Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

IoT Security Access Gateway System

Internet of Things security products integrating access, communication and security

Topsec IoT Security Access Gateway System Overview

Topsec IoT Security Access Gateway System(TopISG)is according to the actual application scenario enterprise networking requirements and security pain points, with years of years of experience in cyber security and the forefront of the Internet of things research, based on "building Internet security interconnection concept", form can quickly deployment, effective, controllable, safe visual Internet virtual private cyber security solutions.The scheme can be widely used in a variety of Internet of Things application scenarios, including oil, power, smart manufacturing, smart city, rail transit and so on.

Activity & Announcement
Advantages
Unified certification, centralized management

TopISG products using distributed deployment, centralized management, decentralized domain, highly visual flexible management mode, through the security management platform for integrated management, TopISG can realize equipment plug and play, without configuration can access to the cloud, the Internet of virtual private network, eliminate the traditional VPN access configuration complexity, greatly reduce the implementation of human cost and time cost.

Virtual private network, secure interconnection

TopISG products help IoT customers quickly build safe and efficient business information private network, through the Internet of things virtual private network technology, the Internet perception layer equipment provide network analysis, scheduling, optimization and encryption, meet the user of Internet decentralization domain management requirements and a variety of differentiated networking scheme, to ensure the security of the Internet perception layer equipment interconnection.

Traffic identification and asset analysis

According to the traffic characteristics of Internet of Things terminals, the application of Internet of Things terminal traffic is identified to provide a basis for application statistics, risk discovery and fault debugging. Terminal devices that access the iot private network, Internet channel, or leased channel and upload traffic to the server can be identified based on their traffic characteristics and device information, including but not limited to device IP address, device computer name, device type, and operating system type and version.

Edge container, fast enabling

TopISG provides a virtual container-based edge computing gateway virtualization method. The gateway edge computing service is constructed through virtual container automation, and user business applications are encapsulated, distributed and run through container technology, providing customers with a stable, flexible, safe and universal edge computing capability. After users upload the generated image of edge computing service applications to TopISG, they start customers' edge computing service applications to realize rapid edge processing of service applications.

Trusted access and vulnerability scanning

Pre-binding and access control are supported for the information of Internet of Things devices in network access and physical port access. Only pre-binding and confirmed information can be allowed to access and authenticate communication in cooperation with network devices. Based on the judgment and action of port access and network blocking, the gateway automatically combines the access rules and corresponding network resource restrictions to form network policies, which can be applied synchronously horizontally and reinforced vertically.

Safety protection, gathering and enabling

TopISG integrates firewall function technology, and provides original end-to-end security protection and isolation function for the network through centralized policy arrangement. Once the edge node is attacked, such as the sensor is implanted by Trojan horse, the enterprise can quickly locate the device through the cloud, and implement security isolation and removal. TopISG can also continuously monitor the types of traffic on the network, identify the business types of sensors, conduct security behavior analysis, label devices, and quickly detect real-time network attacks.

Generalized access, security management

The hardware design is modular and compact, matching different hardware solutions according to service scenarios, supporting a variety of access solutions, and fully meeting the characteristics of the Internet of Things fragmentation. Supports multiple uplink access modes such as Ethernet and 4G/5G, providing users with flexible choices in complex network deployment. The IoT security access gateway can collect statistics on the number of online IoT terminals by device type, device region, and device ownership. The IoT terminals with risks can collect statistics by risk type, terminal type, risk quantity, and risk level.

Application
Scenario

Smart security community is a part of smart city. The Ministry of Housing and Urban-Rural Development requires 50% of smart community by 2020. Security protection should be carried out on security cameras, access control, gates and other iot devices and data in smart community.

Internet of Things terminals are connected through the IoT secure access gateway to prevent private and counterfeit terminals in the community from accessing the intelligent and safe community network. They are regularly checked on the asset status of community Internet of Things terminals, scanned the vulnerability status, and notified manufacturers to upgrade and repair.

Issues Resolved
  • Prevent community data collection from being accessed privately or maliciously.
  • Secure encryption of iot collected data to prevent data leakage.
  • Secure encryption of iot collected data to prevent data leakage.
Scenario

Many medical devices in hospitals are a manifestation of smart medical care. With the continuous development of Internet of Things technology in China, the medical industry has continuously entered the path of digital development. By using the support of the Internet of Things and big data, plus the access of medical equipment, the medical system of the Internet of Things is perfectly constructed, so that the public can better enjoy medical services. Hospital information management terminal operations for diagnosis and treatment the manufacturer whether to steal data can't perceive, large Internet medical terminal become invisible assets, the Internet of things device network access security control, by using medical devices to access content security access gateway, the hospital medical equipment asset discovery and vulnerability scanning, protect the safety of medical terminal operation.

Issues Resolved
  • Create electronic asset ledger to help hospitals with iot asset management.
  • Lot terminal missed scanning, timely find the hospital IOT terminal security risk.
Value to Customer
Visual assets

Through the asset identification technology, the system can provide the ability to detect the Internet of Things assets in the whole network and realize the visual management of the status of assets in the whole network.

Manageable network

By listening to the network traffic of a communication link, you can connect to a third-party gateway to ensure the security of the communication link. The system can continuously monitor the protocol types of transmitted traffic, identify the service types of sensors, analyze security behaviors, label devices, and quickly detect real-time network attacks.

Global controllable

Through centralized management platform, users can manage thousands of distributed nodes and security policies at the same time. Compared with traditional solutions, the unified management mode makes the security deployment of Internet of Things services simpler, faster, more flexible, easier to use and more efficient.