SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

All products

VS

Vulnerability Scanner

Security analysis, vulnerabilities, CVE, CVSS

Product overview

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

Security Vision VS is designed to automate scanning to find technical vulnerabilities and monitor the state of assets in terms of security level and allows you to proactively identify weaknesses in the infrastructure before they are exploited by attackers.

The product helps to assess the overall security level of the system and identify the most critical threats, complying with the requirements of strategic security and providing a foundation for the vulnerability management process.

Application

Vulnerability detection


The scanner supports several modes of operation, including white (audit) and black (pentest) mailbox modes, scanning of web applications and containers, as well as file and retrospective scanning to instantly find vulnerabilities from previous work results.

Regular verification


Scan management is flexibly configured using schedules and defining "windows" for security checks (up to each asset of the company), and based on the results, criticality and SLA are automatically determined depending on the parameters of the objects (CIAT, CVSS, etc.)

Scanners and results management


Due to the support of a large number of system and application software and containers, the possibility of applying an alienated agent for isolated network segments, the product provides high-quality results and additionally supports simultaneous work with third-party scanners.

Examples and integrations

Supported types of object

The product is able to look for vulnerabilities in a large number of system and application software, as well as network devices, for example:

- Operating systems Astra Linux, Alt linux, Redhat, Ubuntu, Red Hat, CentOS, Alt Linux, Oracle Linux, Debian, including all possible Debian-based systems, Windows desktop and server versions;

- MS Office (with click-to-run, exchange, sharepoint versions), databases (MS SQL, PostgreSQL, MySQL, Oracle, Elasticsearch);

 - network devices (Cisco, Juniper, CheckPoint, PaloAlto, Sun, etc.);

 - Docker containers (running and stopped) and their images.

Advanced modes of operation

In addition to the white box for audit and security analysis, a black box (or pentest) is supported, which checks the possibility of exploiting network vulnerabilities and using the most serious exploits, with support for select weak passwords, check outdated/vulnerable encryption algorithms, and using more than 80 fully open expert scripts.


Web application scanning conducts verification on XSS, CSRF vulnerabilities, SQL injection, RFI, Code injection, disclosure of internal information and site settings, user search, as well as check of exploitation of specific Web vulnerabilities.


Container scanning allows you to perform checks on containers running and stopped at the time of scanning, their images, including in environments managed by Kubernetes, available on the host.


Retro scan provides instant vulnerability search based on previously obtained asset data (without connecting to them and waiting for windows scan), this is the fastest mode of operation, which is convenient to use for frequent checks for new vulnerabilities and for point search for internal and external requests.

Multiscanner

The Security Vision scanner can work simultaneously with any third-party security analysis solution, such as MaxPatrol 8 and MaxPatrol VM, Tenable.IO and Tenable.SC, Redcheck, Nessus and Qualys, allowing all the results to aggregate together for further processing and vulnerability remediation.

Vulnerability parameters

Vulnerability cards can be generated independently through the built-in object editor or using pre-configured metrics:

  • CVSS v2.0/3.0/3.1 (baseline and )
    • Базовый вектор (Attack Complexity, User Interaction, Scope, Confidentiality и Integrity Impact, вектор атаки, требуемые привилегии)
    • Временной вектор (Exploit Code Maturity, Remediation Level, Report Confidence)

The full card displays detailed information about the vulnerability (ID, creation date, criticality) with the ability to use tags (by matching part of the description text with one of the entries in the custom handbook). General information includes the CVE code, dates of first and last detection and other information from all available sources.

Analysis of the obtained vulnerabilities and the bond graph

Depending on the applied security scanners, external and internal analytical services, the solution builds links between objects for quick navigation through cards or link graphs (vulnerability groups, remediation requests, assets and other objects).


Additionally, clickable links to remediation guides and vulnerability descriptions from various sources are provided.

Report generation

For vulnerabilities andtrouble tickets, you can generate a report using your own pattern for uploading as a file in various formats:

• pdf;
• txt;
• docx;
• xlsx;
• ods;
• odt;
• csv.

Reports can contain any properties obtained in the vulnerability remediation cycle.


The appearance can be customized granularly with the choice of fonts, colors, images and logos, diagrams, indents, numbering, headers and footers, and other characteristics.

Get a demo of a
Security Vision product

Mail us to sales@securityvision.ru
or get a demo

Media

Security Vision Next Generation VM (Vulnerability Management) (long version)

 

 

 

Security Vision Next Generation VM (Vulnerability Management) (long version)

Security Vision Next Generation VM (Vulnerability Management) (long version)

Other products

Other products

SOAR

Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR

Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

TIP

Threat Intelligence Platform

Cybersecurity threat data collection, analysis, enrichment, infrastructure detection, investigation and response.

AM

Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

RM

Risk Management

Formation of a register of risks, threats, protection measures and other control parameters, assessment using the chosen methodology, formation of a list of additional measures to change the level of risk, control of execution, periodic reassessment.

UEBA

User and Entity Behavior Analytics

Building behavior models and detecting deviations from them using several dozen built-in static analysis rules.

ORM

Operational Risk Management

Accounting and recording of operational risk events, monitoring of key risk indicators and self-assessment/control

VM

Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

CM

Compliance Management

Audit of compliance with various methodologies and standards

AD + ML

User and Entity Behavior Analysis

Dynamic behavioral analysis to search for anomalies using machine learning and to search for possible incidents.

BCP

Business Continuity Plan

Automation of ensuring continuity and restoration of activities after emergencies.

FinCERT

Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT

Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

OTS

Operational Technology Security

Operational Technology Security

Still have questions?

Mail us to sales@securityvision.ru or get demo