Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Log Collection and Analysis System

High-Speed Data Acquisition | Real-Time Query Display | Complete Retention

Product Overview

The Topsec Log Collection and Analysis System collects logs in real time from diverse sources including security devices, network equipment, operating systems, middleware, databases, and application systems. It enables high-speed collection, real-time query and display, and efficient compressed storage, achieving the goals of complete collection, fast retrieval, and efficient storage. This provides robust technical support for compliance initiatives and forensic traceability analysis.

Activity & Announcement
Advantages
Comprehensive Log Collection

The system employs a combination of active and passive technologies, enabling rapid integration and compression of heterogeneous logs from various devices and systems, ensuring the complete collection and retention of logs.

Efficient Storage Compression

Based on efficient storage compression, it significantly reduces hard drive space usage, meeting the log retention requirements in scenarios involving large volumes of data, in compliance with relevant policies and legal regulations.

Sub-Second Query Across Massive Data Volumes

It supports flexible string and multi-condition interactive searches across billions of log records, returning results in seconds. The system automatically correlates and analyzes search results, intuitively presenting security event timelines, sources, risk levels, and impact scope.

Multidimensional Data Analysis Presentation

The system features a built-in multidimensional data online analysis model and integrates various data presentation modes, including global maps, national maps, logical topology diagrams, and timelines. Query results are analyzed and displayed online in real time, providing an intuitive view of the system's operational status.

Applications

Efficient Log Collection and Compliant Retention

The system utilizes a combination of active and passive technical approaches to quickly achieve heterogeneous log access and compression processing for various devices and systems, ensuring complete log collection and retention, in compliance with the log retention requirements of the Cybersecurity Law and the Classified Protection 2.0 standards.

Rapid log retrieval and event tracing

The system is equipped with a built-in professional log query engine and multidimensional statistical analysis models, supporting various log retrieval methods. It can respond to queries on billions of logs within seconds, quickly pinpointing critical logs and providing a basis for post-event traceability.

Value to Customers
Meet Compliance and Regulatory Requirements

The system can efficiently and comprehensively collect, process, compress, store, and analyze alerts from various log data types, including network devices, security devices, operating systems, middleware, databases, and business systems. It ensures complete log retention, supports centralized log aggregation, and meets regulatory mandates for log retention (e.g., storing logs for over six months).

Reduce infrastructure investment

The system features low resource consumption and high processing performance, with industry-leading data collection and processing capabilities. Based on a self-developed non-relational data storage solution, it can significantly improve log data compression efficiency, ensure full-scale log data collection and storage in scenarios involving large volumes of data, and support long-term retention, while effectively reducing hardware resource costs.

Enhance Log Management Capabilities

The system fully supports both IPv6 and IPv4 dual protocol stacks, as well as various application environments including domestic alternatives. It handles centralized log management through the complete process of log collection, log normalization, data storage, statistical analysis, and data backup and recovery. This assists clients in addressing issues such as dispersed logs, heterogeneous formats, and large volumes of logs in their networks, thereby enhancing log management capabilities.

An Essential Tool for Security Operations (SecOps)

The system offers a comprehensive set of log retrieval and statistical analysis methods, integrating global maps, log analysis models, timelines, and various other data visualization modes. It provides an intuitive representation of system operational status, capable of supporting log volumes at the scale of tens of billions, with query results returned within seconds. This assists operations personnel in quickly analyzing and troubleshooting faults, as well as conducting forensic analysis of security incidents.

Specification
0 > 0 >
Product Model TALOG-SE30-E
Log Collection Rate ≥20,000 EPS
Supported Log Sources Security devices, network equipment, middleware, databases, servers, and application services from major vendors worldwide.
Log Normalization Proprietary description language for parsing and normalizing raw log data.
Log Source Management Full lifecycle management (view, add, edit, delete, enable/disable).
Real-Time Monitoring Live display of incoming log streams.
Data Storage High-ratio compression with encryption for massive log volumes.
Data Backup and Recovery Supports data backup and enables rapid recovery of backup data.
Dashboard Visualization Homepage displays log source topology, geo-distribution maps, security event alerts, and operational status overview.
Advanced Log Query Real-time statistical analysis, side-by-side view of raw/normalized logs, multi-condition queries (equals, regex, etc.), and data export.
Log Forwarding Support the forwarding of raw or formatted logs via syslog.
Alerting & Notification Real-time alarm summary, visual overview, continuous updates, and multi-dimensional querying for event analysis.
System Management Role-based user access control (RBAC) with separation of duties, and brute-force attack mitigation mechanisms.