Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Intrusion Prevention System

Comprehensive Threat Defense, Real-Time Protection for Critical Network IT Assets

Product Overview

Topsec Intrusion Prevention System (TopIDP) integrates ten core functions into a unified platform: attack detection, web security detection, DDoS detection, weak password detection, brute-force detection, botnet detection, unauthorized external connection detection, malware detection, APT detection, and threat intelligence. This integration delivers comprehensive threat detection and deep-level defense across your network.

TopIDP leverages six professional, authoritative, and multi-dimensional knowledge bases—attack detection rule base, application identification base, geolocation database, botnet rule base, threat intelligence base, and URL classification base. These extensive knowledge bases enable more accurate and rapid threat identification and defense enabling more accurate and rapid threat identification and defense. Coupled with its comprehensive, in-depth defense capabilities, TopIDP provides continuous protection against evolving threats in today's complex landscape.

Activity & Announcement
Functional Advantages
Precise Botnet Localization

TopIDP defends against diverse botnet activities including botnets, Trojan C&C, worms, cryptomining, ransomware, mobile Trojan C&C, and APT attacks. It detects unauthorized server external connections and covert tunnel communications. TopIDP's multi-dimensional detection combined with detailed, comprehensive logging effectively mitigates botnet-related risks.

Seamless Upgrade, Uninterrupted Protection

TopIDP features an authoritative attack rule base updated weekly on a regular basis. For emergency events, rule base updates deploy immediately for instant protection. TopIDP maintains continuous security policy enforcement without interruption during rule base upgrades, achieving truly "seamless upgrades with uninterrupted detection."

Independent & Reliable Threat Intelligence

TopIDP employs a locally embedded threat intelligence library, enabling standalone threat intelligence capabilities without third-party platform integration. The intelligence is comprehensive, covering malicious IPs, URLs, domains, and file hashes. Topsec's professional team continuously mines, researches, and tracks the latest intelligence to ensure reliable, up-to-date sources.

Comprehensive & Precise Attack Defense

TopIDP provides comprehensive, deep-level attack defense, accurately detecting and blocking various network attacks including buffer overflow attacks, code execution, injection attacks, cross-site attacks, ICS vulnerability exploits, and IoT vulnerability exploits. Additionally, TopIDP features advanced anti-evasion detection capabilities to fundamentally defend against evasion techniques.

Applications
Scenario Description:

TopIDP is typically deployed in-line at network boundaries to detect and block intrusion attempts from external to internal networks in real-time.

In complex network environments, enterprises often require targeted protection for specific business systems while regulating the network behavior of office terminals to prevent internal attack propagation. This achieves comprehensive network-wide protection.

To meet diverse environmental requirements, TopIDP offers multiple deployment modes—including transparent, routing, and bypass—without requiring changes to the existing network architecture.

Problems Solved:
  • Enhances overall network security defense effectiveness against all attack types, including zero-day and emerging threats.
  • Addresses the shortage of professional security analysis expertise among operations personnel.
  • Meets compliance inspection requirements from national and industry regulatory authorities.
  • Assists with security incident forensics and post-incident traceback.
Value to Customer
Professional Attack Defense Engine

Comprehensive, deep-level attack defense capabilities continuously combat evolving security threats.

Full IPv4/IPv6 Protocol Stack Support

Enables attack detection in both IPv4 and IPv6 environments, effectively adapting to the growing IPv6 adoption trend.

Diverse Compliance Fulfillment

Helps customers meet MLPS (Multi-Level Protection Scheme), hierarchical protection, and industry regulatory requirements, strengthening compliance posture.

Fine-grained Metadata Extraction

Comprehensive traffic auditing functionality records detailed metadata from network communications, providing multi-dimensional evidence for thorough security situational awareness.

Rich Security Log Visualization

Multi-dimensional security event statistical analysis enables intuitive understanding of complex threat landscapes within network information systems.

Specification
0 > 0 > 0 >
TI-4532A-E TI-64428-E
Form Factor 1U 1U
Fixed I/O Ports 8xGE,4xSFP 8xGE,4xSFP
USB Ports 2 2
Power Specification 150W, Dual AC 150W, Dual AC
Power Supply AC 100-240V,50/60 Hz AC 100-240V,50/60 Hz
Storage 4TB 4TB
RAM 32G 32G
Throughput 8Gbps 10Gbps
IPS Throughput 3Gbps 4Gbps
Concurrent Sessions 1,000,000 2,000,000
Success Case