Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Latent Threat Detection System

Transforming passive defense into active, helping to quickly identify unknown threats.

Latent Threat Detection System Introduction

Topsec Latent Threat Detection System adopts deception defense technology and deploys a large number of trap hosts in the network to form a rich and realistic honeynet environment to induce attackers and fulfill the goals of attacker discovery, acquisition of attacking means, attack traceability and countermeasure. It helps customers to improve the network protection system and enhance the ability of proactive defense.

Activity & Announcement
Product Advantages
Advanced mainstream technology architecture

Adopting the advanced technology of network virtualization and process simulation, it supports the generation of multiple virtual hosts on a single device, which can quickly complete the construction of high-density trapping environment and enable the construction of low-cost large-scale honeynet.

Strong threat detection capabilities

It integrates network traffic detection engine, service interaction detection engine for multi-dimensional attack monitoring, and can identify port scanning, brute-force cracking, vulnerability exploitation, SQL injection, suspicious links, and other types of attack classification; it provides TCP, UDP, ICMP and other protocol-based types of threat detection.

Rich virtual host services

The product provides a wealth of services that can be selected and configured for virtual hosts, covering industrial control protocols, cloud computing platforms, big data platforms, network tools, file servers, WEB servers, mail servers, DNS servers, 4A management systems, database servers, virtual network servers, remote control protocols, and other common honeypot scenarios construction.

Realistic network environment simulation

Each trap host can be fully disguised from the device layer, operating system layer and application layer, and hackers are completely unable to distinguish it.

Application Scenarios
Scenario Description

In the SME network scenario, generally the network structure level is relatively simple, the physical location is single, and the intranet traffic is small, it is recommended to use ALLinONE mode to deploy in the network that needs to be protected, disguised as a business system run by the user, and a single device can complete the deployment of the whole network honeynet.

Scenario Description

In large enterprise network topology or business scenarios with large intranet traffic, it is deployed in different user business networks according to business requirements, disguised as user business system servers, and these nodes are registered to the management platform, which manages and configures them uniformly, thus simplifying the network configuration to the greatest extent possible without breaking the network topology of the enterprise.