cybersecurity system
Security Vision is a partner of Softline Security Summit
Security Vision is a partner of Softline Security Summit
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management