Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

IoT Safety Management Platform

Centralized management, safe operation and maintenance

Topsec IoT Safety Management Platform Overview

Topsec IoT Safety Management Platform(NGIoT)performs unified identity authentication and status check on TopISG access to visually display the running status of the security gateway on the entire network. Through data mining, machine learning and other technologies, it can conduct protocol analysis, behavior modeling and anomaly detection for TopISG downlink IoT terminals in a non-invasive way. Secure networking of the Internet of Things network, centralized display of the global asset situation and threat situation of the Internet of Things, effectively reduce the business risk from the perception layer, reduce the attack behavior of the network layer.

Activity & Announcement
Advantages
Comprehensive perception and situation analysis

NGIoT displays the asset situation, threat situation and overall health rating of the whole Internet of Things network in the way of large screen, presents the operation status of the whole cyber security gateway and Internet of Things terminal in the way of map, and presents multi-dimensional behavior analysis of Internet of Things terminal and Internet of Things network.

Virtual private network, easy operation and maintenance

With its excellent virtual private network capability, NGIoT allows a tenant to create multiple isolated virtual private networks to achieve full-link encryption and multi-service isolation of iot terminal data to prevent monitoring, tampering, forgery, and replay of IoT terminal data.

Smart engine, node awareness

Based on the node sensing technology of the Internet of Things, the behavior control of Internet of Things devices after access can be realized through the rich fingerprint baseline database of Internet of Things devices, which can effectively evaluate the security status of Internet of Things devices and prevent the impact of fake terminals, abnormal terminals and other devices on the Internet of Things business after access to the private network.

Service discovery, access control

Through multi-type combination configuration, the blacklist and whitelist service rules of Internet of Things communication protocols can be flexibly defined to meet the communication characteristics of diversified and varied Internet of Things services and realize the identification and control of Internet of Things assets, communication protocols and application services.

Cloud authentication, centralized management

NGIoT provides unified authentication and centralized management functions on the cloud and provides a visual security management interface for Internet of Things customers. Through cloud management, customers can flexibly locate virtual network topologies, quickly access devices and enable services, and ensure the security of end-to-end bidirectional services on the Internet of Things.

Application
Intelligent Puilding

Smart buildings have a large number of branch buildings, and traditional solutions need to use dedicated line interconnection. Due to cost reasons, except the dedicated line provided by operators, branch buildings often lack cyber security protection, and the gateway management, data security, operation and maintenance of a large number of branch buildings in the whole network face great pressure. NGIoT can be used to manage the security of all nodes and devices in a unified manner, so as to realize the overall security situation.

Issues Resolved
  • Centralized management of Internet of Things security protection equipment.
Value to Customers
Visual assets

Through the asset identification technology, the system can provide the ability to detect the Internet of Things assets in the whole network and realize the visual management of the status of assets in the whole network.

Manageable network

By listening to the network traffic of a communication link, you can connect to a third-party gateway to ensure the security of the communication link. The system can continuously monitor the protocol types of transmitted traffic, identify the service types of sensors, analyze security behaviors, label devices, and quickly detect real-time network attacks.

Global controllable

Using unified cloud audit and access control, it provides IoT users with a visual security management interface. Through centralized management in the cloud, users can flexibly define terminal grouping and resource partitioning, enabling secure access to devices and legitimate auditing of business operations, ultimately forming a high-level IoT security operation management platform.