SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

The latest version of the Security Vision 5 platform has been unveiled

The latest version of the Security Vision 5 platform has been unveiled
11.11.2025

The next release of the Security Vision 5 platform has been released. The update focuses on the convenience of the daily work of specialists, increased automation and compliance with regulatory requirements. The release includes improvements to analytics and reporting, enhanced connector and administration capabilities, as well as interface updates.


Navigation and views


For the convenience of administrators, the items "Connector Launch History" and "Connector Launch Schedules" have been moved to the Connectors module. The general "Tree" and "Table" views have been updated and the default settings for short/full cards in the reference books have been added — the interface has become cleaner and the reuse of settings is faster.


Дерево.png


Analytics and widgets


Widget versioning has been added to the platform. When added to dashboards, reports, and cards, the latest version is automatically used. For popular types ("Line Graph", "Bar Chart", "Radar", "Map", "Globe") You can use the block result as a variable data source — this simplifies composite calculations and increases the flexibility of visualizations. New variable transformations have been added: date shifting (including the beginning/end of the week and month) and Base64 encoding/decoding.


Виджеты.png


Workflows and reports


In the "Create Report" action, a switch has been added between preparing from a ready—made template and creating from scratch in the editor. This speeds up the release of documents and reduces the number of templates to accompany. Reports based on a ready-made template allow you to create reports from a custom text file. It is enough to add your own corporate identity and place tags, the platform automatically inserts the data according to the tags placed. There are also expanded scenarios for redefining input parameters in workflows, which helps to assemble more reusable processes.


Integrations and connectors


You can now specify any Content Type in the HTTP connector (including formats for CSV integrations, etc.), which gives you more flexibility when integrating with external systems. The Mail connector has added support for regular expression search inside attachment archives — the necessary files are extracted without manual unpacking.


Safety and compliance


Each record has an event ID in the audit log, which helps to close the logging requirements. There was a warning about the imminent end of the session, as well as setting the mode of the only active user session to increase the level of access control.


Administration and installation


In the installation wizard, you can set the path for saving deployment logs. This simplifies the diagnosis and subsequent analysis of installations on stands and in an industrial environment.

Recommended

Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025

Recommended

Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Security Vision presented an updated version of the platform
Security Vision presented an updated version of the platform
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Security Vision Ecosystem is certified by the Russian Ministry of Defense according to NDV-2
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dynamics of cyber threats for the Russian industry in the second quarter of 2025: research results with commentary by Nikolai Goncharov
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Dmitry Semidotsky told CISOCLUB about the development of services for running personal data
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Nikolay Goncharov told CISOCLUB how cybercriminals operate in 2025
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
Vulnerability Management: Ruslan Rakhmetov's Comments in CISOCLUB
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
How to solve the problem of personnel shortage in cybersecurity: a new article by Ruslan Rakhmetov in Forbes
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
Eva Belyaeva will speak at the AM Live online conference "Information Security Automation"
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
What information security education can be obtained in one of the largest universities: interview with Ekaterina Vaitz at CNews
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
We invite you to the webinar "Practical cyber risk management - from threat assessment to justifying the budget for information security"
Security Vision will be a Gold Partner of the Security Analyst Summit 2025
Security Vision will be a Gold Partner of the Security Analyst Summit 2025

Other news

The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"

Other news

The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
The Security Vision SOAR platform will strengthen CyberART Innostage's SOC as part of a technology alliance
Security Vision – strategic partner of SOC Forum 2025
Security Vision – strategic partner of SOC Forum 2025
Security Vision's team of athletes continues to win prizes
Security Vision's team of athletes continues to win prizes
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Security Vision invites you to lectures on protection against cyber fraudsters at the forum-festival "Territory of the Future. Moscow 2030"
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Alina Drapeko, Antitrix: The Security Vision platform has proven itself to be a reliable and flexible core for building information security management systems
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
Maxim Annenkov will speak at PHDays with a report "Improving the accuracy of SOC: how to control False negative using BAS and SOAR integration"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
CISOCLUB published Ruslan Rakhmetov's article "Search and Prevention of Software Vulnerabilities: Effective Techniques"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"
New cybersecurity challenges: Nikolai Goncharov's comments for "PSB Dengi"