Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Vulnerability Assessment System

Comprehensive information collection | Fast loophole scanning | Accurate loophole identification

Vulnerability Assessment System Overview

Topsec Vulnerability Assessment System (TopScanner7000) is a product that can be used to effectively and comprehensively detect various vulnerable risks in the network. It's built with various scanning engines, and can also implement the vulnerability audit of information assets from different perspectives, including system loopholes, database loopholes, Web loopholes, weak password risks, baseline configurations, etc., and then provide professional security analysis and repair suggestions, and form comprehensive protection solutions with firewall, situation awareness and other systems, making the information system safer in all aspects.

Activity & Announcement
Advantages
Comprehensive asset identification

The system can master clear information about the status and risk of assets to strengthen risk management capacity and detect potential vulnerable risks in various network assets comprehensively.

Sound scanning capacity

The system supports baseline verification, system scanning, Web scanning, database scanning, weak password detection and other scanning tasks, which are applicable to various environments.

Rich knowledge base

The massive loophole base can cover domestic system, cloud computing platform, big data components, IoT and other types of loopholes, and is also built with comprehensive baseline verification knowledge base.

Efficient and collaborative protection

The system supports collaborative protection with firewall, and can also strengthen risk management capacity, and dock with situation awareness system, receive the tasks issued by situation awareness system, and provide security analysis basis.

Distinctive and visible display

With the graphic display of loophole trends and types, customers can have a clear understanding of security risks. Besides, the system is also provided with simple and distinctive risk solutions to help users solve potential security hazards fast.

Flexible deployment solutions

The system supports independent and distributed deployment as well as VMware, KVM, Openstack cloud environment deployments, IPv4 and IPv6 environment deployment.

Application
Scenario

As specified in security classified protection 2.0, "necessary measures should be taken to identify and timely repair security loopholes and potential hazards, or evaluate possible impacts and then repair them accordingly".

Issues Resolved
  • By implementing regular cybersecurity self-inspection and evaluation, the system can help customers meet compliance requirements.
  • The system can accurately identify network assets, perceive asset risk changes, and manage assets effectively.
  • The system is provided with rich and complicated rules base, and can find vulnerable threats effectively, and provide inspection reports and repair suggestions.
Scenario

The system can check the security of the application system (business system) comprehensively before it's officially put into production and operation, to eliminate potential security hazards in advance, reduce the cost to repair loopholes, and ensure that the system can operate stably.

Issues Resolved
  • IAST technologies are adopted to achieve the left shift of security programs, and reduce the cost to repair loopholes.
  • The system is easy to operate for development testers.
  • With ultra-low false reports and omissions, it also provides professional loophole test reports and repair suggestions.
Scenario

In the face of emergency loophole incidents, such as Apache Log4j2 loopholes, the system can provide emergency response in 24h, evaluate their range of influence immediately, guide customers to repair or temporarily put the affected assets offline, and minimize their losses.

Issues Resolved
  • The system is provided with 24h emergency response, reducing the window of vulnerability of customers' assets.
  • It can also identify information assets comprehensively, fast and accurately, and position the influencing range of loopholes immediately.
  • The system can also provide clear reports and repair suggestions, and guide customers to eliminate risks timely.
Value to Customers
Compliance supervision requirements fulfillment

With comprehensive, fast and accurate scanning capacity, the system can find security loopholes and potential hazards timely, and provide simple and clear repair guidance, to help customers comply with various compliance inspection and supervision requirements.

Comprehensive asset risk evaluation

The system can find and evaluate the entire scope of assets, covering traditional IT assets, web application, programs, cloud, containers, IoT assets, etc., to help customers have a comprehensive understanding of the risks of information system.

Improvement of loophole management

The system can manage loophole information dynamically, provide full-life-cycle management from loophole finding and evaluation to analysis and verification, and realize the overall closed management of loophole risks.

Improvement of loophole response

The system can realize emergency loophole support, and provide loophole checking plug-ins in 24h, guide customers to repair or temporarily put affected assets offline, and minimize their losses.

Success Case