Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Internet Behavior Management System

Verify the identity of internet users and conduct behavior audits and controls.

Product Overview

The Topsec Internet Behavior Management System (TopACM) addresses challenges such as bandwidth occupation, data leakage risks, legal compliance, and security threats caused by improper internet usage. Through user, terminal, and application identification—combined with blocking, traffic control, auditing, and other management methods—TopACM helps organizations regulate internal internet access, protect critical data assets, ensure compliance, optimize bandwidth, and minimize productivity loss.

Activity & Announcement
Advantages
Diverse Access Controls

TopACM products not only support binding of IP, MAC, and VLAN, but also support various authentication methods such as local portal authentication, SMS authentication, and WeChat authentication. TopACM products can also be integrated with third-party authentication servers to achieve name based auditing, such as AD domains, Radius servers, city hotspot authentication systems, Ruijie SAM authentication systems, H3C IMC authentication system email servers, etc.

Detailed Audit Records

TopACM products not only record quintuple session information, but also keep records of URL access, forum and Weibo posts, instant messaging, virtual account login, email sending and receiving, and other information.

Effective Traffic Management

TopACM products can achieve traffic control based on users, user groups, time periods, application types, website types, and file types. By deeply identifying traffic and combining it with a multi-channel queue priority mechanism, traffic blocking, speed limiting, and bandwidth allocation can be achieved. It can also provide bandwidth protection for applications and custom services.

Practical Report Analysis

TopACM products can be presented through data statistical reports such as curve charts, pie charts, and bar charts, which not only retain data but also combine big data technology for data analysis. For example, TopACM products can achieve network situation analysis, network quality analysis, security event analysis.

Fine Behavior Control

TopACM products can implement URL access control, keyword outbound control, file upload and download control, email outbound control, instant messaging control, Weibo access control, forum access control, etc. based on IP, address book, users, user groups, and time.

Applications

Provide multi-level QoS flow control and behavior management modules, reject non work applications and websites from multiple perspectives and methods, filter search, email, file upload and download, and audit and control HTTPS traffic.

Ensure the stable operation of user core business, block non work applications, entertainment websites, stock shopping websites, etc., and improve employee work efficiency.

Prevent internal file leakage and ensure data security.

The system ensures log security through storage isolation, real-name auditing, and both local/remote log retention. Large-screen graphical displays make log analysis more intuitive and convenient.

TopACM provides a healthy internet environment, while EDR offers terminal threat defense capabilities, providing a one-stop solution from wired to wireless, from terminal security to internet security.

TopACM provides access authentication for internal networks and external visitors in wireless environments, as well as flexible management of internal and guest networks, making network access more secure.

TopACM and TopEDR are linked to synchronize terminal information and authenticate users, achieving true tracking of individuals. EDR is used for external detection and control of terminals, preventing the horizontal spread of malicious files and viruses.

Value to Customers
Improve Work Efficiency

Improve workforce productivity by restricting non-work websites and controlling internet access during work hours.

Optimize Bandwidth Utilization

By using massive databases and deep detection recognition technology to ensure, speed up, and block applications, we can solve the problem of bandwidth resource waste leading to unstable critical business.

Reduce Investment Costs

Flexible deployment and adaptability to various scenarios, it can not only solve customers' practical problems, but also meet the requirements of network monitoring docking, making it a cost-effective solution.

Specification
0 > 0 > 0 >
ACM-C5224-E ACM-51522E
Form Factor 1U 2U
Throughput 1.6Gbps 6Gbps
Application Control Throughput 500Mbps 1Gbps
Concurrent Sessions 400,000 1,000,000
RAM 4GB 16GB
Storage 4TB 4TB
Fixed I/O Ports 16 x GE ,4 x SFP , 4 x SFP+ 8 x GE , 2 x SFP , 2 x SFP+
Available Slots for Expansion Modules - 2
Power Specification 150W, Dual AC 150W, Dual AC
Power Supply AC 100-240V,50/60 Hz AC 100-240V,50/60 Hz
Success Case