SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

All products

CM

Compliance management

Business GRC, SGRC, compliance, audit, compliance, normative and methodological documents, own methodologies

Product overview

Audit of compliance and compliance with various methodologies and standards of regulatory and methodological documentation.

Security Vision CM allows you to integrate various compliance assessment and remediation methodologies with technical tools, databases and processes in the company.

Depending on the requirements and content of regulatory and methodological documents, it is possible to launch work processes, fill out questionnaires with the involvement of experts, create tasks and generate report templates and other actions in accordance with any methodologies.

Application

Formation of the audit and team


Creation of work processes, cards and questionnaires sent to all audit participants (with or without the involvement of an expert group) for subsequent assessment of compliance

Assessment and plan formation


Compliance according to selected measures and requirements from data collected automatically from questionnaires with the ability to create an action plan to eliminate violations

Elimination of comments and reporting


Built-in capabilities for setting and tracking tasks to eliminate comments for connecting performers, as well as flexible report and dashboard editors for generating reporting and analytics in real time

Examples and integrations

Register of standards and requirements

Availability of various standards out of the box, for example:

• PCI DSS 4.0

• NIST Cybersecurity Framework 2.0

• CIS

Critical Security Controls and other regulatory documents

Flexibility and adaptation to specific needs

Users are given the opportunity to create their own standards, combine requirements from existing ones and implement self-assessment procedures with control over the time sequence of running processes and links to specific company assets

Resource-service model and protective measures

Compliance management is realizable not only for the company as a whole, but also for its individual divisions and other key objects of the resource-service model, e.g.:

- business process;

- product;

- service;

- supplier;

- premises;

- equipment.

Flexible attribute configuration, editing capabilities and management of relationships with any assets of the organization provides top-level assessment of compliance across the company and monitoring of the impact of its individual elements and asset types on security.

Conformity assessment process

Filling out forms or conducting interviews with employees is simplified due to the automatic generation of questionnaires and a transparent process for collecting the necessary information. Automatic data collection from end nodes, devices and accounting systems (ITAM, CMDB, etc.), carrying out mathematical calculations using custom formulas with the generation of reports using their own templates automatically on a schedule or manually are also supported.

Action plans to achieve the target level

The product displays the current and target levels of compliance of the assessed object with the requirements being checked, taking into account the planned measures and forms an action plan for their implementation. The process supports both the generation of new tasks and the monitoring of the implementation of existing ones (in various external systems).

Reporting

For each asset or selected group, one can generate a report using specific template for uploading as a file in various formats:

• pdf;

• txt;

• docx;

• xlsx;

• ods;

• odt;

• csv.

Reports can contain any properties obtained during the inventory. The appearance can be customized granularly with a choice of fonts, colors, pictures and logos, diagrams, indentation, numbering, headers and footers, and other characteristics

Get a demo of a
Security Vision product

Mail us to sales@securityvision.ru
or get a demo

Media

 

 

Other products

Other products

SOAR

Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR

Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

TIP

Threat Intelligence Platform

Cybersecurity threat data collection, analysis, enrichment, infrastructure detection, investigation and response.

AM

Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

RM

Risk Management

Formation of a register of risks, threats, protection measures and other control parameters, assessment using the chosen methodology, formation of a list of additional measures to change the level of risk, control of execution, periodic reassessment.

VS

Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

UEBA

User and Entity Behavior Analytics

Building behavior models and detecting deviations from them using several dozen built-in static analysis rules.

ORM

Operational Risk Management

Accounting and recording of operational risk events, monitoring of key risk indicators and self-assessment/control

VM

Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

AD + ML

User and Entity Behavior Analysis

Dynamic behavioral analysis to search for anomalies using machine learning and to search for possible incidents.

BCP

Business Continuity Plan

Automation of ensuring continuity and restoration of activities after emergencies.

FinCERT

Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT

Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

OTS

Operational Technology Security

Operational Technology Security

Still have questions?

Mail us to sales@securityvision.ru or get demo