Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Business system security service project of an operator

Early identification of system security risks | Compliance with regulatory requirements | Full-cycle monitoring of vulnerabilities

Background

In recent years, data leakage incidents have occurred frequently across the country. To avoid security incidents such as leakage of sensitive information, information tampering, hacker intrusion, and DDoS attacks, better complete security assurance tasks of industry regulators, and meet business protection requirements, the Government and Enterprise Customer Department of the XX operator needs to conduct security assessments on its business system, strengthen business information security, tracking, monitoring and security reinforcement capabilities, and ensure effective implementation of information security management and related technical safeguards.

Activity & Announcement
Solution architecture

By using diversified methods to detect vulnerabilities from different dimensions, Topsec helps customers implement closed-loop management of vulnerabilities and assure security of the business system. The specific solution is as follows:

1) Host and web vulnerability scan

Use multiple scanning tools to conduct regular full-scale vulnerability scans on network devices, hosts, operating systems, databases, middleware, application software, and websites of business systems, and provide scan results and security hardening suggestions.

2) Baseline verification

Check incremental baseline configurations of network devices, hosts, operating systems, databases, middleware, and application software of business systems, and provide non-compliant items and security hardening suggestions, so that monitored devices can meet the configuration compliance rate requirements.

3) Weak password check

Perform weak password checks on network devices, hosts, operating systems, and databases of business systems to prevent use of weak passwords.

4) Vulnerability-based hardening support

Based on the network security protection inspection, vulnerability scanning, baseline verification, web scanning, and penetration testing, provide a basic assessment report. In addition, work with administrators, third-party software developers, and third-party maintenance personnel to formulate effective rectification plans, and provide technical support during the rectification process.

Value to customer
Identify security risks in the system in advance

Effectively pre-position the security checkpoints to improve the defense level of the customer's business system.

Meet regulatory compliance requirements

Help the customer meet the regulatory requirements of related authorities through periodic basic security assessment.

Implement full-cycle monitoring of vulnerabilities.

Help the customer dispose, retest, and eliminate vulnerabilities after the vulnerabilities are detected, provide full-cycle tracking, and realize closed-loop management of vulnerabilities.