Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Database Audit and Protection System

Comprehensive audit granularity丨Operation behavior is strictly controlled丨More risk analysis scenarios丨Faster retrieval of the billion-level data

Topsec Database Audit and Protection System

Topsec Database Audit Protection System is a professional level database security protection products, through the strict control of the database operation behavior, protect against sensitive data leakage, protect the safety of the database. New products based on intelligent database monitoring engine, support the domestic and foreign mainstream database protocol identification, parsing, control, audit, combined with attack detection, zombie detection, application identification, database vulnerabilities, SQL error code five knowledge base, make the product has internal high-risk illegal operation identification control ability at the same time, both external attack detection defense ability, master the database operation behavior, enhance the level of database security protection.

Activity & Announcement
Advantages
Comprehensive audit granularity

Through the automatic identification technology and accurate fine-grained analysis, it supports more than 40 mainstream database protocols at home and abroad, including domestic / non-domestic relational database, non-relational database, etc. Combined with the flexible audit strategy, the comprehensive audit of the database operation behavior is realized. The audit field includes more than 70 dimensions, such as database access time, source list IP, client program, database user name, SQL statement, return code, and return result set. The audit has many granular dimensions, which can record the database operation behavior in detail, and effectively track the comprehensive audit.

Operation behavior is strictly controlled

Through the identification and analysis of two-way data packets, not only the basic quintuple information and basic database protocol elements are analyzed, but also more granular access behavior control can be carried out according to the business requirements. The control elements include more than 30 kinds of client IP, database IP, database name, database client program name, database user name, etc. Control rules can match with or non-logical operation to form a rule set, accurately control the database operation behavior, find the risk to quickly block the operation, and effectively strengthen the internal supervision and management ability.

More risk analysis scenarios

For different database protocol, built-in rich protection rules, and high risk scenario depth risk analysis, scenarios including abnormal login, violent crack, collision library attack, batch data leakage, batch data modification, and provide behavior trajectory, event trend, operation type of statistical analysis chart shows the risk event change trend, distribution and alarm, etc, to help customers understand data security situation, find potential risks, early judgment disposal.

Faster retrieval of the billion-level data

Based on high-performance storage database and self-developed efficient retrieval algorithm, the product optimizes the underlying data structure, and combines with front-end page asynchronous loading technology, the product can realize multi-dimensional custom query, namely check that system, hundred-million level data second level display.

Application
Scenarios

In scenarios with relatively simple network architecture or small business service scale, TopDAP can be deployed in front of the database server as the last line of defense of the database system. Real-time detection of database behavior operation traffic, ensure the user access to the database server traffic is safe and legal, and effectively prevent database operation risks.

Issues Resolved
  • Direct control of the database operation flow, strict and accurate;
  • Real-time interception of high-risk operation and accurate blocking of abnormal behaviors;
  • Baseline self-learning ability, analyze user behavior and advance warning of potential risks;
  • All operational fine-grained audit to solve the problem of post-tracking and traceability.
Scenarios

Distributed deployment, mainly used in group enterprises with headquarters-branch structure, headquarters and branches have protection needs. The headquarters adopts high-performance TopDAP as the management center, and each branch selects the appropriate performance TopDAP as the subordinate node according to the requirements. The headquarters carries out unified control over the branches to effectively solve the problem of scattered monitoring points.

Issues Resolved
  • Solve the database protection requirements of Headquarters-Branch structure group enterprises;
  • The headquarters management center is responsible for the function of unified policy distribution, log collection and analysis;
  • Each branch can set its own control rules and policies according to its own business scenarios and threats to realize the autonomy of branch nodes;
  • Free the heavy management work of the headquarters to form a normal control and disposal ability.
Value to Customers
Security compliance

Meet the compliance requirements, help customers to find illegal database operations and malicious database attacks, and implement alarm, block and audit on them, so as to achieve advance warning, block in the process, trace back after the event, and effectively protect the risk of data leakage.

Effective protection

Fine-grained control strategy, identify illegal database operations, record database behavior, prevent various database security threats, and ensure customer data security.

comprehensive auditing

All the database operations are recorded in multiple dimensions, and the session-level playback is understood before and after the behaviors, so as to facilitate customers' audit and trace, and ensure the compliance of enterprises.

Risk visible

Display risk scenarios visually, quickly locate risk points, and provide a basis for optimizing the overall data security construction; the system can generate various reports and analysis charts, help enterprises understand the database usage and security status, and provide data support for enterprise decision-making.