Suvarna Garge (Editor)

Security Vision

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Developer(s)
  
Trimetr Co

Stable release
  
3.3 / 2015

Available in
  
Russian

Initial release
  
2007

Development status
  
Active development

Operating system
  
Microsoft Windows, Red Hat Enterprise Linux (System requirements)

Security Vision – software meant for automation of information security management system (ISMS) organisation.

Contents

Software of this kind is a representative of security operations center (SOC).

Functionality

The functionality of Security Vision renders Information Security processes comprising Information Security Management System of an organization automatic in compliance with international information security management standards ISO/IEC 27001:2013. Next Security Vision modules allow to make automatic the performance of standard requirements in the following sections:

  • Information assets management;
  • Information security regulatory documents management;
  • Information security entries and logs management;
  • Information security standards compliance management;
  • Information security risk management;
  • Computer security incident management;
  • Knowledge management;
  • Corporate system interaction management;
  • Corporate information security awareness management;
  • Monitoring and audit management;
  • Vulnerability management;
  • Change management in IT field;
  • Business continuity management;
  • Data storage device management;
  • Limit management of security object;
  • Physical security management;
  • Backup management;
  • Mobile client management;
  • Cloud information security system management;
  • Data visualization and information security status alert management;
  • Information security status reports management.
  • Architecture

    From the moment of creation of Security Vision software and up till now the creator of the system sticks to a three-level architecture – core level, collection level and management level.

    Core level – made for collection, analysis and correlation of events generated by different sources of events in a corporate network.

    Collection level – meant for:

  • Collection, standardization and dispatch to the core level of events coming from the home information security systems;
  • Inspection and control of hardware means integrity, of system and application software located at the servers and workstations.
  • Management level – made for rendering information security management process automatic and is basically a Russian-speaking system management portal.

    Supported systems

    Security Vision software collects events generated in the process of the following information security and information technology functioning:

  • Information security systems:
  • Firewall;
  • Intrusion detection/prevention system;
  • Cryptographic information security system;
  • Unauthorized access security system;
  • Anti-virus security system;
  • Data loss/leak prevention system;
  • Content-control system and proxy server;
  • Anti-spam system;
  • Virtual infrastructure security system;
  • Database security system;
  • Access control system;
  • Other IP-oriented systems;
  • Network equipment – routers, switches, etc.;
  • Technical security systems:
  • Information leakage through technical channels security system;
  • Guard alarm system;
  • Fire alarm system;
  • Closed-circuit television system;
  • Access control system;
  • Warning system;
  • Security alarm system;
  • Area surveillance system;
  • Security lighting system;
  • Security smoke alarm system;
  • Emergency power system;
  • Heating, ventilation, and air conditioning system;
  • Other IP-oriented systems;
  • Information technology systems:
  • Customer relationship management system;
  • Enterprise content management system;
  • Enterprise resource planning system;
  • Human resources management system;
  • Enterprise asset management system;
  • Business process management system;
  • Information lifecycle management system;
  • Service desk system;
  • Corporate e-mail server (Message transfer agent);
  • Database management system;
  • Workstation management system;
  • Web server;
  • Other IP-oriented systems;
  • Industrial control system:
  • Building management system;
  • IT infrastructure engineering management;
  • Traffic management;
  • Power tracking management;
  • Corporate energy management, Power management center;
  • Central dispatcher unit, situational center of energy efficiency;
  • Operation systems – server OS and workstation OS.
  • Regulatory requirements

    Regulatory requirements associated with the necessity of the system of such a kind can be found in the mandatory legislation norms of the Russian Federation law as well as in the recommended international prescriptions for economic sectors in this area.

    Regulatory security requirements:

  • Personally identifiable information;
  • Confidential information;
  • Classified information;
  • Key systems information.
  • Industry standards for:

  • Energy industry;
  • Finance sector;
  • Public sector;
  • Certificate authority.
  • International standards for:

  • Information security management;
  • Quality management;
  • Information security risk management;
  • IT service management;
  • Business continuity planning;
  • Occupational safety and health management;
  • Sustainable development management;
  • System integration management;
  • IT management, audit and information security.
  • Certification

    Software of the core level, which comprises the functionality of stocktaking and integrity control, is a certified means on the 4 level of control over absence of non-declared capabilities, that is listed in the National Catalog of Certified Information Security Means of the Federal Office for Technical and Export Control, and can be also used:

  • In the automatic systems up to class 1G included («Management document. Automated systems. Unauthorized access security. Automated systems classification and information security requirements»);
  • In the information systems up to security class 1 included (Decree of the Federal Office for Technical and Export Control dated 11.02.2013 № 17 «Mandatory regulations on information security, not being classified information, held within national information systems»);
  • In the personally identifiable information systems for maintenance of security level 1 included (Decree of the Federal Office for Technical and Export Control dated 18.02.2013 № 21 «List and contents of the organizational and technical means to provide information security of personally identifiable information in the personally identifiable information systems»).
  • Awards

    2013:

  • InfoBez Award 2013. Nomination «E=mc2 – for creation of powerful applications and technology».
  • 2012:

  • InfoBez Award 2012. Nomination «Meteor – for speed of reaction, for quick right solutions»;
  • Solution №1 in Russia in monitoring and enterprise security management (based on the analysis results of the IT Expert magazine);
  • Professional award in the area of information security «Silver dagger». Diploma and a medal for nomination «Realized projects in information security».
  • 2011:

  • Competition «Product of the year 2011» in the category «Information security» based on the LAN magazine votes;
  • InfoSecurity Russia 2011. «Award 2011.itsec.award»;
  • National field award for consolidation of security in Russia «ZUBR». Diploma and a gold medal.
  • 2010:

  • Innovation competition Cisco, nomination «Best solution «Network without limits». Prize-winning place.
  • Press

  • «How to automate measurement of information security on the scale of an enterprise»;
  • «IT Co protected personally identifiable information of the «ROSTELEKOM J.S.C.» Irkutsk subscribers»;
  • «Virtual systems: security illusion or pointless fear?»;
  • «Managed security»;
  • «Creation of an automatic information security management system»;
  • «The very SOC of an enterprise»;
  • «How to automate information security management»;
  • «Security Vision: to see security»;
  • «Security Vision – information security management and monitoring»;
  • «New version of Security Vision for information security»;
  • «Security Vision from IT Co»;
  • «IT Co presents a new version of the complex information security system Security Vision»;
  • «Centers of operation information security management»;
  • «Information security: Surfing… But do we know?».
  • References

    Security Vision Wikipedia