Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Industrial Host Security System

Host whitelist | Peripheral control | Industrial host security manager

Overview

Topsec Industrial Host Security System (TopIHS) is an active protection security software product independently developed for industrial hosts. The system uses the whitelist security mechanism to manage the executable programs of industrial hosts, prevent the intrusion of known and unknown malicious programs, and realize file integrity protection, registry protection, peripheral device control, and security baseline reinforcement, thus realizing all-round security protection for the industrial host computers and servers and ensuring the continuous and stable operation of businesses.

Activity & Announcement
Advantages
Intelligent active defense

Use the whitelist security concept. Establish application whitelist by using scanning, learning and manual methods. Prevent files outside the whitelist from starting or loading, prevent malicious programs from running, avoid downtime caused by viruses, Trojan horses or illegal applications, and ensure continuous and reliable operation of production business.

Intelligent in-depth detection

The system runs on the operating system kernel layer, which can realize comprehensive and in-depth security detection, accurately identify various executable programs, establish a characteristics whitelist for executable programs, and prevent file name and extension spoofing and file tampering. With in-depth security detection capabilities, ensure the safe operation of industrial hosts.

Comprehensive application protection

By adding protection to key system directories, key business programs, and key registry, effectively identify and prevent illegal behaviors such as tampering with the registry, reading unauthorized files, or deleting key directory files, and ensure the security and integrity of the operating system and business applications, thus ensuring the continuity and stability of production operations.

Fine-grained peripheral management

The system has powerful host peripheral management capabilities, supports security management of USB devices and other peripherals, performs various fine-grained configurations such as reading, writing, and prohibition, and provides an exclusive security USB flash drive to achieve chip-level security protection, thus preventing peripheral abuse and security data leakage.

Comprehensive platform coverage

The system is compatible with mainstream operating systems such as Windows, Linux and domestic operating systems (such as Kylin, Uniontech and Linx) in the industrial environment, and is compatible with industrial software and configuration software of automation enterprises inside and outside China. Comprehensive protection and reinforcement are performed on operating systems and business applications to ensure the safe operation of industrial hosts.

Real-time dynamic analysis

The system monitors the current operating status of the hosts in real time, comprehensively displays the abnormal behavior of the industrial hosts, and timely detects security events such as host disconnection, insufficient resources, illegal application startup, malicious tampering, and illegal peripheral access, helping managers grasp security risks timely and improving security incident handling efficiency.

Application
Security Protection for Production Control System Host

The TopIHS is deployed on hosts and servers such as engineer stations, operator stations, and databases to protect the security of industrial hosts by using active defense methods.

Issues Resolved
  • By using whitelist control and host strengthening, effectively prevent attacks and damage to industrial hosts such as viruses, Trojans, and illegal applications.
  • By using USB mobile storage peripheral control technology, prevent illegal access from introducing viruses to industrial hosts, and prevent the risk of core process data leakage caused by deliberate copying.
  • Through the TopIHS control center, implement centralized security policy management on industrial hosts, and uniformly display and analyze security logs and alarm logs, providing convenient and comprehensive industrial host security protection capabilities.
Value to Customers
Meet compliance requirements.

Implement the security protection of industrial applications, the management and control of mobile storage, and the strengthening of security baselines. Deploy the TopIHS on the host computers and servers to ensure the security and reliability of the industrial hosts and meet classified protection compliance requirements and inspection requirements for industrial policies.

Effective protection of core data

Using perfect peripheral management capabilities and network protection capabilities, effectively intercept SYN network storms, USB flash drive viruses, Trojan horses, and malicious programs to prevent the data of industrial hosts from being illegally read or tampered with, ensuring the safe operation of core businesses.

Unified monitoring of host dynamic status

Monitor the operating status and security dynamic status of industrial hosts in real time, and detect resource alarms, peripheral alarms, program alarms, and illegal external connections. Help managers know security risks timely and quickly perform safe disposal, thus avoiding unexpected shutdowns of industrial systems.

Establishment of trusted production environment

By using the whitelist technology, effectively prevent the attacks and destruction initiated by known and unknown malicious programs on industrial hosts, building a trusted production environment for industrial control systems. Help industrial enterprises solve the host security problems.

Success Case