Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Network DLP for Web

Make data visible | Controllable | Traceable

Network DLP for Web overview

Topsec Network DLP for Web is a product for data protection and audit of web application traffic. Through the reading and analysis of http/https content, the API interface is identified and found, the active API interface data in the network is automatically identified, and the type of leaked interface and interface transmission data are discovered. The interface information can be filed in advance, the illegal interface transmission behavior and the illegal transmission interface content can be discovered, and the number of risky interfaces and risk interface events can be counted. Conduct full audits of the filed compliance interfaces and draw multi-perspective profiles, including application profiles, interface profiles, account profiles, and IP profiles. It can be applied to various scenarios such as IPv4, IPv6, and cloud.

Activity & Announcement
Advantages
Multi-scenario deployment capability

Through the highly reliable serial connection mode, zero-impact bypass mode, and forward and reverse proxy mode, it realizes the deployment capability in different application scenarios such as application management, interface supervision, data export, IPV4/IPV6, and cloud environment, adapts to customers' multiple network architectures, fits into actual application scenarios, and improves data security protection capabilities.

Multi-dimensional recognition capabilities

Through keywords, regular expressions, data identifiers, document fingerprint library, structured document fingerprint library, unstructured document fingerprint library, weight dictionary, and file attribute multiple detection algorithms, data request, data upload, data download, data browsing, and multi-directional data content identification and filtering of account access applications and interfaces, judgment behavior, content compliance, and effective data security protection measures are carried out.

Multi-risk analysis capabilities

Through a variety of risk models such as data concealment, abnormal time, abnormal magnitude, account overreach, and baseline violation, the data interaction behavior generated by the application system is sorted out and analyzed, and application analysis, interface analysis, and application event risk are displayed from multiple angles. Enables comprehensive analysis of anomalous risk behavior.

Application
Scenario

For intranet and extranet application systems, application auditing, permission judgment, behavior recording, and protection interception are implemented through serial connection/bypass deployment.

Issues Resolved
  • Comprehensively audit application business flow data, and monitor data uploaded, downloaded, and circulated through business systems.
  • The service data transfer information is clearly visible, and the attribute information such as account, application, and IP address is associated to draw the application diagram.
  • Business data protection, authentication of accounts, to prevent unauthorized users from accessing, downloading high-density data, as well as non-working time access, non-office demand access and other abnormal risk behaviors.
Scenario

For application system interfaces, through in-line and bypass deployment, full interface audit, interface data discrimination, interface risk analysis, and interface violation interception are realized.

Issues Resolved
  • Comprehensively audit API interface data and monitor data flow through API interfaces.
  • Sort out the API access relationship between various services to eliminate interface problems such as interface confusion and relationship disorder.
  • API data protection, compliance judgment for interface specifications, interception of risk behaviors such as illegal interface links, illegal interface communication, and illegal interface content transmission.
Scenario

For cloud application systems, virtualization deployment, reverse proxy access, full audit of application and interface access, download data, identify risk behaviors, and perform application protection.

Issues Resolved
  • Comprehensively audit the data circulating through application business and API interface, and monitor the data information uploaded, downloaded, and circulated through the business system and API interface.
  • Sort out API access relationships, clearly visualize business data transfer information, associate account, application, IP and other attribute information, and draw application diagrams.
  • Data protection, authentication of accounts, to prevent unauthorized users from accessing, downloading high-density data, as well as non-working time access, non-office demand access, illegal interface links, illegal interface communication, illegal interface content transmission and other risk behaviors to intercept and protect.
Value to Customers
Get a complete grasp of business data flow

Draw a multi-dimensional subject portrait, grasp the connection relationship of accounts, services, applications, and interfaces, and clarify the scope of business extension.

API interface compliance

Eliminate risk issues such as unclear permissions, chaotic interfaces, disorderly relationships, and untraceable sources, and ensure compliance in the use of APIs.

Handle business compliance with ease

Meet multi-dimensional sensitive data detection, prevent confidential information leakage, provide a basis for internal compliance management and external audit, and easily respond to the requirements of audit departments.

Data flow visualization

Realize a variety of elements visual display form, easy to grasp the internal data data flow dynamics.