| The name of the base system (platform): | Security Vision Specialized platform for automating information security processes |
| Developers: | GC Intelligent Security (Security Vision Brand) |
| Last Release Date: | 2026/02/12 |
| Branches: | Information security |
| Technology: | Information Security Management (SIEM) |
Content |
Main article: Security Information and Event Management (SIEM)
A software product for automating the process of categorizing and ensuring the security of critical information infrastructure objects in accordance with legislative and regulatory requirements. Security Vision CII is built on the basis of a graphical workflow designer, which gives the Customer the opportunity to adapt the basic product procedures to their unique internal business processes.
Results of use
- aggregation and accounting of information about CII objects in a single workspace
- automation of the process of categorization of CII objects
- control of compliance measures
- development of private threat models of CII objects
- generation of reports and information on CII facilities
- interaction with technical infrastructure of NKTsKI (State system of detection, prevention and elimination of consequences of computer attacks)
2026: Updating the information form on the object of CII
Security Vision has launched an updated Security Vision KII product on the market, ensuring the implementation of legislative requirements in terms of critical information infrastructure in an automated mode. The company announced this on February 12, 2026.
Key updates include:
- Areas of activity of CII subjects and connection with typical industry objects of CII
- Updating the form of information about the object of CII
- Automation of calculation of economic significance in terms of categorization of CII objects
- Automation of evaluation of technical protection status indicators
- Simulates threats against a common list of information security threats.
Typical industry lists of CII facilities are included in the categorization process. Also, in connection with the amendments to the Decree of the Government of the Russian Federation of 08.02.2018 No. 127 (as amended by the 07.11.2025) "On Approval of the Rules for Categorizing Critical Information Infrastructure Facilities of the Russian Federation, as well as the list of indicators of criteria for the significance of critical information infrastructure facilities of the Russian Federation and their values," the criteria for significance for the CII facility were updated and the form of information on the results of categorizing the CII facility was updated.
Automation of the calculation of economic significance in the process of categorization of the CII object is carried out in accordance with the methodological document of the FSTEC of Russia - "Recommendations for assessing the indicators of the criteria for economic significance of critical information infrastructure facilities of the Russian Federation."
The calculation is carried out according to the following indicators of the criteria for the significance of CII objects and their values:
- Damage to the subject of CII (indicator No. 8)
- Damage to the budget of the Russian Federation (indicator No. 9)
- Termination of financial transactions (indicator No. 10)
The result of the calculation is not only the value of the criterion by which the category (significance) of the CII object is determined, but also the accompanying economic indicators that automatically fall into the "Justification" section for the corresponding criterion.
Automation of the assessment is carried out in accordance with the methodological document of the FSTEC of Russia dated 11.11.2025 "Methodology for assessing the indicator of the state of technical protection of information in information systems and ensuring the security of significant objects of the critical information infrastructure of the Russian Federation."
The product allows you to automatically calculate the indicators of the current state of security for each group of indicators and determine the final level of security.
The functionality of modeling information security threats has been significantly expanded. In addition to the existing approach of threat modeling, based on the new section of threats, the information security threat data bank of the FSTEC of Russia, a threat assessment has been implemented in accordance with the methodological document of the FSTEC of Russia - "Methodology for Assessing Information Security Threats." (During threat modeling) Threat scenarios are automatically built based on the sequence of tactics and techniques, and current ways of implementing threats are determined.
Thus, the user can independently choose the method of modeling threats.
Added reports on threats neutralized by protection measures, as well as a general list of not applicable for assessing threats with justification of irrelevance.
For the methodology of modeling threats according to the general list, a separate dashboard has been created.
2025
Obtaining a certificate of conformity of the Ministry of Defense of the Russian Federation for NDV-2
On September 9, 2025, Security Vision announced that in IBLow code/No code, the Security Vision platform and all modules based on it, including Security Vision CII, received a certificate of conformity from the Ministry of Defense of the Russian Federation (No. 7564 of 28.08.2025) in the information protection certification system. Read more here.
Implementation of legislation requirements in terms of CII in automatic mode
On February 25, 2025, Security Vision announced the entry into the market of the updated Security Vision CII product, which ensures the implementation of legislative requirements in terms of critical information infrastructure in automatic mode.
According to the company, Security Vision CII automates the following processes:
- Formation of an up-to-date list of CII objects and critical processes
- Categorization of CII objects in order to determine the category of significance
- Modeling of threats safety information to identify actual threats in relation to the object of CII
- Assessment of compliance of CII facilities with information security requirements
- Handling Regulatory Requests and Related Tasks
Security Vision CII can be used both in small and medium-sized businesses and in large enterprises with a geographically distributed structure. For the latter, it is possible to divide powers and areas of responsibility (for example, the isolation of each of the branches or controlled enterprises).
The process of categorizing CII objects using CII Security Vision begins with identifying critical processes of the organization, in case of violation of which can lead to negative consequences. The product generates a list of critical processes and identifies critical information infrastructure objects that automate these processes.
The indicators of the significance criteria and their values are evaluated to determine the category of significance, and all the necessary information on the CII object is filled in. In this case, all information on related assets is automatically filled in from the asset model.
As a result of the categorization process, documents are formed that fully comply with the requirements of the FSTEC of Russia:
- Information on the results of assigning one of the categories of significance to the CII object or on the absence of the need to assign one of these categories to it
- Act of CII object categorization
The process of modeling threats in relation to CII objects is carried out taking into account all objects of influence and their components with the ability to flexibly form a modeling area.
Threat modeling includes:
- Identification of negative consequences in the form of damage to the organization in the event of a computer incident, which may lead to a violation or termination of the critical process
- Identify Potential Violators (Threat Sources)
- Add risk groups automatically or manually
- Add automatic or manual threat implementations
- Add threats automatically or manually
Threat modeling is carried out in accordance with the methodological document of the FSTEC of Russia - "Methodology for assessing threats to information security." The result of the simulation is a list of current threats in relation to the objects of influence and their components, which, in turn, are part of the CII object.
The compliance assessment process is carried out in relation to the CII facilities to assess the requirements and safety measures implemented in accordance with the orders of the FSTEC of Russia No. 235 and No. 239. The assessment is carried out by filling out information on the current state of the CII facility with the ability to delegate (in whole or in part) questionnaires to the relevant experts.
Based on unrealized and incomplete requirements, a list is formed with the possibility of creating tasks to eliminate non-conformities.
Security Vision CII processes requests from the following regulators:
- Bank of Russia
- FSTEC of Russia
- FSB of Russia
The request received from the regulator is entered into the system. If necessary, a task is formed for a certain performer with a due date, as well as with the ability to control the execution. Two-way integration with the main external ITSM systems is implemented with the ability to create applications and track their status.
The Security Vision of the CII has developed in depth the main reports on the CII processes both for sending to the FSTEC of Russia and for internal use.
Dashboards highlight CII objects, on which it is necessary to categorize and simulate threats in the near future, help to track current threats and violators on an ongoing basis. The interactive map displays statistics for all controlled organizations and branches distributed throughout the country.
2019: Linter DBMS compatibility
On July 8, 2019, Intelligent Security announced that, together with RELEX Group of Companies, they have successfully completed testing the compatibility of their own software products:
- Security Vision Cyber Risk System and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Incident Response Platform DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Security Governance, Risk Management and Compliance and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Security Operation Center and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision CII and DBMS LINTER BASTION and DBMS LINTER STANDARD.
Companies have confirmed the compatibility of software products with the release of relevant certificates. Intellectual Security Group and RELEX Group plan to further develop the technological partnership and ensure the compatibility of their software products in the interests of customers.
Software products from both manufacturers ON are included in. register of Russian software Ministry of Communications
