Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Adaptive Security Defense System

Adaptive security architecture, continuous security monitoring and analysis, and effective defense against advanced persistent threats (APTs)

Adaptive Security Defense System Overview

Topsec Adaptive Security Defense System (TopAS) is a host security product centered on workloads. It provides an integrated security situation operation platform by combining the adaptive security architecture and Cloud Workload Protection Platform (CWPP) developed by Gartner. This platform provides continuous security monitoring, security analysis, and quick response to help customers predict security risks effectively, detect security threats accurately, and block intrusions quickly.

Activity & Announcement
Advantages
Continuous security monitoring and analysis

Based on an adaptive security architecture, the system provides risk prediction, prevention, detection, and response capabilities, and helps customers establish a security system capable of continuous security monitoring and analysis.

Collaboration of multiple security capabilities

Asset management, risk discovery, threat monitoring, micro-isolation, security baseline, security inspection, threat intelligence, and other functional modules can work together to form a closed-loop security system, improving the security O&M efficiency.

Lightweight security agent

The system uses imperceptible security agent, which significantly reduces the impact on host performance and resource consumption. It supports automatic downgrade to ensure business operation, and is easy to deploy.

Support for hybrid multi-cloud architecture

The system has a loosely coupled architecture and is independent of the underlying virtualization platform. It can be deployed in public cloud, private cloud, multi-cloud, and traditional IT architectures, and is compatible with mainstream Windows and Linux operating systems.

Application
Scenario

The security agent is deployed on operating systems of cloud hosts and physical servers, and the management center is deployed independently. Hosts in different architectures are managed in a centralized manner, if there are reachable routes between them.

Issues Resolved
  • The system is deployed in a loosely coupled architecture. Therefore, no changes need to be made to the underlying cloud platform.
  • Security capabilities are deployed on hosts and will not be affected by VM migration.
  • The centralized management platform improves the overall security and operation efficiency.
Scenario

The system provides security capabilities such as asset management, risks discovery, threat monitoring, and security inspection, based on the attack chain. In addition, it provides continuous security monitoring and analysis to enhance APT defense.

Issues Resolved
  • Check of all hosts for enhanced capability of active defense.
  • Accurate risk identification, helping to eliminate potential risks.
  • Effective APT detection through all-round attack monitoring and diversified defense measures.
Value to Customers
Comprehensive host management

The system automatically builds 15+ data entries for hosts from a security perspective and associates host information with risks and intrusions, helping customers monitor their host assets and trace the source of threats.

Active identification of security risks

The system can proactively detect risks in various systems, applications, website vulnerabilities, and configuration, and rate the risks, providing continuous risk analysis for customers.

All-round threat monitoring

The system provides real-time monitoring of all attacks and a variety of defense measures. When detecting security threats, it performs in-depth analysis and displays the analysis results graphically. In this way, the system implements all-round threat detection and response for customers.

Automatic risk self-check

The system has a large number of built-in system and application baselines that meet the requirements of classified protection and CIS, and allows customers to define their own baselines for internal security management. It provides the one-click automatic check feature, which allows customers to complete risk self-check quickly.

Effective control of east-west traffic

The system controls east-west traffic of 14+ protocols between hosts based on micro-isolation policies, and visualizes the east-west traffic. The micro-isolation policies are not affected by migration of cloud hosts.

Efficient Trojan virus scanning and killing

Using gene recognition and virtual sandbox technologies, the system identifies Trojan viruses accurately and reduces the resource consumption of the anti-virus engine. In addition, the management center provides a variety of virus handling measures.