Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Endpoint Detection and Response System

Multi-dimensional accurate killing | 3D endpoint defense | centralized O&M control

TopEDR Overview

Topsec Endpoint Detection and Response System (TopEDR) is an endpoint security detection and response product designed based on EDR technology proposed by Gartner. Based on the security system integrating prevention, defense, detection and response, TopEDR has the capability of endpoint threat defense. Using the technologies such as gene identification, virtual sandbox, and microsegmentation, TopEDR accurately identifies various known and unknown threats, helps customers quickly detect and respond to endpoint security issues, and comprehensively improves endpoint security protection capabilities.

Activity & Announcement
Advantages
Gene identification, lightweight and accuracy

Through the technologies such as highly characteristics reuse, malicious code DNA identification, malicious code DNA fragment recombination, redundant data in the signature database is reduced, known viruses and variant viruses are accurately identified, and PC and server resources are effectively saved.

Virtual sandbox, accurate analysis

Through the core underlying technology of the powerful antivirus engine with independent intellectual property rights, TopEDR can detect malicious codes in time, and the analysis engine based on the virtual sandbox can restore the attack behavior of the virus essence and accurately identify unknown virus threats.

Active defense, multi-layer protection

For fileless attacks or vulnerability exploitation attacks, TopEDR designs unique protection strategies for all threat portals through system core location defense, virtual patch technology, malicious behavior monitoring, ransomware decoy, and hacker intrusion interception, and perceives endpoint threat behaviors in real time.

Positioning analysis, quick response

Response actions such as isolation, deletion, recovery, and automatic interception are performed on the files, and then the files are processed according to the pre-configured actions. In addition, the detected malicious code threats and attack behaviors are reported. Based on the threat analysis log, the attack source can be quickly located and processed to shorten the threat response time.

Endpoint behavior, full control

Various endpoint security management and control capabilities, such as mobile storage management and control, process management and control, peripheral device management and control, and illegal external connection management and control, create a comprehensive endpoint security management system for customers.

Collaborative linkage, comprehensive escort

The firewall, situation awareness, and online behavior management form an integrated security solution covering endpoint protection, border protection, and intelligent display, providing enterprise customers with more comprehensive 3D protection.

Application
Scenario

Cyber Security Grade Protection 2.0 has clear requirements for computer malicious code prevention, which requires that computers must be installed with malicious code prevention products, with virus databases regularly upgraded and updated, and centrally security-related matters such as security policies and malicious codes must be centrally managed.

Issues Resolved
  • A variety of detection and analysis scanning and killing technologies can accurately and quickly detect and kill malicious codes on the host.
  • The centralized management center uniformly upgrades the clients, scans virus for the clients, and configures security policies.
  • It meets the requirements for the computer malicious code prevention in Cyber Security Grade Protection 2.0.
Scenario

The security incidents caused by ransomware have attracted widespread attention. Once the files are encrypted, the files cannot be decrypted and cannot be used unless a high ransom is paid to obtain the key, which seriously affects the daily working and business development. Therefore, it is urgent to strengthen the prevention of ransomware.

Issues Resolved
  • Gene identification technology solves ransomware virus and its variants.
  • The dynamic behavior analysis of virtual sandbox technology identifies unknown ransomware viruses.
  • Block malicious encryption processes and realize ransomware decoy by monitoring decoy files.
  • Prevent ransomware infection performed through system vulnerabilities.
  • Reduce the risk of lateral spread and spread of ransomware.
  • Prevent tampering and damage to critical locations in the system.
Value to customers
Strengthen security protection capability

By using various protection methods such as gene identification, virtual sandbox, ransomware decoy, microsegmentation, and system reinforcement, TopEDR builds a comprehensive security protection system for endpoints to strengthen endpoint security protection capabilities and ensure the security of endpoints.

Improve unified O&M efficiency

TopEDR has powerful management capabilities. The security policy configuration, various task distribution, network-wide security situation display, and rich report statistics greatly improve the efficiency of endpoint security management and reduce O&M costs.

Meet compliance requirements quickly

TopEDR can accurately detect the infection and spread of malicious codes, quickly detect the malicious behavior of the host, and deal with them accordingly, meeting the requirements for the protection of malicious codes of the host, and realizing the compliance management of endpoints.

Success Case