Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Security Operations

A security operation system that integrates management, technology, and service, providing customers with closed-loop network security operation services.

Background

With the rapid development of information technology, network security has become an important issue that governments, businesses, and individuals must face. In the digital age, the continuous increase and complexity of network attack methods have brought unprecedented challenges to network security. Relying solely on passive defense is no longer sufficient to meet the needs of enterprises for network security. Active defense has become the core idea of network security operations. In order to ensure network security, it is necessary to integrate various types of resources, establish an efficient network security operation system, maximize the delivery of network security capabilities, thereby improving the security defense capabilities and risk response speed of the unit, and ensuring the network security and business continuity of the unit.

Relevant Policies
Notice on the Development Plan of Digital Economy in the 14th Five Year Plan (Guofa [2021] No. 29)
The Notice requires the improvement of the early warning and notification mechanism for network security emergency incidents, and the enhancement of network security situational awareness, threat detection, emergency command, collaborative disposal, and attack tracing capabilities.
Guiding Opinions on Strengthening the Construction of Digital Government (Guofa [2022] No. 14)
The Opinion emphasizes the need to fully utilize security technologies such as active monitoring, intelligent perception, and threat prediction, strengthen daily monitoring, notification and early warning, emergency response, expand the scope of network security situational awareness monitoring, and enhance the ability to warn and detect large-scale network security incidents and network leakage incidents.
Guiding Opinions of the General Office of the China Banking and Insurance Regulatory Commission on the Digital Transformation of the Banking and Insurance Industry (CBIRC Office [2022] No. 2)
The Opinion clearly requires the construction of a security operation center, fully utilizing situational awareness, threat intelligence, big data and other means, continuously improving the capabilities of network security risk monitoring, early warning and emergency response, and strengthening the coordination and linkage within and outside the industry.
Notice from the Energy Bureau on Issuing the "Network Security Management Measures for the Power Industry"
The Notice requires the establishment of a critical information infrastructure network security monitoring and early warning system, the organization of critical information infrastructure network security inspections and testing, and guidance for critical information infrastructure operators to respond to and handle network security incidents.
Notice of the People's Government of Guangdong Province on Issuing the 14th Five Year Plan for the Reform and Construction of Guangdong Digital Government (Yue Fu [2021] No. 44)
The Plan clearly requires the coordinated development and security of digital government, unified security management mechanism, supported by security technology system, and guaranteed by security operation and security supervision, to create a full cycle protection covering "pre event, during event, and post event", and to build a "secure, trustworthy, compliant and controllable" security three-dimensional defense system.
Notice on Issuing the Implementation Plan for the Construction of Digital Government in Hunan Province during the 14th Five Year Plan Period (Xiangzhengban Letter [2022) No. 23)
The Notice clearly requires the construction and improvement of provincial and municipal level security management and operation centers, security big data platforms, and security capability service platforms to support the integrated management and operation of digital government security throughout the province.
Guiding Opinions on Deepening the Development of Smart Cities and Promoting the Comprehensive Digital Transformation of Cities (NDRC Data [2024] No. 660)
The Opinion clearly requires improving the level of urban security resilience, strengthening the management of urban digital space security, improving network security monitoring, early warning, and emergency response mechanisms, constructing a city network operation security management system, and enhancing the resilience of communication networks.
Notice on the Development Plan of Digital Economy in the 14th Five Year Plan (Guofa [2021] No. 29)
The Notice requires the improvement of the early warning and notification mechanism for network security emergency incidents, and the enhancement of network security situational awareness, threat detection, emergency command, collaborative disposal, and attack tracing capabilities.
Requirement Analysis
Comprehensive perception

By adopting a unified data interface, format, and transmission standard, we collect, aggregate, and centrally process and analyze asset basic information, security vulnerability information, operational status information, security event logs, and traffic analysis data of important customer networks and information systems. We monitor network information security dynamics around the clock and throughout the process, and build a 24/7 and all-round network security situational awareness capability.

Dynamic protection

Build a security protection mechanism that covers the end, network, and cloud, targeting infrastructure, business applications, and data resources. Integrate platform based security operation capabilities such as security event monitoring and early warning, security orchestration and automated response, threat intelligence analysis and utilization, quickly respond to security events, reduce event containment and remediation time, and control the scope and degree of security event impact.

Intelligent decision-making

Driven by security perception data and utilizing artificial intelligence and big data analysis technologies and methods, we support precise positioning and rapid analysis of network and information security events, achieving precise and intelligent command and decision-making for network security.

Continuous guarantee

Emergency response, technical analysis, traceability tracking, and data recovery for network security incidents that have occurred; Notify all units of the causes and potential consequences of security incidents to prevent their spread; Track and supervise the process and results of handling security incidents, coordinate and support any environment in emergency response, and ensure the smooth handling of security incidents.

Security Operation System
The Topsec security operation system is based on the elements of "personnel, process, and technology". By setting up hierarchical security role positions, clarifying job responsibilities, and developing standard workflow, standardizing collaboration mechanisms, and clarifying evaluation criteria; Based on the basic security capabilities, security data platform, and security operation platform, we carry out a series of operational work such as asset management, vulnerability management, security event monitoring, threat analysis, and strategy optimization, ultimately forming a three in one security operation brain of management, technology, and service, providing users with closed-loop network security operation services.
Comprehensive Strength
As early as 2004, Topsec took the lead in establishing the first operator level security operation center in China, aiming to continuously create exclusive security operation centers for customers and provide high-quality security operation services. Topsec's security operation solution is supported by comprehensive network security products, advanced big data analysis platforms, and experienced security operation teams. It integrates attack technology, analysis technology, and disposal technology, implements the concept of "adversarial security operation system", and integrates and links products with personnel, measures, and processes. It is committed to solving the problem of simple stacking of security products and services and lack of proactive defense capabilities in the past, thus achieving a dynamic, proactive, continuous, and closed-loop security operation mode. At present, Topsec Security Operation Center and its services have been implemented and practiced in multiple industries such as healthcare, finance, taxation, government and enterprise, and public security, and have received unanimous praise from customers.