The next release of the Security Vision 5 platform has been released. The update focuses on the convenience of the daily work of specialists, increased automation and compliance with regulatory requirements. The release includes improvements to analytics and reporting, enhanced connector and administration capabilities, as well as interface updates.
Navigation and views
For the convenience of administrators, the items "Connector Launch History" and "Connector Launch Schedules" have been moved to the Connectors module. The general "Tree" and "Table" views have been updated and the default settings for short/full cards in the reference books have been added — the interface has become cleaner and the reuse of settings is faster.

Analytics and widgets
Widget versioning has been added to the platform. When added to dashboards, reports, and cards, the latest version is automatically used. For popular types ("Line Graph", "Bar Chart", "Radar", "Map", "Globe") You can use the block result as a variable data source — this simplifies composite calculations and increases the flexibility of visualizations. New variable transformations have been added: date shifting (including the beginning/end of the week and month) and Base64 encoding/decoding.

Workflows and reports
In the "Create Report" action, a switch has been added between preparing from a ready—made template and creating from scratch in the editor. This speeds up the release of documents and reduces the number of templates to accompany. Reports based on a ready-made template allow you to create reports from a custom text file. It is enough to add your own corporate identity and place tags, the platform automatically inserts the data according to the tags placed. There are also expanded scenarios for redefining input parameters in workflows, which helps to assemble more reusable processes.
Integrations and connectors
You can now specify any Content Type in the HTTP connector (including formats for CSV integrations, etc.), which gives you more flexibility when integrating with external systems. The Mail connector has added support for regular expression search inside attachment archives — the necessary files are extracted without manual unpacking.
Safety and compliance
Each record has an event ID in the audit log, which helps to close the logging requirements. There was a warning about the imminent end of the session, as well as setting the mode of the only active user session to increase the level of access control.
Administration and installation
In the installation wizard, you can set the path for saving deployment logs. This simplifies the diagnosis and subsequent analysis of installations on stands and in an industrial environment.