Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Basic Security Services

Vulnerability detection service | Baseline verification service | Risk assessment service | Security hardening service

Background

With the continuous progress of national cyber security work, the information security awareness and system construction of enterprises and institutions have reached a new height. However, network attacks also present a more complex and changeable trend. This trend requires that all industries and enterprises not only need to explore and improve cyber security mechanisms, but also consolidate the foundation of information security by well assessing and managing various vulnerabilities, threats and risks.

Activity & Announcement

Introduction to Basic Security Services

Vulnerability detection service: This service aims to identify security risks in the target system, detect and verify vulnerabilities in a comprehensive and in-depth manner through tool scanning and manual verification, and provide effective vulnerability fixing suggestions, thus helping the customer establish a complete vulnerability detection mechanism and improve the customer's security defense capabilities.

Baseline verification service: Based on the national and industry requirements, this service verifies and analyzes security baselines of assets of the customer's information systems by using tools and manual methods, and accordingly provides security rectification suggestions.

Risk assessment service: According to the GB/T 20984 risk assessment specification, this service identifies and analyzes assets risks, threats, vulnerabilities, and existing security measures of the customer's information system, helps the customer control the current system security risks, and provides professional security solutions and suggestions.

Security hardening service: For security risks, non-conformities, and vulnerabilities found in the process of security assessment, inspection, and testing, the service provides fixing suggestions and assists the customer in rectification. The service includes but is not limited to security policy reinforcement, vulnerability patch reinforcement, and backdoor Trojan removal.

Advantages
Professional security service team

Topsec has nearly 30 years of experience in the security industry, 1,000+ professional and technical personnel, and 90+ branches across the country, providing a series of professional services for customers.

Tool testing + manual verification

Topsec adopts both the tool testing and manual verification methods to provide services such as vulnerability detection and baseline verification for the basic operating environment of the customer's system. The application of specialized tools ensures the detection efficiency. Manual verification of high-risk loopholes and vulnerable links ensures that the rectification plan is accurate and reliable.

Rich industry experience

Topsec has nearly 30 years of experience in implementation of security services. Based on services and industry characteristics, Topsec also establishes a professional and mature working mechanism and process, and provides outstanding service solutions and practical support for governments, telecom operators, energy industry, finance sector, enterprises and institutions.

Customized security services

Topsec can provide all basic security services or a specific service based on the current security status of the customer's network. It can also tailor security assessment and risk management services for the industry that the customer belongs to. The comprehensive and accurate analysis results will be provided to point out the risks existing in the system application, database, and middleware, and feasible optimization and rectification methods will be provided to control the risks within an acceptable range.

Value to Customers
  • Basic security services are the foundation and important part of information security assurance. Basic security services help the customer effectively identify the security vulnerabilities and security risks in the network architecture, servers, applications, databases, security management and other aspects of the business system, so that the customer can further implement security work, improve the safety management mechanism, thus meeting the requirements of the state and regulatory authorities, and ensuring the effective operation of the business system.
Success Case