You can edit almost every page by Creating an account. Otherwise, see the FAQ.

Security Vision

From EverybodyWiki Bios & Wiki

Security Vision
Developer(s)Trimetr Co
Initial release2007
Stable release
3.3 / 2015
Engine
    Operating systemMicrosoft Windows, Red Hat Enterprise Linux (System requirements)
    Available inRussian
    TypeApplication
    LicenseProprietary
    Websitewww.securityvision.ru

    Search Security Vision on Amazon.

    Security Visionsoftware meant for automation of information security management system (ISMS) organisation.

    Software of this kind is a representative of security operations center (SOC).

    Functionality[edit]

    The functionality of Security Vision renders Information Security processes comprising Information Security Management System of an organization automatic in compliance with international information security management standards ISO/IEC 27001:2013. Next Security Vision modules allow to make automatic the performance of standard requirements in the following sections:

    Architecture[edit]

    From the moment of creation of Security Vision software and up until now the creator of the system sticks to a three-level architecture – core level, collection level and management level.

    Core level – made for collection, analysis and correlation of events generated by different sources of events in a corporate network.

    Collection level – meant for:

    • Collection, standardization and dispatch to the core level of events coming from the home information security systems;
    • Inspection and control of hardware means integrity, of system and application software located at the servers and workstations.

    Management level – made for rendering information security management process automatic and is basically a Russian-speaking system management portal.

    Supported systems[edit]

    Security Vision software collects events generated in the process of the following information security and information technology functioning:

    Regulatory requirements[edit]

    Regulatory requirements associated with the necessity of the system of such a kind can be found in the mandatory legislation norms of the Russian Federation law as well as in the recommended international prescriptions for economic sectors in this area.

    Regulatory security requirements:

    Industry standards for:

    International standards for:

    Certification[edit]

    Software of the core level, which comprises the functionality of stocktaking and integrity control, is a certified means on the 4 level of control over absence of non-declared capabilities,[1] that is listed in the National Catalog of Certified Information Security Means of the Federal Office for Technical and Export Control,[2] and can be also used:

    • In the automatic systems up to class 1G included («Management document. Automated systems. Unauthorized access security. Automated systems classification and information security requirements»);[3]
    • In the information systems up to security class 1 included (Decree of the Federal Office for Technical and Export Control dated 11.02.2013 No. 17 «Mandatory regulations on information security, not being classified information, held within national information systems»);[4]
    • In the personally identifiable information systems for maintenance of security level 1 included (Decree of the Federal Office for Technical and Export Control dated 18.02.2013 No. 21 «List and contents of the organizational and technical means to provide information security of personally identifiable information in the personally identifiable information systems»).[5]

    System requirements[edit]

    Minimum system requirements for software operation on the core level
    Operation system Hardware requirements
    • Red Hat Enterprise Linux 5.7 64-bit
    • CPU – 2 quad-core 2.4 GHz
    • RAM – 24 GB
    • Free space on the hard drive – 3 TB (RAID10)
    • Network adapter
    Minimum system requirements for software operation on the management level
    Operation system Hardware requirements
    • Microsoft Windows Server 2012 (Essentials/Standard/Datacenter)
    • Microsoft Windows Server 2008 R2 (Enterprise/ Standard/Datacenter)
    • Microsoft Windows Server 2008 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • CPU – 2 GHz
    • RAM – 4 GB
    • Free space on the hard drive – 2 GB
    • Network adapter
    Minimum system requirements for software operation on the collection level (log functionality)
    Operation system Hardware requirements
    • Microsoft Windows Server 2012 (Essentials/Standard/Datacenter)
    • Microsoft Windows Server 2008 R2 (Enterprise/ Standard/Datacenter)
    • Microsoft Windows Server 2008 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows Server 2003 R2 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows Server 2003 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows 8 32-bit/64-bit (Core/Pro/ Enterprise)
    • Microsoft Windows 7 32-bit/64-bit (Home Basic/Home Premium/Professional/Enterprise/Ultimate)
    • Microsoft Windows Vista 32-bit/64-bit (Home Basic/Home Premium/Business/Enterprise/Ultimate)
    • Microsoft Windows XP SP3 32-bit/64-bit (Professional Edition)
    • CPU – 1.4 GHz
    • RAM – 512 MB
    • Free space on the hard drive – 500 MB
    • Network adapter
    Minimum system requirements for software operation on the collection level (stocktaking and integrity control functionality)
    Operation system Hardware requirements
    • Microsoft Windows Server 2012 (Essentials/Standard/Datacenter)
    • Microsoft Windows Server 2008 R2 (Enterprise/ Standard/Datacenter)
    • Microsoft Windows Server 2008 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows Server 2003 R2 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows Server 2003 SP2 32-bit/64-bit (Standard/Enterprise/Datacenter)
    • Microsoft Windows 8 32-bit/64-bit (Core/Pro/ Enterprise)
    • Microsoft Windows 7 32-bit/64-bit (Home Basic/Home Premium/Professional/Enterprise/Ultimate)
    • Microsoft Windows Vista 32-bit/64-bit (Home Basic/Home Premium/Business/Enterprise/Ultimate)
    • Microsoft Windows XP SP3 32-bit/64-bit (Professional Edition)
    • CPU – 800 MHz
    • RAM – 512 MB
    • Free space on the hard drive – 50 MB
    • Network adapter

    Awards[edit]

    2013:

    • InfoBez Award 2013. Nomination «E=mc2 – for creation of powerful applications and technology».[6]

    2012:

    • InfoBez Award 2012. Nomination «Meteor – for speed of reaction, for quick right solutions»;[7]
    • Solution No.1 in Russia in monitoring and enterprise security management (based on the analysis results of the IT Expert magazine);[8]
    • Professional award in the area of information security «Silver dagger». Diploma and a medal for nomination «Realized projects in information security».[9]

    2011:

    • Competition «Product of the year 2011» in the category «Information security» based on the LAN magazine votes;[10]
    • InfoSecurity Russia 2011. «Award 2011.itsec.award»;[11]
    • National field award for consolidation of security in Russia «ZUBR». Diploma and a gold medal.[12]

    2010:

    • Innovation competition Cisco, nomination «Best solution «Network without limits». Prize-winning place.[13]

    Press[edit]

    • «How to automate measurement of information security on the scale of an enterprise»;[14]
    • «IT Co protected personally identifiable information of the «ROSTELEKOM J.S.C.» Irkutsk subscribers»;[15]
    • «Virtual systems: security illusion or pointless fear?»;[16]
    • «Managed security»;[17]
    • «Creation of an automatic information security management system»;[18]
    • «The very SOC of an enterprise»;[19]
    • «How to automate information security management»;[20]
    • «Security Vision: to see security»;[21]
    • «Security Vision – information security management and monitoring»;[22]
    • «New version of Security Vision for information security»;[23]
    • «Security Vision from IT Co»;[24]
    • «IT Co presents a new version of the complex information security system Security Vision»;[25]
    • «Centers of operation information security management»;[26]
    • «Information security: Surfing… But do we know?».[27]

    References[edit]

    1. «Management document. Unauthorized access security Part 1. Software security. Classification by level of access to undeclared capabilities»
    2. Certificate of Compliance of the Federal Office for Technical and Export Control Russia № 2709
    3. «Management document. Automated systems. Unauthorized access security. Automated systems classification and information security requirements»
    4. Decree of the Federal Office for Technical and Export Control dated 11.02.2013 № 17 «Mandatory regulations on information security, not being classified information, held within national information systems»
    5. Decree of the Federal Office for Technical and Export Control dated 18.02.2013 № 21 «List and contents of the organizational and technical means to provide information security of personally identifiable information in the personally identifiable information systems»
    6. InfoBez Award 2013
    7. InfoBez Award 2012
    8. Analysis of the IT Expert magazine 2012
    9. Information Security National Forum «Infoforum» 2012
    10. Competition of the LAN magazine 2011
    11. InfoSecurity Russia 2011 Archived 2014-02-03 at the Wayback Machine
    12. National field security award «ZUBR» 2011
    13. Innovation competition Cisco 2010
    14. Blog «Secure business» A. Lukatskiy, 2013
    15. Cisco.com, 2013
    16. CNews, 2013
    17. IT-Expert, 2012
    18. CIO, 2011
    19. Computerworld Russia, 2011
    20. Energypolis, 2011
    21. Information technologies in the energy industry, 2010 Archived 2014-04-01 at the Wayback Machine
    22. BYTE Russia, 2010
    23. BYTE Russia, 2010
    24. CIO-World, 2010 Archived 2014-01-27 at Archive.today
    25. Rambler, 2010 Archived 2014-03-27 at the Wayback Machine
    26. BYTE Russia, 2009
    27. CIO, 2008 Archived 2014-04-01 at the Wayback Machine

    External links[edit]


    This article "Security Vision" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Security Vision. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.