| Developers: | Securitm (Sekjuritm) |
| Date of the premiere of the system: | 2021 |
| Branches: | Information security |
| Technology: | ITSM - IT Service Management Systems, RPA - Robotic Process Automation, SaaS - Software as a Service, Information Security - IT Risk Management - Digital Risk Protection (DRP) |
Content |
The main articles are:
- IT Service Management (ITSM)
- RPA (Robotic process automation)
- SaaS - History. Philosophy. Development drivers
No. 11924 in the Register of domestic software
2025
Integration with SearchInform CIB
SearchInform"" SECURITM and presented a ready-made solution for automating control of regulatory requirements. The companies have completed integration DLP SECURITM's -systems SearchInform CIB and management systems INFORMATION SECURITY. Together, the products allow you to assess the security against in real time data , leaks automate the audit of the information security infrastructure and form the necessary reporting for and. FSTEC of Russia Roskomnadzor This "" was SearchInform announced on October 14, 2025. More here.
Integration with RedCheck
The SECURITM Information Security Process Management System was integrated with the RedCheck Security Analysis System certified by the FSTEC of Russia. Thanks to the collaboration, users will have a single space to manage infrastructure security. Securitm (Sekyuritm) announced this on September 25, 2025.
The integration of the two solutions provides the following capabilities:
- Assess threats using the Russian FSTEC methodology and create a comprehensive process of prioritization and elimination of vulnerabilities;
- Carry out dynamic inventory and accounting of IT assets to obtain detailed information about the infrastructure;
- Continuous monitoring and security analysis to predict risks and weaknesses in the infrastructure that could be exploited by attackers;
- The presence of several sources of vulnerability databases from the CVE/NOS/NCCC/OVALdb directories increases the coverage of the list of potential threats and the speed of their detection;
- Have your own AI assistant that improves efficiency, instantly processing large amounts of information and saves time. It helps with routine tasks, from data analysis to instructions for fixing vulnerabilities;
- Build processes in a single system: according to the requirements of orders No. 21/239/17 and the standard GOST Central Bank 57580, instructions from the foreign expert organization CIS Benchmarks, ready-made configurations in RedCheck on the recommendations of manufacturers of domestic OS and software to ensure the appropriate level of information protection;
- Manage security configurations and settings, receive] and dashboards analytical reports with recommendations;
- Automate response to critical vulnerabilities by configuring automated processes to quickly address the most critical vulnerabilities.
- Monitor the elimination of vulnerabilities and the emergence of new ones, collect and configure metrics and reports to evaluate results.
| We see integration with RedCheck as an important step towards making vulnerability management as transparent and convenient as possible for our customers, "commented SECURITM CEO, Nikolay Kazantsev. |
| Integration of RedCheck EPS in SECURITM is an opportunity to use a certified FSTEC solution. Get an integrated approach to asset protection, bring vulnerability management processes in line with the requirements of the regulator and industry standards, - said Dmitry Chernyakov, director of product development at AltexSoft. |
Integration with Ideco NGFW
A partnership is presented on the Russian information security market that has combined the Ideco NGFW multifunctional firewall and the SECURITM information security process control system. The collaboration created a comprehensive solution that takes network security monitoring and management to the next level. Ideco (Aydeko) announced this on September 8, 2025. Read more here.
2024
Integration with StaffCop
The Staffcop Enterprise incident investigation system has been integrated with the domestic SGRC platform for organizational process management in Securitm information security services. The developer announced this on August 28, 2024. Read more here.
Purpose. Composition. Key features
SECURITM is a universal tool for corporate information security services that allows accounting, control and automation of all organizational processes important to information security services in one system. Instead of disparate applications, tables and documents, information security employees can use a single platform to monitor and enforce security rules and procedures. These are SGRC, VM, IRP, ITAM, RPA in one bottle, developing Community on the principle of openness and accessibility for each Information Security Service.
SECURITM consists of modules (as of March 2024):
- Asset management (ITAM, Information technology asset management)
- Risk management
- Compliance
- Management of protective measures
- Technical Vulnerability Management (VM)
- Task Management
- Surveys and Applications
- Process automation (RPA, Robotic process automation)
- Metric management
For companies, SECURITM ensures business continuity and reduces the cost of dealing with security incidents by:
- reduces up to 40% of leaks and violations by increasing the efficiency of processes and eliminating the human factor in information security;
- Layoffs and changes in the information security service do not lead to degradation of the information security system;
- All information security work is transparent and understandable thanks to reports and metrics;
- The validity of human and financial costs is assessed.
SECURITM information security services allow:
- Move away from disparate Excel spreadsheets and non-specialized systems;
- Maintain control and accounting of ISDS, CII, GIS and any related assets, combining them into digital models;
- Automate up to 90% of routine processes and operations;
- Reduce up to 70% of the time to collect information from employees and counterparties;
- Automatically assess and monitor compliance with any regulatory and regulatory requirements;
- Integrate with enterprise systems;
- Launch a risk-based approach from scratch in 5 minutes.
Features of use:
In the Asset Module, you can record and manage various entities, from servers to logs to business processes. More than 200 types of assets (registries) and the ability to create their own types, endowing them with any attributes and properties, including links to other objects. Assets can be linked to the digital model of a company, displaying it on the graphs of connections, automate behavior in asset management using the RPA constructor, and form your own metrics for assets and their parameters. The asset module is well suited for logging, such as CIPF or Security Incident Logs (IRPs). Data can come to SECURITM through direct integrations, via APIs, or through files.
In the Risk Management Module, you can create registers and risk management plans, define the assessment methodology and criteria, and create registers of current security threats. Risk assessment can take place either manually or automatically, changing after changes in metrics and technical indicators. NOS and infrastructures FSTEC MITRE ATT&CK bases are connected.
The Compliance Module contains the largest public database of information security documents, divided into requirements and related to each other. By assessing compliance with one standard, SECURITM indirectly assesses dozens of other documents, due to the correlation of similar requirements from various documents with each other. There are percentage and ballroom conformity assessments, the ability to conduct an assessment according to industry methods, for example, according to GOST 57580.2. Evaluation can be done in several ways, ranging from simple yes/no to automated assessment based on metrics and the state of the company's IT infrastructure.
The VM module is an aggregator of reports from security scanners. Infrastructure scanners Qualys(,,, Nessus RedCheck Nmap, OpenVas,,, 8 Kaspersky,) XSpider, MaxPatrol MaxPatrol VM web application scanners (OWASP ZAP), perimeter scanners (Scan Factory), cloudy infrastructure scanners (Cloud Advisor), code scanners (,, etc.). AppScreener Snyk Vulnerabilities are prioritized, including according to the FSTEC Methodology, Russia convenient for analysis dashboards and decision-making on management. Tasks are formed to eliminate vulnerabilities - in your own SECURITM task module or in third-party systems (for example). Jira
In the RPA Module, you can form automation processes in the designer that start when changes in the system or on a schedule, which allows you to remove part of the routine from the Information Security Services. For example, you can run a third-party script when a critical vulnerability appears in the infrastructure, or start the process of familiarizing a new worker with security documents.
In the Protective Measures, registers of all activities of the Information Security Service are maintained, projects, work plans and reporting are formed. Protective measures affect the magnitude of risks and the level of compliance.
Through the Survey Module, you can update asset cards (for example, IDMS or OKII) from their owners, conduct a compliance assessment (for example, as part of the supplier safety assessment procedure), train employees, and collect feedback. There, in the application module, you can build a Service Desk portal through which users will apply for access or report the detection of security incidents.
The metrics module is a constructor in which you can create dashboards for various information security indicators. There are several ways to collect data (telemetry) to form metrics - and manual options through user surveys and automatic, when data is collected through direct and custom integrations, and metrics are formed on their basis according to given formulas. In case of violation by metrics of specified thresholds, tasks can be automatically generated, safety risks and compliance level can be reassessed.
Key features of the system:
- Swiss All In One knife for multiple security processes
- Suitable for any industry and tasks - PD, CII, GIS, SUIB, CIS, 57580
- Largest Public Adjusted Regulatory Base to Conduct Compliance Assessment
- A ready-made public base with draft risks and protective measures
- Clear pricing and open price right on the manufacturer's website
- The product has a free Community version.
- There are also SaaS and On-Premise delivery options
- Releases with feature updates every week
- Ready-to-use direct integrations with enterprise systems and endless integrations via universal connectors (APIs and files)

