Security Vision
Developer(s) | Trimetr Co |
---|---|
Initial release | 2007 |
Stable release | 3.3
/ 2015 |
Engine | |
Operating system | Microsoft Windows, Red Hat Enterprise Linux (System requirements) |
Available in | Russian |
Type | Application |
License | Proprietary |
Website | www |
Search Security Vision on Amazon.
Security Vision – software meant for automation of information security management system (ISMS) organisation.
Software of this kind is a representative of security operations center (SOC).
Functionality[edit]
The functionality of Security Vision renders Information Security processes comprising Information Security Management System of an organization automatic in compliance with international information security management standards ISO/IEC 27001:2013. Next Security Vision modules allow to make automatic the performance of standard requirements in the following sections:
- Information assets management;
- Information security regulatory documents management;
- Information security entries and logs management;
- Information security standards compliance management;
- Information security risk management;
- Computer security incident management;
- Knowledge management;
- Corporate system interaction management;
- Corporate information security awareness management;
- Monitoring and audit management;
- Vulnerability management;
- Change management in IT field;
- Business continuity management;
- Data storage device management;
- Limit management of security object;
- Physical security management;
- Backup management;
- Mobile client management;
- Cloud information security system management;
- Data visualization and information security status alert management;
- Information security status reports management.
Architecture[edit]
From the moment of creation of Security Vision software and up until now the creator of the system sticks to a three-level architecture – core level, collection level and management level.
Core level – made for collection, analysis and correlation of events generated by different sources of events in a corporate network.
Collection level – meant for:
- Collection, standardization and dispatch to the core level of events coming from the home information security systems;
- Inspection and control of hardware means integrity, of system and application software located at the servers and workstations.
Management level – made for rendering information security management process automatic and is basically a Russian-speaking system management portal.
Supported systems[edit]
Security Vision software collects events generated in the process of the following information security and information technology functioning:
- Information security systems:
- Firewall;
- Intrusion detection/prevention system;
- Cryptographic information security system;
- Unauthorized access security system;
- Anti-virus security system;
- Data loss/leak prevention system;
- Content-control system and proxy server;
- Anti-spam system;
- Virtual infrastructure security system;
- Database security system;
- Access control system;
- Other IP-oriented systems;
- Network equipment – routers, switches, etc.;
- Technical security systems:
- Information leakage through technical channels security system;
- Guard alarm system;
- Fire alarm system;
- Closed-circuit television system;
- Access control system;
- Warning system;
- Security alarm system;
- Area surveillance system;
- Security lighting system;
- Security smoke alarm system;
- Emergency power system;
- Heating, ventilation, and air conditioning system;
- Other IP-oriented systems;
- Information technology systems:
- Customer relationship management system;
- Enterprise content management system;
- Enterprise resource planning system;
- Human resources management system;
- Enterprise asset management system;
- Business process management system;
- Information lifecycle management system;
- Service desk system;
- Corporate e-mail server (Message transfer agent);
- Database management system;
- Workstation management system;
- Web server;
- Other IP-oriented systems;
- Industrial control system:
- Building management system;
- IT infrastructure engineering management;
- Traffic management;
- Power tracking management;
- Corporate energy management, Power management center;
- Central dispatcher unit, situational center of energy efficiency;
- Operation systems – server OS and workstation OS.
Regulatory requirements[edit]
Regulatory requirements associated with the necessity of the system of such a kind can be found in the mandatory legislation norms of the Russian Federation law as well as in the recommended international prescriptions for economic sectors in this area.
Regulatory security requirements:
- Personally identifiable information;
- Confidential information;
- Classified information;
- Key systems information.
Industry standards for:
- Energy industry;
- Finance sector;
- Public sector;
- Certificate authority.
International standards for:
- Information security management;
- Quality management;
- Information security risk management;
- IT service management;
- Business continuity planning;
- Occupational safety and health management;
- Sustainable development management;
- System integration management;
- IT management, audit and information security.
Certification[edit]
Software of the core level, which comprises the functionality of stocktaking and integrity control, is a certified means on the 4 level of control over absence of non-declared capabilities,[1] that is listed in the National Catalog of Certified Information Security Means of the Federal Office for Technical and Export Control,[2] and can be also used:
- In the automatic systems up to class 1G included («Management document. Automated systems. Unauthorized access security. Automated systems classification and information security requirements»);[3]
- In the information systems up to security class 1 included (Decree of the Federal Office for Technical and Export Control dated 11.02.2013 No. 17 «Mandatory regulations on information security, not being classified information, held within national information systems»);[4]
- In the personally identifiable information systems for maintenance of security level 1 included (Decree of the Federal Office for Technical and Export Control dated 18.02.2013 No. 21 «List and contents of the organizational and technical means to provide information security of personally identifiable information in the personally identifiable information systems»).[5]
System requirements[edit]
Minimum system requirements for software operation on the core level | ||
---|---|---|
Operation system | Hardware requirements | |
|
|
Minimum system requirements for software operation on the management level | ||
---|---|---|
Operation system | Hardware requirements | |
|
|
Minimum system requirements for software operation on the collection level (log functionality) | ||
---|---|---|
Operation system | Hardware requirements | |
|
|
Minimum system requirements for software operation on the collection level (stocktaking and integrity control functionality) | ||
---|---|---|
Operation system | Hardware requirements | |
|
|
Awards[edit]
2013:
- InfoBez Award 2013. Nomination «E=mc2 – for creation of powerful applications and technology».[6]
2012:
- InfoBez Award 2012. Nomination «Meteor – for speed of reaction, for quick right solutions»;[7]
- Solution No.1 in Russia in monitoring and enterprise security management (based on the analysis results of the IT Expert magazine);[8]
- Professional award in the area of information security «Silver dagger». Diploma and a medal for nomination «Realized projects in information security».[9]
2011:
- Competition «Product of the year 2011» in the category «Information security» based on the LAN magazine votes;[10]
- InfoSecurity Russia 2011. «Award 2011.itsec.award»;[11]
- National field award for consolidation of security in Russia «ZUBR». Diploma and a gold medal.[12]
2010:
- Innovation competition Cisco, nomination «Best solution «Network without limits». Prize-winning place.[13]
Press[edit]
- «How to automate measurement of information security on the scale of an enterprise»;[14]
- «IT Co protected personally identifiable information of the «ROSTELEKOM J.S.C.» Irkutsk subscribers»;[15]
- «Virtual systems: security illusion or pointless fear?»;[16]
- «Managed security»;[17]
- «Creation of an automatic information security management system»;[18]
- «The very SOC of an enterprise»;[19]
- «How to automate information security management»;[20]
- «Security Vision: to see security»;[21]
- «Security Vision – information security management and monitoring»;[22]
- «New version of Security Vision for information security»;[23]
- «Security Vision from IT Co»;[24]
- «IT Co presents a new version of the complex information security system Security Vision»;[25]
- «Centers of operation information security management»;[26]
- «Information security: Surfing… But do we know?».[27]
References[edit]
- ↑ «Management document. Unauthorized access security Part 1. Software security. Classification by level of access to undeclared capabilities»
- ↑ Certificate of Compliance of the Federal Office for Technical and Export Control Russia № 2709
- ↑ «Management document. Automated systems. Unauthorized access security. Automated systems classification and information security requirements»
- ↑ Decree of the Federal Office for Technical and Export Control dated 11.02.2013 № 17 «Mandatory regulations on information security, not being classified information, held within national information systems»
- ↑ Decree of the Federal Office for Technical and Export Control dated 18.02.2013 № 21 «List and contents of the organizational and technical means to provide information security of personally identifiable information in the personally identifiable information systems»
- ↑ InfoBez Award 2013
- ↑ InfoBez Award 2012
- ↑ Analysis of the IT Expert magazine 2012
- ↑ Information Security National Forum «Infoforum» 2012
- ↑ Competition of the LAN magazine 2011
- ↑ InfoSecurity Russia 2011 Archived 2014-02-03 at the Wayback Machine
- ↑ National field security award «ZUBR» 2011
- ↑ Innovation competition Cisco 2010
- ↑ Blog «Secure business» A. Lukatskiy, 2013
- ↑ Cisco.com, 2013
- ↑ CNews, 2013
- ↑ IT-Expert, 2012
- ↑ CIO, 2011
- ↑ Computerworld Russia, 2011
- ↑ Energypolis, 2011
- ↑ Information technologies in the energy industry, 2010 Archived 2014-04-01 at the Wayback Machine
- ↑ BYTE Russia, 2010
- ↑ BYTE Russia, 2010
- ↑ CIO-World, 2010 Archived 2014-01-27 at Archive.today
- ↑ Rambler, 2010 Archived 2014-03-27 at the Wayback Machine
- ↑ BYTE Russia, 2009
- ↑ CIO, 2008 Archived 2014-04-01 at the Wayback Machine
External links[edit]
This article "Security Vision" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Security Vision. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.