Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Full Traffic Threat Traceability System

Full traffic retention, with no leakage | Full traffic tracing, package-based | Full traffic search, quick as a flash

Overview

Topsec Full Traffic Threat Traceability System (TopTTT) is a high-performance software and hardware integrated platform that can collect, store, analyze and retrieve full traffic. The product is provided with full traffic data retention, dialog analysis, protocol analysis, communication analysis, statistical analysis and other functions. While capturing the traffic, the system can analyze data message, correlate the analysis result with traffic data, and then store them as data supports for follow-up search and analysis.

Activity & Announcement
Advantages
Full flow retention - Watertight

Equipped with the ability to store the full flow of data, 7*24 hours real-time capture of traffic, it retains all the data in the form of PCAP files locally, whether it is a normal packet or anomalous packet, watertight, all retained, providing a legally binding record of the traffic session for the user to retrieve at any time.

Full traffic traceback - Packet tracking

Supports the analysis of the communication relationship of all fields in the traffic, in the form of the communication relationship chart, through different colors and the thickness of the connection line, clearly shows the source and destination relationship and session information in the network environment, and then accurately lock the transmission trace of the data flow in the network.

Full flow retrieval - Fast as lightning

Using Elasticsearch technology, based on Lucene's inverted indexing mechanism, it has fast data retrieval capability and provides second query for ten million data. The system provides the view retrieval module, which makes the retrieval more convenient. At the same time, it supports the label function, so that users can label the traffic data of concern. Traffic traceback can be faster and more efficient by retrieving labels.

Application

Bypass deployment is the most common way of deployment, and based on the two-way network traffic of switch in the image target network region, the system can mirror all network communication traffic within the region to the product, and then realize full traffic data collection.

Issues Resolved
  • There is no need to change the original network topology structure of users, making it easy to put the system online.
  • The system can record the entire collection of original traffic data, and keep them for a long term.
  • In addition, the system can also analyze the traffic package obtained, and display key fields intuitively.
  • The system can also lock the transmission trace of data traffic in the network accurately by communication relation diagrams.
  • Besides, the system can also provide advanced search and query network communication data fast.
Value to Customers
Flexible deployment, conforming to compliance requirements

The system can realize full traffic retention and call original data packages at any time, and help users meet the security classified protection compliance requirements, without changing the network structure. In addition, it can also reduce the passive legal responsibilities and political risks incurred to enterprise leaders due to the failure of taking analytical measures for network attacks, especially new network attack behaviors.

Complete tracing and evidence collection

The system can implement complete tracing analysis, and extract evidences of legal benefits by full traffic retention. During HW, the system can find attack threats timely, track complete data packages, and improve network protection rating.

Efficient search, accurate positioning

Based on over twenty search mechanisms, the system can fast find the specific attack packages among massive data, display the specific content of package loads, position problems accurately, further analyze and control the range of impact, and stop losses timely. Meanwhile, the system can also record the entire network transmission, and provide data supports for investigating security incidents and collecting corresponding evidences.