SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Security Vision announces update for SOAR and NG SOAR products

Security Vision announces update for SOAR and NG SOAR products
15.05.2025

Security Vision SOAR is a comprehensive solution for handling information security incidents at all stages of their life cycle according to the NIST/SANS methodology:

   1. Preparation

   2. Detection

   3. Analysis

   4. Containment

   5. Eradication

   6. Recovery

   7. Post-Incident


The main advantages of Security Vision SOAR are:

   · Kill Chain - Combine related incidents into a single sequence of stages that reflects the attacker's path and threat evolution.

   · Object-oriented response - an approach where each element of the incident (hosts, accounts, processes, etc.) is considered as an object with properties, actions and connections.

   · Dynamic Playbook - the system itself selects the relevant actions to collect additional information and perform actions to respond to an incident.

   · Expert recommendations that the system provides to the analyst working on the incident throughout the entire life cycle of its processing.


Security Vision NG SOAR complements the above capabilities with a mechanism for automated interaction with NCCCH and FinCERT, as well as its own SIEM and EDR.


The main advantages of SIEM from Security Vision are:

   · The ability to create complex correlation rules with multilevel nesting of conditions, including using repetitions in the rule, the optionality of events, the first event - with a condition of the type "negation."

   · Graphical No-Code editor of correlation rules, which significantly reduces the entry threshold and timing of analysts' adaptation.

   · Optimize memory and disk space usage when storing source events.

   · When events are received from different sources in a disjoint order, the time is synchronized despite failures, and the chain is restored retrospectively for the correlation rule.


The main advantages of EDR from Security Vision are:

   · Deep monitoring - Extend standard OS auditing capabilities by intercepting system events. Event interception is carried out through the hooks of user space on hosts, as well as at the kernel driver level of both Windows and Linux.

   · Proactive blocking - automatically stops untrusted applications when attempting to perform dangerous operations.

   · Automation of response - integration with other SIS, for example, to send suspicious files to the Sandbox.


EDR correlation rules can be modified in a single interface with SIEM.


New features added in the update:


рис 1.png


Completely redesigned interface. We have rethought the user experience, placed the most significant elements in quick access, redesigned the visual component to increase the speed of incident processing, as well as reduce the time for adaptation in the product for new users.


A number of new ML models have been added:

   · Scoring False Positive - the model is trained on data from closed incidents, and when a new incident arrives, the system evaluates how similar it is to previously closed false positive cases and gives the result as a percentage match.

   · Similar incidents - the model analyzes the context of the incident, searches for and shows similar cases. This allows the analyst to both see such incidents, which are also now in work, and see how similar situations were processed in the past.

   · Recommendations on the history of actions - the model will tell the analyst what actions were performed at different phases when investigating similar incidents in the past. Thus, the new SOC employee will undergo adaptation faster, even if he does not have ready-made instructions, due to access to the accumulated data on how incidents are processed.

   · Documentation help - now you can ask the model a product question and get an answer in the chat.

   · Knowledge Base Recommendations - In addition to documentation, the analyst can receive a recommendation in the chat about what actions should be performed for a specific incident in a specific response phase. The model, trained in best practices for responding to cyber incidents, will provide a short answer, taking into account the entire context of the incident.


The functionality of constructing graphs of reachability of critical assets has been updated. Now routes can be built using the ML engine, taking into account the routing rules and ACLs configured on network devices in the organization.


The mechanism of dynamic playbooks has been updated. The functionality received its interface for setting the conditions for applying atomic actions depending on the context of the incident. The progress of the playbook is now transparent to the user, all scheduled actions, as well as their progress, are clearly displayed on the incident page.


Added related Threat Intelligence bulletins. The system automatically associates incidents with public TI reports when the attributive composition matches. This gives the analyst:

   · Quick access to information about similar attacks;

   · Data on the tactics of intruders (TTPs);

   · Current IOC/IOA;

   · Response recommendations from bulletin vendors.


Added built-in incident notes.The analyst can conveniently record the progress of the investigation directly in the system using text formatting, adding files and screenshots. You no longer need to search for information in chats or local files - all interim results of the investigation are always at hand.

Recommended

Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Nikolai Goncharov on RBC discussed how businesses adapt to attacks from criminals
Nikolai Goncharov on RBC discussed how businesses adapt to attacks from criminals
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Nikolay Goncharov discussed the launch of a pilot project to restrict access to phishing sites live on Radio of Russia
Nikolay Goncharov discussed the launch of a pilot project to restrict access to phishing sites live on Radio of Russia
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"

Recommended

Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
Yakov Grodzensky, Chernogolovka Group of Companies: Security Vision's boxed vulnerability scanner is quickly installed and does not require lengthy configuration
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
SOC MSTU, created in the regional educational and research center "Security" together with Security Vision was visited by representatives of the largest businesses, government and NGOs in the field of innovation
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Nikolai Goncharov on RBC discussed how businesses adapt to attacks from criminals
Nikolai Goncharov on RBC discussed how businesses adapt to attacks from criminals
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Security Vision entered 15 categories of the Russian Information Security Market Map from TAdviser
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
Criminal liability for the use of AI comments by Ruslan Rakhmetov in Forbes
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
More automation, greater efficiency: Security Vision outlined key product improvements for 2025
Marina Gromova told how to protect small and medium businesses from cyber threats
Marina Gromova told how to protect small and medium businesses from cyber threats
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Security Vision entered the top 4 leaders of the Russian UEBA market according to the popular IT portal IT-World
Nikolay Goncharov discussed the launch of a pilot project to restrict access to phishing sites live on Radio of Russia
Nikolay Goncharov discussed the launch of a pilot project to restrict access to phishing sites live on Radio of Russia
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
Consequences of switching to Russian software: Maxim Repko's comments for Anti-malware
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"

Other news

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Large-scale Security Vision SIEM update
Large-scale Security Vision SIEM update
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products

Other news

CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
CII Basic from Security Vision: critical infrastructure protection made more affordable for SMBs
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Nikolai Goncharov spoke live on Radio of Russia about a fraudulent scheme involving fake accounts in instant messengers
Security Vision will be a partner of "AviaCyberBez" 2025
Security Vision will be a partner of "AviaCyberBez" 2025
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Telegram and WhatsApp calls restricted in Russia: Nikolai Goncharov's comments in RBC
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
We invite you to the webinar "New features of the Incident Management Module (SOAR) from Security Vision"
Large-scale Security Vision SIEM update
Large-scale Security Vision SIEM update
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Dmitry Semidotsky told the audience of AGN "Moscow" about the most common type of cyber fraud in the capital
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products
Roman Ovchinnikov in an interview with RBC spoke about the new Security Vision products