Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Endpoint Security

Background

With the rapid development of information technology, the scale of the intranet is expanding and the number of computers is increasing. While enjoying the convenience brought by Internet technology, the CPC and government authorities, finance, energy, transportation, and other important national industries have also taken a large number of defense measures. Although firewalls, intrusion detection systems, and other security products have ensured the information system boundary security, the hidden danger of information security of internal computer terminals has gradually emerged. Furthermore, the trade war triggered by the "ZTE Incident" has also brought about a supply chain crisis in China's IT industry. The high dependence on imported components may lead to the breakdown of important information systems in key areas of China at any time, endangering the security of China and Chinese people's property. As a result, it has also accelerated the localization of information systems of the CPC and government authorities and various industries in China, and the terminal security of the domestic environment has become the focus of attention.

Relevant Policies
The Strategy Program of National Informatization Development issued in 2016
pointed out that by 2025, the situation of core key technologies being controlled by others will be fundamentally changed and a secure and controllable information technology industry system will be formed.
The Cybersecurity Law of the People's Republic of China issued in 2017
regulated the responsibilities and obligations of multiple subjects of cybersecurity. It is a basic national law and an important foundation for the legal system of cybersecurity.
The Information Security Technology Baseline for Classified Protection of Cybersecurity issued in 2019
put forward general security requirements for common security protection needs and extended requirements for personalized security protection needs of new technologies and new application fields such as cloud computing, mobile Internet, IoT, industrial control, and big data, forming a new standard for basic requirements for cyber security level protection.
The Measures for the Administration of the Development of National Government Information Technology Projects issued in 2020
emphasized that "Security and Reliability" and "Cybersecurity" are the key points. It required that the government affairs information project in the approval stage needs to explain the security and reliability of the product.
The Strategy Program of National Informatization Development issued in 2016
pointed out that by 2025, the situation of core key technologies being controlled by others will be fundamentally changed and a secure and controllable information technology industry system will be formed.
Development Trend
Lightweight client agent

To strengthen terminal security protection, more technical means are developed. While improving the terminal security level from different dimensions, these products consume more and more resources of the terminals, affecting the normal service development and daily office work. Therefore, it is an inevitable trend to lighten the client agent of protection products and reduce resource consumption.

Improving detection and killing ability by analysis of behavior

In the face of new attacks such as unknown and textless viruses, the traditional virus detection and protection products based on feature matching are helpless, which poses a serious challenge to terminal security protection. To improve the terminal's ability to detect and kill viruses, it has become a development trend to analyze malicious behavior instead of relying solely on feature matching.

Full life cycle management

Starting from different dimensions of terminal behavior and various entrances of virus threats, the system performs targeted protection and control and adopts a closed-loop management mechanism covering the full life cycle of prevention, defense, detection, and response to achieve three-dimensional protection of terminal security.

Users' Pain Points
Terminal viruses emerge endlessly, making it difficult to efficiently kill viruses
Ransomware viruses, mining viruses, variant viruses, and unknown viruses are emerging one after another. New attacks such as textless viruses threaten the security of terminals seriously. The traditional detection and killing methods based on feature matching are insufficient to meet current demands.
Passive defense mechanism makes it difficult to deal with unknown threats
Advanced threats to enterprises are more complex, and it is impossible to perform effective correlation detection at each stage of the advanced threats, resulting in the advanced threats' ignorance and inability to confirm the harmfulness.
Random use of peripherals is becoming a new way to leak
Random use of unauthenticated USB flash disks and mobile hard disks, due to their convenience, and the random access from external devices such as CD-ROM drives, Bluetooth, and wireless network, provide new ways for the dissemination of documents, which is very easy to leak.
Illegal terminal outreach leads to the spread of attacks
If an internal terminal connects to an external network without permission, the internal network is exposed to various security threats, such as viruses, unauthorized access, and data eavesdropping. As a result, information about the network structure and security protection measures is leaked.
The vulnerability cannot be fixed in time, resulting in the weakness of protection
Terminal users have different computer skills and security awareness, which may lead to the following situations, such as the patch not being installed and the vulnerability not being repaired in time, resulting in terminal defects and threats to terminal security.
The user is not authenticated during login, resulting in information theft
Unauthorized internal users log in to the system and use terminal resources through means such as password guessing, unauthorized access, password stealing, and idle time operation, which increases the risk of data disclosure of internal terminals.
Technical System
To help users build a unified management system integrating technology and management, build an all-round and multi-level security organization system and security operation system, and build a multi-level and integrated security protection technology system, Topsec has launched terminal security login products, host monitoring and auditing products, anti-virus products, printing, burning, and auditing products, and server auditing products. The interaction of these five types of products realizes login authentication, system monitoring, virus detection, network access control, peripheral management, file protection, behavior auditing, and other functions of terminals, and realizes the comprehensive monitoring and auditing of terminals from four aspects of application, data, system and user behavior, so as to ensure the robustness of the terminal system.