Topwalk-IBMS
Topwalk-IBMS
Topwalk-IBMS

The Topwalk Internet Behavior Management & Audit System (Topwalk-IBMS) is designed to ensure efficient, secure and compliant internet usage for enterprise users. It integrates a comprehensive suite of functions including application control, bandwidth management, internet behavior auditing, keyword filtering, user behavior analysis and security protection. The system enables users to gain full visibility into network application models and traffic patterns across all applications, optimizes bandwidth resource allocation, ensures the stable operation of critical business services, and improves bandwidth utilization efficiency. It delivers robust support for data security, enhanced workplace productivity and legal risk mitigation for organizations.

 

Home > Security management >
Core Values

Fine-Grained Network Behavior Control

Fine-Grained Network Behavior Control

The system adopts DPI/DFI fusion recognition technology to conduct in-depth analysis of user traffic, enabling precise deep identification of embedded application behaviors. Preloaded with over 5,000 applications, it supports fine-grained application control based on specific application scenarios.

Comprehensive Security Access Control

Comprehensive Security Access Control

The system supports a variety of identity management methods, including local authentication, RADIUS authentication, WeChat authentication, and visitor verification. It enables identity-based resource access control for both external remote users and local internal users, and facilitates the rapid deployment of lightweight zero-trust perimeter security solutions.

All-in-One Capabilities

All-in-One Capabilities

In addition to effectively managing user internet activities, the system also delivers a full suite of capabilities including network access control, intelligent routing, load balancing, intrusion detection and prevention (IDP), and virus protection. It also establishes robust perimeter security defenses to effectively safeguard the security of the underlying network infrastructure.

Security Visualization

Security Visualization

It supports security analysis based on network tags, user identities, geographic locations, and assets—covering attack types and risk postures. The system also visualizes attack chain views and enables centralized threat evidence collection.

Analysis of User Internet Behavior Trajectories

Analysis of User Internet Behavior Trajectories

By correlating and analyzing user accounts, behaviors, access devices, and timestamps, the system clearly and intuitively visualizes users’ internet behavior trajectories – empowering administrators to conduct more targeted and precise behavioral analysis.

Digital Asset Security Management

Digital Asset Security Management

The system supports one-click asset discovery, enabling users to quickly identify and manage digital assets via traffic learning, scan detection, endpoint linkage, and manual entry. It also facilitates unified asset security assessments for users based on attributes including department, business system, and asset criticality.

Product Advantages
Real-Name Authentication
Real-Name Authentication

Users access the Internet with real names to avoid illegal risks of anonymous users;

Implements domain-controlled single sign-on for enterprise employees to simplify the access process;

Provides a universal and easy-to-use Internet authentication mechanism for guests and visitors, reducing access difficulty.

Standardized Internet Access
Standardized Internet Access

Standardizes enterprise management and improves employees' work efficiency;

Formulates Internet behavior management systems to block slacking off; refines access permissions based on business content and organizational structure; ensures bandwidth for key businesses to improve efficiency.

Multi-Functional
Multi-Functional

Fully meets scenario-based construction needs and reduces enterprise construction costs; undertakes the construction of Internet exit gateways to provide network services for users; realizes intelligent routing of multiple Internet exits to ensure stable business operation.

Application Scenarios

01

Topwalk-IBMS

Topwalk-IBMS

Deployment modes can be flexibly selected as bypass or routing based on actual user requirements. Routing mode is typically deployed at public network egresses or Layer 3 switch nodes; it provides NAT and other egress networking capabilities while implementing traffic control, behavior auditing, and management for internal network users. Bypass mode preserves the customer’s existing network architecture by mirroring target traffic to the device via the switch’s mirror port, enabling seamless user behavior analysis and auditing. The system conducts in-depth data parsing and reconstruction, analyzes the 7-layer traffic model of bearer services, and retains complete logs including internet access behavior records and application traffic data.