Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Industrial Internet Situation Analysis and Security Management System

Real-time situation awareness | Accurate security monitoring | Emergency response and disposal

Overview

Topsec Industrial Internet Situation Analysis and Security Management System (TopISA) supports situation awareness, tracking, prediction and early warning of security events, comprehensive and real-time grasp of cyber security situation, perception of industrial cyber security threats, risks and hidden dangers, monitoring of vulnerabilities, virus Trojans, and network attacks, and detection of industrial cyber security incident clues, and early warning and notification of major cyber security threats and handling of security incidents, so it can help users effectively prevent and combat cyber-attacks and other illegal and criminal activities, achieve real-time situation awareness, accurate security monitoring, and emergency response, and improve the ability of enterprise organizations to resist risks.

Activity & Announcement
Advantages
Powerful data processing capability

Using a big data analysis engine and distributed file storage and retrieval technology, TopISA supports PB-level data storage and retrieval, supports billion-level data retrieval and response in several seconds, and has horizontal scaling feature. Users can dynamically increase the storage and computing performance of the system according to actual use requirements.

Comprehensive security analysis technology

Support aggregation of various security data, and use security technologies such as correlation analysis, user profiling, business security baseline, model analysis, and threat intelligence to effectively detect various security events and hidden risks, identify false negatives and false positives, and improve security O&M efficiency, and form the overall security analysis capability of security linkage and dynamic perception.

Flexible deployment of security probes

Support a variety type of probes, including TopIVS, TopIFW, TopISM, TopIDA, TopISA, and TopIHS. Support data access of third-party devices, so that customers can choose security probes according to actual network condition and budget, and flexibly combine the probes.

Intelligent identification of industrial assets

By using industrial asset fingerprint identification technology, comprehensively discover industrial Internet assets. Build asset libraries in multiple dimensions such as industrial devices, hosts, applications, and businesses, perform real-time security monitoring of intranet assets, display security information such as network risks and vulnerabilities, and provide customers with powerful asset management and security monitoring methods.

Complete security knowledge brain

Taking the industrial Internet security knowledge brain as the core, which includes industrial asset fingerprint library, industrial protocol library, industrial vulnerability library, industrial threat signature library and industrial equipment library, provide security analysis services such as threat intelligence, linkage analysis, compliance analysis, and threat tracing to continuously deliver security capabilities to customers.

All-dimension security situation awareness

Show basic situation in multiple general dimensions such as risk, attack, and assets, and show special situation in multiple special dimensions such as probes and traceability. Support customized situation display. By using a variety of visual situation awareness technologies, provide customers with friendly and easy-to-use security monitoring methods, thus improving the security O&M efficiency.

Application
Security Data Analysis

Deployed in the resource layer of industrial enterprises, TopISA can collect the security data of assets such as network devices, security devices, and hosts, conduct correlation analysis, formulate security policies, and associate various security devices on the network to achieve overall control of industrial Internet security.

Issues Resolved
  • Help customers perform full lifecycle management of production and operation assets.
  • Help customers realize situation awareness, tracking, prediction, and early warning of industrial networks, and grasp the cybersecurity situation in real time.
  • Help customers to conduct real-time security monitoring of intranet assets, detect network risks, vulnerabilities and other security risks, and provide customers with powerful asset management and security monitoring methods.
Value to Customers
Security risk association analysis

By correlating various types of industrial security data and external threat intelligence in the intranet, integrate industrial security data, eliminate information islands, improve the accuracy of security analysis, and reduce false positives and false negatives. Help customers identify and focus on key security risks, formulate dynamic security policies, and build an overall security defense system.

Dynamic defense of security incidents

Associate various security devices on the network, quickly locate security problems, and formulate effective security defense methods. By using the system's centralized management capability of security policies, dynamically adjust device security policies, quickly block vulnerabilities, handle security incidents timely, and minimize the impact of incidents.

Security situation visualization

Provide a variety of visual situation awareness interfaces, and customize the situation based on business scenarios to form security situation awareness capabilities that match business features. Monitor the security status of assets on the network in real time, track the process of security incidents, generate early warning of major security risks, provide customers with a complete closed-loop security defense method, and improve the overall security defense level of the enterprise.

Success Case