SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

The new version of the Security Vision platform improves visualization, logging, and administration

The new version of the Security Vision platform improves visualization, logging, and administration
09.02.2026

The year has only just begun, and Security Vision has already released a new version of its platform. It enhances analytical capabilities, makes the web interface even more user-friendly, expands logging, and simplifies the administration of export/import operations.


Analytics and visualization


The Map widget now features a heat map, allowing you to display the intensity, frequency, and number of events (e.g., cyberattacks and incidents) across IT assets. The Timeline widget now features customizable output forms for parameters used when displaying data.


Тепловая карта.png


Logging and Compliance


The audit log now includes records of connector activation and deactivation, and expanded information about actions performed with the connector service. Events such as deleting and stopping running workflows, as well as report generation, are also logged.


Export/Import and Administration


In the export package, you can select all entities related to the source for insertion only (without replacing them during import) – convenient when transferring large related sets. The ability to delete records of completed import and export operations for system entities has been added to the system history clearing settings.


UI/UX


The interface for the audit log settings form has been improved, the "User Profile" section has been redesigned, and views for received in-portal alerts have been updated.


JSON transformations


In transformations for working with JSON ("Append to JSON object", "Merge JSON objects", "Remove from JSON object", "Find by JPath", "Find by XPath"), the list of options in the "Property name" field is unified with the selection option in the "Property value" field. 


Security Vision will continue to rapidly develop its platform, making it an increasingly effective and convenient tool for protecting and managing IT environments.

Recommended

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"

Recommended

Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Andrey Pushnyak told RBC how companies can avoid data leakage
Andrey Pushnyak told RBC how companies can avoid data leakage
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Security Vision - Gold Sponsor Positive Hack Days Fest 2025
Maxim Repko named the main cyber threats of this year
Maxim Repko named the main cyber threats of this year
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
How the Security Vision Platform has changed for the 2025 year: main highlights
How the Security Vision Platform has changed for the 2025 year: main highlights
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
CNews published an article by Maxim Lunev "How to ensure security with the new version of Security Vision KII"
Congratulations on May 9 - Great Victory Day!
Congratulations on May 9 - Great Victory Day!
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Data protection as the work of an orchestra: an article by Roman Dushkov in the BIS Journal
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"
Welcome to the webinar "SGRC. How do I automate my organization's strategic security processes?"

Other news

How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5
Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Security Vision held its first partner conference
Security Vision held its first partner conference

Other news

How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5
Security Vision Announces New Version of Vulnerability Management (VM) on Security Vision 5
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Teaching cybersecurity to kids: Security Vision game libraries at Positive Hack Days Fest 2025
Security Platform Vision included in the CIT Register of AI solutions
Security Platform Vision included in the CIT Register of AI solutions
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Security of authentication methods: comments by Nikolai Goncharov for "The Firm's Secret"
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Messenger Max as a new attractive platform for scammers expert opinion of Nikolai Goncharov on RBC.Companies
Security Vision held its first partner conference
Security Vision held its first partner conference