All products

VM

Vulnerability management

security analysis, vulnerability, CVE, CVSS

Product overview

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory and life cycle management of equipment and software on workstations and servers of organizations.

Security Vision AM does not require a large number of information security tools and is suitable for solving problems related not only to practical security, but also to risk management processes, compliance with various standards, etc.

The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Application

Search for new objects


Regular agentless search for new assets, customizable distribution by category, working both offline and with integrations of third-party solutions, without restrictions on the number of objects, their types, network segments, users and roles for companies of any size

Inventory


Can be performed completely autonomously using its own built-in mechanism and/or using third-party solutions, for example: AV/EDR, DLP, VM, LPAD, SIEM, etc. to aggregate information about the composition of equipment, software, ultrasound and other information

Lifecycle management


Monitoring the composition and condition of assets (equipment, hardware, software, etc.) from a single web interface with the ability to launch automation scripts as part of collecting information and conducting investigations

Examples and integrations

Remote control


The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Asset categorization


The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Accounting for business parameters


The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Reporting


The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Visualization


The autonomous mode of operation uses the built-in network search mechanism and agentless inventory, and when connecting third-party solutions (SIEM, uCMDB, vulnerability scanners, etc. of information security and IT systems) it ensures the collection of the necessary information with deduplication and enrichment capabilities.

Get a demo of a
Security Vision product

Mail us to sales@securityvision.ru
or get a demo

Other products

Other products

SOAR

Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach.

NG SOAR

Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included.

TIP

Threat Intelligence Platform

Cybersecurity threat data collection, analysis, enrichment, infrastructure detection, investigation and response.

AM

Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations.

RM

Risk Management

Formation of a register of risks, threats, protection measures and other control parameters, assessment using the chosen methodology, formation of a list of additional measures to change the level of risk, control of execution, periodic reassessment.

UEBA

User and Entity Behavior Analytics

Building behavior models and detecting deviations from them using several dozen built-in static analysis rules.

ORM

Operational Risk Management

Accounting and recording of operational risk events, monitoring of key risk indicators and self-assessment/control

CM

Compliance Management

Audit of compliance with various methodologies and standards

AD + ML

User and Entity Behavior Analysis

Dynamic behavioral analysis to search for anomalies using machine learning and to search for possible incidents.

BCP

Business Continuity Plan

Automation of ensuring continuity and restoration of activities after emergencies.

FinCERT

Financial Computer Emergency Response Team

Financial Computer Emergency Response Team

GovCERT

Government Computer Emergency Response Team

Government Computer Emergency Response Team

OTS

Operational Technology Security

Operational Technology Security

Still have questions?

Mail us to sales@securityvision.ru or get demo