Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Internet Asset Verification Services

Zero deployment, non-awareness, throughout investigation, comprehensive asset management

Background

With the rapid development of cloud computing, big data, IoT, mobile Internet, artificial intelligence and other technologies, more and more enterprises and organizations are providing services based on these new technologies, which have intensified the risk for them to be attacked by domestic and foreign hacker organizations, despite the conveniences. Given the growing information security risks, and the increasing difficulties and time required to detect attacks, it's essential to set up professional security operation teams and platforms, to gather the security data of enterprises and organizations, implement in-depth analysis, and achieve fast processing, so as to address the growing risks.

Activity & Announcement

Internet Asset Verification Services Overview

Internet Asset Verification Services is based on the security cloud service platform, relying on the national distributed asset probe and experienced cloud security operation team, to provide online Internet exposure asset verification services for customers in various industries. Help customers find out their family background, realize that the assets exposed to the Internet can be checked, known, and controlled, and avoid serious consequences caused by data leakage.

Advantages
Subscription-based security services

It adopts the subscription remote service model, relying on Topsec cloud detection resources and professional security operation personnel, according to actual business needs, to meet customers to detect asset exposure at low cost.

High-performance detection technology

Relying on the parallel detection of distributed asset probes covering the whole country, a variety of active detection methods are used to quickly discover large-scale exposed assets and perceive asset changes in time.

Comprehensive identification of exposed assets

Get a complete picture of asset exposure on the Internet, including ports, applications, system types, geographic distribution, and more. Timely grasp asset filing information, threat intelligence, common port or service changes, etc., and predict possible risks in advance.

Multi-type asset coverage

Relying on the security cloud service platform, it effectively discovers security threats by detecting sensitive information such as IP assets, mobile assets, public code management platforms, mainstream network disks, and libraries, combined with rich intelligence sources.

Application
Scenario

The platform can detect and sort out the boundary network assets of government and enterprise customers, construct the baseline of assets, and monitor the illegally exposed assets and asset changes dynamically.

Issues Resolved
  • Throughout investigations are implemented to master the current status of exposed assets comprehensively.
  • Illegally exposed assets are timely found, alarmed and handled.
  • Asset risks are alarmed in advance, with professional disposal solutions.
  • The inspection requirements of competent department and national regulatory institutions are met.
  • The operation and maintenance costs are lowered, saving both time and labor.
Scenario

The platform can comprehensively detect and sort out self-owned assets (complete system and equipment) exposed by operators and other industries on the Internet, establish the original account of assets, and define asset responsibilities. In addition, the platform can also monitor and maintain the addition, changes and cancellation of assets exposed on the Internet, establish the risk monitoring, alarm, and emergency response mechanism of exposed assets, and help implement security governance.

Issues Resolved
  • Throughout investigations are implemented to master the current status of industrial assets exposed on the Internet.
  • Assets failing to implement filing requirements are timely found, alarmed and handled.
  • The risks of exposed assets are timely found and alarmed, with professional disposal solutions.
  • The requirements of industry and national regulatory institutions are met.
Scenario

The platform implements general investigations on network assets, key websites, key information infrastructures, etc. within the jurisdiction, builds the original account of assets, defines the responsible institution of assets, and carries out targeted cybersecurity risk monitoring and alarm as well as security governance, etc.

Issues Resolved
  • The quantity and distribution of network assets within the jurisdiction are comprehensively grasped.
  • The distribution of key websites and business systems are accurately grasped.
  • Asset risks are positioned fast and timely alarmed, with professional disposal solutions.
  • The national laws and regulations as well as political requirements are met.
  • Effective supports are provided to monitoring, alarm, notification and rectification.
Value to Customers
Comprehensive mastery of boundary network assets

The platform can accurately manage the assets of the customer's Internet information system according to the business dimension, establish the asset bottom account, dynamically monitor the changes of assets, and accurately control the basic situation and exposure distribution of its own assets.

Monitoring and verification of illegally exposed assets

The platform is built with the baseline of assets, and can monitor illegally exposed assets and their changes, handle them timely, and prevent security incidents.

Continuous monitoring of asset changes

The platform can verify the boundary network assets on a regular basis, compare asset changes, update the scope of asset monitoring, and ensure that all customer's assets are safe.