SOT
Mail us to sales@securityvision.ru or get demo presentation
SDA
Mail us to sales@securityvision.ru or get demo presentation
GRC
Mail us to sales@securityvision.ru or get demo presentation
Security Orchestration, Automation and Response
Next Generation SOAR
Asset Management
Vulnerability Scanner
Vulnerability Management
Financial Computer Emergency Response Team
Government Computer Emergency Response Team
Vulnerability Scanner
Security analysis, vulnerabilities, CVE, CVSS
Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.
Security Vision VS is designed to automate scanning to find technical vulnerabilities and monitor the state of assets in terms of security level and allows you to proactively identify weaknesses in the infrastructure before they are exploited by attackers.
The product helps to assess the overall security level of the system and identify the most critical threats, complying with the requirements of strategic security and providing a foundation for the vulnerability management process.
The scanner supports several modes of operation, including white (audit) and black (pentest) mailbox modes, scanning of web applications and containers, as well as file and retrospective scanning to instantly find vulnerabilities from previous work results.
Scan management is flexibly configured using schedules and defining "windows" for security checks (up to each asset of the company), and based on the results, criticality and SLA are automatically determined depending on the parameters of the objects (CIAT, CVSS, etc.)
Due to the support of a large number of system and application software and containers, the possibility of applying an alienated agent for isolated network segments, the product provides high-quality results and additionally supports simultaneous work with third-party scanners.
Supported types of object
The product is able to look for vulnerabilities in a large number of system and application software, as well as network devices, for example:
- Operating systems Astra Linux, Alt linux, Redhat, Ubuntu, Red Hat, CentOS, Alt Linux, Oracle Linux, Debian, including all possible Debian-based systems, Windows desktop and server versions;
- MS Office (with click-to-run, exchange, sharepoint versions), databases (MS SQL, PostgreSQL, MySQL, Oracle, Elasticsearch);
- network devices (Cisco, Juniper, CheckPoint, PaloAlto, Sun, etc.);
- Docker containers (running and stopped) and their images.
Advanced modes of operation
In addition to the white box for audit and security analysis, a black box (or pentest) is supported, which checks the possibility of exploiting network vulnerabilities and using the most serious exploits, with support for select weak passwords, check outdated/vulnerable encryption algorithms, and using more than 80 fully open expert scripts.
Web application scanning conducts verification on XSS, CSRF vulnerabilities, SQL injection, RFI, Code injection, disclosure of internal information and site settings, user search, as well as check of exploitation of specific Web vulnerabilities.
Container scanning allows you to perform checks on containers running and stopped at the time of scanning, their images, including in environments managed by Kubernetes, available on the host.
Retro scan provides instant vulnerability search based on previously obtained asset data (without connecting to them and waiting for windows scan), this is the fastest mode of operation, which is convenient to use for frequent checks for new vulnerabilities and for point search for internal and external requests.
Multiscanner
Vulnerability parameters
Vulnerability cards can be generated independently through the built-in object editor or using pre-configured metrics:
The full card displays detailed information about the vulnerability (ID, creation date, criticality) with the ability to use tags (by matching part of the description text with one of the entries in the custom handbook). General information includes the CVE code, dates of first and last detection and other information from all available sources.
Analysis of the obtained vulnerabilities and the bond graph
Depending on the applied security scanners, external and internal analytical services, the solution builds links between objects for quick navigation through cards or link graphs (vulnerability groups, remediation requests, assets and other objects).
Additionally, clickable links to remediation guides and vulnerability descriptions from various sources are provided.
Report generation
For vulnerabilities andtrouble tickets, you can generate a report using your own pattern for uploading as a file in various formats:
• pdf;
Reports can contain any properties obtained in the vulnerability remediation cycle.
The appearance can be customized granularly with the choice of fonts, colors, images and logos, diagrams, indents, numbering, headers and footers, and other characteristics.
Mail us to
sales@securityvision.ru
or get a demo
Security Vision Next Generation VM (Vulnerability Management) (long version)
Security Orchestration, Automation and Response
Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach
Next Generation SOAR
Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included
Threat Intelligence Platform
Cybersecurity threat data collection, analysis, enrichment, infrastructure detection, investigation and response.
Asset Management
Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations
Risk Management
Formation of a register of risks, threats, protection measures and other control parameters, assessment using the chosen methodology, formation of a list of additional measures to change the level of risk, control of execution, periodic reassessment.
User and Entity Behavior Analytics
Building behavior models and detecting deviations from them using several dozen built-in static analysis rules.
Operational Risk Management
Accounting and recording of operational risk events, monitoring of key risk indicators and self-assessment/control
Vulnerability Management
Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions
Compliance Management
Audit of compliance with various methodologies and standards
User and Entity Behavior Analysis
Dynamic behavioral analysis to search for anomalies using machine learning and to search for possible incidents.
Business Continuity Plan
Automation of ensuring continuity and restoration of activities after emergencies.
Financial Computer Emergency Response Team
Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator
Government Computer Emergency Response Team
Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator
Operational Technology Security
Operational Technology Security
Security Orchestration, Automation and Response
Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach
Next Generation SOAR
Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included
Threat Intelligence Platform
Cybersecurity threat data collection, analysis, enrichment, infrastructure detection, investigation and response.
Asset Management
Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations
Risk Management
Formation of a register of risks, threats, protection measures and other control parameters, assessment using the chosen methodology, formation of a list of additional measures to change the level of risk, control of execution, periodic reassessment.
User and Entity Behavior Analytics
Building behavior models and detecting deviations from them using several dozen built-in static analysis rules.
Operational Risk Management
Accounting and recording of operational risk events, monitoring of key risk indicators and self-assessment/control
Vulnerability Management
Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions
Compliance Management
Audit of compliance with various methodologies and standards
User and Entity Behavior Analysis
Dynamic behavioral analysis to search for anomalies using machine learning and to search for possible incidents.
Business Continuity Plan
Automation of ensuring continuity and restoration of activities after emergencies.
Financial Computer Emergency Response Team
Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator
Government Computer Emergency Response Team
Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator
Operational Technology Security
Operational Technology Security
Still have questions?