SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision announces update for SOAR and NG SOAR products

Security Vision announces update for SOAR and NG SOAR products
15.05.2025

Security Vision SOAR is a comprehensive solution for handling information security incidents at all stages of their life cycle according to the NIST/SANS methodology:

   1. Preparation

   2. Detection

   3. Analysis

   4. Containment

   5. Eradication

   6. Recovery

   7. Post-Incident


The main advantages of Security Vision SOAR are:

   · Kill Chain - Combine related incidents into a single sequence of stages that reflects the attacker's path and threat evolution.

   · Object-oriented response - an approach where each element of the incident (hosts, accounts, processes, etc.) is considered as an object with properties, actions and connections.

   · Dynamic Playbook - the system itself selects the relevant actions to collect additional information and perform actions to respond to an incident.

   · Expert recommendations that the system provides to the analyst working on the incident throughout the entire life cycle of its processing.


Security Vision NG SOAR complements the above capabilities with a mechanism for automated interaction with NCCCH and FinCERT, as well as its own SIEM and EDR.


The main advantages of SIEM from Security Vision are:

   · The ability to create complex correlation rules with multilevel nesting of conditions, including using repetitions in the rule, the optionality of events, the first event - with a condition of the type "negation."

   · Graphical No-Code editor of correlation rules, which significantly reduces the entry threshold and timing of analysts' adaptation.

   · Optimize memory and disk space usage when storing source events.

   · When events are received from different sources in a disjoint order, the time is synchronized despite failures, and the chain is restored retrospectively for the correlation rule.


The main advantages of EDR from Security Vision are:

   · Deep monitoring - Extend standard OS auditing capabilities by intercepting system events. Event interception is carried out through the hooks of user space on hosts, as well as at the kernel driver level of both Windows and Linux.

   · Proactive blocking - automatically stops untrusted applications when attempting to perform dangerous operations.

   · Automation of response - integration with other SIS, for example, to send suspicious files to the Sandbox.


EDR correlation rules can be modified in a single interface with SIEM.


New features added in the update:


рис 1.png


Completely redesigned interface. We have rethought the user experience, placed the most significant elements in quick access, redesigned the visual component to increase the speed of incident processing, as well as reduce the time for adaptation in the product for new users.


A number of new ML models have been added:

   · Scoring False Positive - the model is trained on data from closed incidents, and when a new incident arrives, the system evaluates how similar it is to previously closed false positive cases and gives the result as a percentage match.

   · Similar incidents - the model analyzes the context of the incident, searches for and shows similar cases. This allows the analyst to both see such incidents, which are also now in work, and see how similar situations were processed in the past.

   · Recommendations on the history of actions - the model will tell the analyst what actions were performed at different phases when investigating similar incidents in the past. Thus, the new SOC employee will undergo adaptation faster, even if he does not have ready-made instructions, due to access to the accumulated data on how incidents are processed.

   · Documentation help - now you can ask the model a product question and get an answer in the chat.

   · Knowledge Base Recommendations - In addition to documentation, the analyst can receive a recommendation in the chat about what actions should be performed for a specific incident in a specific response phase. The model, trained in best practices for responding to cyber incidents, will provide a short answer, taking into account the entire context of the incident.


The functionality of constructing graphs of reachability of critical assets has been updated. Now routes can be built using the ML engine, taking into account the routing rules and ACLs configured on network devices in the organization.


The mechanism of dynamic playbooks has been updated. The functionality received its interface for setting the conditions for applying atomic actions depending on the context of the incident. The progress of the playbook is now transparent to the user, all scheduled actions, as well as their progress, are clearly displayed on the incident page.


Added related Threat Intelligence bulletins. The system automatically associates incidents with public TI reports when the attributive composition matches. This gives the analyst:

   · Quick access to information about similar attacks;

   · Data on the tactics of intruders (TTPs);

   · Current IOC/IOA;

   · Response recommendations from bulletin vendors.


Added built-in incident notes.The analyst can conveniently record the progress of the investigation directly in the system using text formatting, adding files and screenshots. You no longer need to search for information in chats or local files - all interim results of the investigation are always at hand.

Recommended

Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova

Recommended

Nikolai Goncharov on RBC explained why private companies become targets for hackers
Nikolai Goncharov on RBC explained why private companies become targets for hackers
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Eva Belyaeva will make a presentation "Identify, investigate, respond: NG SOAR for effective security" at PHDays
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Cybersecurity becomes a reality: Security Vision and KidZania train future specialists in the territory of the future
Security Vision athletes team wins new awards
Security Vision athletes team wins new awards
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
Security Vision Expands the Boundaries of Automation: New Integration, Analytics, and Control Capabilities
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova
How to protect yourself from cyber threats to small and medium-sized businesses: interviews with Marina Gromova and Olga Skulova

Other news

Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
Security Vision continues to confirm leadership among low code/no code platforms
Security Vision continues to confirm leadership among low code/no code platforms
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2

Other news

Security Vision – partner CyberSecurity Education 2025
Security Vision – partner CyberSecurity Education 2025
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
Pavel Lyubomsky to speak at CyberGen 2025
Pavel Lyubomsky to speak at CyberGen 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
Security Vision presented advanced solutions in the field of industrial cybersecurity at the Kaspersky Industrial Cybersecurity Conference 2025
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
We invite you to the webinar "Vulnerability Scanner for SMB from Security Vision"
Security Vision continues to confirm leadership among low code/no code platforms
Security Vision continues to confirm leadership among low code/no code platforms
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
Nikolay Goncharov on cybersecurity for SMEs expert opinion in Business Secrets
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
New version of Vulnerability Scanner from Security Vision advanced analytics and improved scan management
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2