Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Operation Security Audit System

TopSAG is the solution with both O&M management and compliance audit for the organization, such as government, enterprises and so on. 

Product Overview

The Topsec Operation Security Audit System (TopSAG) is a unified solution that delivers both operational (O&M) management and compliance auditing for organizations, including government agencies and enterprises.

● Compliance

Through centralized account management, strong authentication, fine-grained access controls, and comprehensive audit trails, TopSAG ensures that operations performed by both internal and third-party personnel are managed, controlled, visible, and fully auditable. The operation steps of O&M can avoid the hidden risk caused by the wrong operation and unauthorized operation to effectively guarantee the data usage security and the running security of the organization institution asset, such as, the server, virtual machine, network equipment, security equipment, database, business system and so on.

● O&M

Centered around single sign-on (SSO) and supported by agentless technology, TopSAG provides users with powerful O&M management tools for cross-platform asset management, automated operations, and detailed analysis reports, all delivered through flexible, high-availability deployment options.

Activity & Announcement
Advantages
Distributed Architecture

TopSAG's distributed architecture, comprising a distributed storage system, protocol proxy engines, and O&M management subsystems, provides excellent scalability. When expanding to a high-availability (HA) cluster, new nodes can join without disrupting existing services. Technologies like load balancing, session synchronization, and heartbeat detection not only enhance the performance of the overall system but also eliminate single points of failure in both processing and storage, ensuring high performance and availability.

HTML5-Based Agentless Access

TopSAG leverages HTML5 technology to provide a zero-client access experience. Users can perform secure, audited O&M operations directly from a web browser via protocols like SSH, RDP, FTP, SFTP, Telnet, VNC, and various database protocols—without installing any local agents or plugins. An HTML5-based client simulator in the front-end connects to backend proxy engines, which translate and audit all Web traffic before forwarding it to the target assets via the native protocol.

End-to-End Data Encryption

TopSAG encrypts both stored configuration data and user data at rest. For all management interface communications, sensitive information like passwords undergoes multiple layers of encryption in addition to the secure communication channel (TLS/SSL), effectively preventing eavesdropping, interception, and tampering to ensure complete operational security.

Agentless Automation

TopSAG enables agentless, remote automated operations, simplifying asset management. Without requiring software on managed nodes, it supports multi-task publishing and remote execution using built-in or custom scripts. This facilitates a wide range of tasks including asset discovery, automated checks, command execution, and file distribution, making it ideal for streamlining DevOps workflows across development, testing, deployment, monitoring, and analysis.

Applications
Standalone Deployment Scenario

Administrators can implement internal operation and maintenance management as well as compliance auditing by deploying a single TopSAG.Internal network users can directly access the TopSAG for operation and management via internal O&M terminals;External network users can either dial into the internal network environment through VPN or access the TopSAG web interface via port forwarding of the TopSAG via port mapping, so as to achieve convenient and secure operation and maintenance management.

Active-Standby Deployment Scenario

TopSAG supports active-standby deployment, which is the recommended deployment mode for users.

Users access TopSAG through its virtual IP address, while the system automatically performs data synchronization and redundant backup.

Value to Customers
Compliance

Through centralized and unified management, two-factor authentication, permission control, periodic password change, real-name audit, and other functions, the system helps enterprises meet relevant policy requirements.

Improved O&M Efficiency

Provides H5-based web access and SSO, enabling quick operations directly from a browser without installing client tools or remembering individual asset passwords.

O&M Risks Under Control

The system controls the operation permissions of O&M personnel, and enables the users to set blacklists and whitelists for high-risk commands to avoid misoperation and abuse of permissions.

Complete Accountability System

The system associates accounts with natural persons and records information about "who, where, when, and what" for O&M each time, enhancing the manageability and traceability of O&M personnel and assets.

Specification
0 > 0 >
Specifications Specification Description
Form Factor 1U
RAM 16GB
Storage 32G Msata , 4TB SATA
Fixed I/O Ports 8 x GE , 4 x SFP
Available Slots for Expansion Modules 2
Power Specification 150W, Dual AC
Power Supply AC 100-240V,50/60 Hz
Graphics Sessions ≥50 concurrent sessions
Character-based Sessions ≥100 concurrent sessions
Managed Hosts Up to 100 hosts
Success Case