Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Endpoint Detection and Response System

Multi-dimensional Accurate Threat Hunting | Comprehensive Endpoint Defense | Centralized O&M Control

Product Overview

Topsec Endpoint Detection and Response System (TopEDR) is an endpoint security detection and response product designed based on EDR technology as defined by Gartner. Based on the security system integrating prevention, defense, detection and response, TopEDR has the capability of endpoint threat defense. Using the technologies such as gene identification, virtual sandbox, and microsegmentation, TopEDR accurately identifies various known and unknown threats, helps customers quickly detect and respond to endpoint security issues, and comprehensively improves endpoint security protection capabilities.

Activity & Announcement
Advantages
Gene Identification: Lightweight and Accurate

Through technologies such as signature reuse, malicious code DNA identification, malicious code DNA fragment recombination, redundant data in the signature database is reduced, known viruses and variant viruses are accurately identified, and effectively conserves PC and server resources.

Virtual Sandbox: Accurate Threat Analysis

Through the core underlying technology of the powerful antivirus engine with independent intellectual property rights, TopEDR can detect malicious codes in time, and the analysis engine based on the virtual sandbox can reconstruct the virus's attack behavior and accurately identify unknown virus threats.

Active Defense: Multi-Layer Protection

For fileless attacks or vulnerability exploitation attacks, TopEDR implements unique protection strategies for all threat vectors through system core location defense, virtual patch technology, malicious behavior monitoring, ransomware decoy, and hacker intrusion interception, and perceives endpoint threat behaviors in real time.

Threat Positioning and Rapid Response

It performs response actions such as isolating, deleting, recovering, or automatically intercepting files, and then the files are processed according to the pre-configured actions. In addition, the detected malicious code threats and attack behaviors are reported. Based on the threat analysis log, the attack source can be quickly located and processed to shorten the threat response time.

Endpoint Behavior Management and Control

Various endpoint security management and control capabilities, such as mobile storage management and control, process management and control, peripheral device management and control, and illegal external connection management and control, create a comprehensive endpoint security management system for customers.

Collaborative Ecosystem Integration

Integrated with firewalls, situational awareness platforms, and online behavior management systems, it forms a comprehensive security solution covering endpoint protection, border protection, and intelligent display, providing enterprise customers with more comprehensive protection.

2025
2020
Ranked among the top five in the market.

Ranked Top 5 in the China Terminal Security Software Market based on the IDC China Semiannual Security Software Tracker 2025H1

Recognized as a leader vendor.

Recognized as a Leadership position vendor in the IDC MarketScape: China Endpoint Detection and Response (EDR) Market 2020 Vendor Assessment

Applications
Scenario

Cybersecurity Classified Protection 2.0 has clear requirements for computer malicious code prevention, which requires that computers must be installed with malicious code prevention products, with virus databases regularly upgraded and updated, and centrally security-related matters such as security policies and malicious codes must be centrally managed.

Issues Resolved
  • A variety of detection and analysis scanning and killing technologies can accurately and quickly detect and kill malicious codes on the host.
  • The centralized management center uniformly upgrades the clients, scans virus for the clients, and configures security policies.
  • It meets the requirements for the computer malicious code prevention in Cyber Security Grade Protection 2.0
Scenario

The security incidents caused by ransomware have attracted widespread attention. Once the files are encrypted, the files cannot be decrypted and cannot be used unless a high ransom is paid to obtain the key, which seriously affects the daily working and business development. Therefore, it is urgent to strengthen the prevention of ransomware.

Issues Resolved
  • Gene identification technology solves ransomware virus and its variants.
  • The dynamic behavior analysis of virtual sandbox technology identifies unknown ransomware viruses.
  • Block malicious encryption processes and realize ransomware decoy by monitoring decoy files.
  • Prevent ransomware infection performed through system vulnerabilities.
  • Reduce the risk of lateral spread and spread of ransomware.
  • Prevent tampering and damage to critical locations in the system.
Value to customers
Strengthen Security Protection Capability

By using various protection methods such as gene identification, virtual sandbox, ransomware decoy, microsegmentation, and system reinforcement, TopEDR builds a comprehensive security protection system for endpoints to strengthen endpoint security protection capabilities and ensure the security of endpoints.

Improve Unified O&M Efficiency

TopEDR has powerful management capabilities. The security policy configuration, various task distribution, network-wide security situation display, and rich report statistics greatly improve the efficiency of endpoint security management and reduce O&M costs.

Meet Compliance Requirements Quickly

TopEDR can accurately detect the infection and spread of malicious codes, quickly detect the malicious behavior of the host, and deal with them accordingly, meeting the requirements for the protection of malicious codes of the host, and realizing the compliance management of endpoints.

Success Case