Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Risk Detection System

Efficient asset detection, accurate attribute identification, multi-dimensional correlated portraits, and fast risk positioning

Background

As the basic component of IT information system, each network asset carries various business systems of the organization, maintaining its normal operation. In case of asset security risks, the security and stability of organization business will be directly affected, and once they break out, huge economic losses will be incurred. To prevent asset security risks, organizations shall take precautions, and have a full understanding of the network-wide asset conditions efficiently in real time.

Activity & Announcement

Risk Detection System Overview

Topsec Risk Detection System (TopTRD) adopts active scanning and passive perception based on big data analysis and modeling in combination with various security intelligence mechanisms, to detect and draw up the basic asset information map, and then help users have a comprehensive and accurate understanding of the basic conditions and security status of their network assets, prevent them from being attacked due to their negligence in asset management, timely find potential risky network assets, and maintain their cybersecurity.

Advantages
Efficient information detection approaches

The system adopts extensive active and passive detection technologies, to detect the asset information of target network efficiently, and build a comprehensive basic asset information database on the premise of ensuring the lowest restrictions on the normal business operation of the target network.

Sound security intelligence database

The system can accurately identify the portrait of detailed network asset information as well as the equipment type and model of various internal network assets, the type and version of operating system, the version of equipment hardware and software, the type and version of Web components and middleware, etc. based on the built-in fingerprint database, feature database, and IP address information database, etc.

Powerful data analysis capacity

The system can explore and analyze massive data by big data analysis technologies, implement specific analysis from multiple dimensions and viewpoints in combination with its powerful threat intelligence output capacity, and then display asset conditions and the distribution of risks intuitively based on the business of customers.

Accurate risk asset positioning

The system is designed with built-in asset search engine, and can search detected assets from multiple dimensions based on the data of asset attribute information database, and then position qualified target network nodes fast. In addition, it also supports information search in various dimensions, such as country, city, IP, port, service, the type of equipment and operating system, and can also check the detailed information of target network nodes from multiple dimensions, and then position risky assets accurately.

Application
Scenario

The single-stage deployment of small-scaled enterprises applies to government, enterprises and other industrial institutions with smaller network scales and intensively distributed assets, and can check and sort out their network-wide assets.

Issues Resolved
  • The manual verification of assets is inefficient, and by adopting various active and passive detection technologies, the system can sort out assets effectively.
  • There is no way to know about the changes of network-wide assets, and by monitoring asset changes automatically, the system can timely master asset networking and business changes.
  • Given the security hazards of potential risky assets, the system can check high-risk ports, weak password and other threats fast, and position risky assets.
Scenario

The multi-stage distributed deployment of large-scaled enterprises applies to customers with larger network scales, and more dispersedly distributed assets, and by adopting platform+ probe distributed deployment, the system can build the network-wide basic asset information database, generate asset map, and master the asset trend in real time.

Issues Resolved
  • Given the large number and wide range of network assets, the system provides asset collection to solve the difficulties in traditional manual collection.
  • Given the difficulties in timely finding potential security hazards, the system provides big data search to solve the difficulties in the manual positioning of risky assets.
  • Given the difficulties in analyzing massive asset data, the system provides data modeling analysis and display to solve the issues related to the non-intuitive display of asset data.
  • Given the large number of subordinate units and the dispersed network assets, the system provides intensive management to solve the difficulties in managing branch assets of enterprises.
Value to Customers
Automatic asset detection

By adopting several detection modes, the system can obtain security device, network equipment, host equipment, industrial control equipment, IoT equipment, application types and other types of basic asset information, and then form the asset information map.

Intensive asset management

The system manages the detected assets intensively, and provides decision-making basis for security monitoring, inspection and evaluation, while solving asset management difficulties for customers.

Fast asset positioning

The system can fast position and check detailed information about relevant assets from multiple dimensions, effectively solving the difficulties of customers in the manual positioning of risky assets.

Data statistics analysis

The system can build the asset information map based on the asset information database and application classification database, to display the positional distribution of current assets as well as statistics about the application type and version of operating system from a macroscopic perspective, so that customers can have an intuitive understanding of the network-wide asset conditions.