Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Industrial Security Centralized Management System

Comprehensively monitor the industrial network assets of enterprises and raise alarms, and assist customers in the unified management of industrial cyber security threats.

Overview

Topsec Industrial Security Centralized Management System (TopISM) is a centralized management system developed by Topsec based on years of in-depth understanding of industrial network systems for industrial Internet security. Use advanced technologies such as data collection, big data analysis, and machine learning to help enterprise security O&M personnel and security analysts quickly detect threats. Driven by intelligence, comprehensively monitor the industrial network assets of enterprises and raise alarms, and assist customers in the unified management of industrial cyber security threats.

Activity & Announcement
Advantages
Unified management of security devices

Support centralized management and monitoring of industrial security devices such as TopIFW, TopIDA, and TopIHS, unified monitoring, and issue security policies uniformly to them. Provide standard interfaces to support real-time monitoring of third-party devices, and realize centralized and convenient security management.

Comprehensive collection of security logs

Use a built-in big data analysis engine to provide powerful data query capabilities, fast processing and storage of massive security logs, meeting storage compliance requirements, and providing strong data support for further security analysis.

Intelligent early warning of security events

Use a built-in security analysis engine, which can detect abnormal behaviors and security risks timely by establishing a business security baseline. Provide a variety of alarming methods such as web, email, and SMS to quickly notify security problems and improve the speed of responding to security incidents.

Centralized distribution of security policies

Issue security policies, and configure universal policies such as business baseline models and industrial control protocol rules in a batch. Implement rapid and centralized management of scattered security devices, and support single-point device management, which not only reduces the workload of device O&M, but also satisfies the device configuration customization requirements, comprehensively improving management efficiency.

Accurate identification of security threats

By associating with the TopIVS efficiently and combining with industrial control vulnerability libraries such as CNVD, CNNVD, and CVE, identify and evaluate industrial assets. Detect the vulnerability of assets in multiple dimensions, and provide customers with detailed risk description and vulnerability fixing solutions.

Multi-dimensional interactive design

Use security visualization technology. Provide a friendly security monitoring interface for O&M personnel with comprehensive visualization methods such as network topology, security index, chart analysis, and security report. Support data mining and analysis, track and trace abnormal data, quickly locate problems, and improve the efficiency of security O&M.

Application
Enterprise Production Management

Deployed in the O&M management area of the production management layer, TopISM is connected to various security devices on the network to perform unified monitoring, log collection, security analysis, and policy issue for security devices. Implement early warning and response to the security events on industrial site.

Issues Resolved
  • Help industrial enterprises grasp the current security situation of industrial Internet and reduce O&M costs.
  • Meet the compliance requirements of industrial enterprises and meet the requirements of national policies. Suitable for the industrial system classified protection construction.
  • Perform rapid policy issuance and batch management on scattered security devices, to realize security association and integration on industrial control network, and timely process network attacks and abnormal behaviors.
Value to Customers
Real-time monitoring of security status

Show cyber security status in a variety of visual ways, and centrally monitor and manage scattered security devices. Filter noise data, support important security event alarms, provide powerful security monitoring and analysis methods, help administrators quickly locate problems, and comprehensively improve the industrial Internet security capabilities.

Quick early warning of security incidents

Use the built-in security analysis engine to set up a business-based security rule model, effectively detect abnormal behaviors and events, identify important security risks, and raise timely alerts. Administrators can directly issue policies to security devices through the platform to quickly complete security incident processing, minimizing the impact of security incidents.

Correlation analysis of massive data

Integrate different types of security devices in different places, build an overall industrial Internet security defense system around the TopISM, and implement security closed-loop management of data collection, log storage, security analysis, event alarm, security disposal, and O&M monitoring. Comprehensively improve the overall security level.

Unified management of security devices

TopISM centrally manages security devices and security policies, and centrally collects and analyzes security logs and security events. Completely meet the security management–centered compliance requirements of the "One Center, Triple Protections" in the Cyber Security Classified Protection 2.0. Provide customers with all-round three-dimensional protections, efficient and stable O&M management.

Success Case