
The Topwalk Internet Behavior Management & Audit System (Topwalk-IBMS) is designed to ensure efficient, secure and compliant internet usage for enterprise users. It integrates a comprehensive suite of functions including application control, bandwidth management, internet behavior auditing, keyword filtering, user behavior analysis and security protection. The system enables users to gain full visibility into network application models and traffic patterns across all applications, optimizes bandwidth resource allocation, ensures the stable operation of critical business services, and improves bandwidth utilization efficiency. It delivers robust support for data security, enhanced workplace productivity and legal risk mitigation for organizations.

The system adopts DPI/DFI fusion recognition technology to conduct in-depth analysis of user traffic, enabling precise deep identification of embedded application behaviors. Preloaded with over 5,000 applications, it supports fine-grained application control based on specific application scenarios.

The system supports a variety of identity management methods, including local authentication, RADIUS authentication, WeChat authentication, and visitor verification. It enables identity-based resource access control for both external remote users and local internal users, and facilitates the rapid deployment of lightweight zero-trust perimeter security solutions.

In addition to effectively managing user internet activities, the system also delivers a full suite of capabilities including network access control, intelligent routing, load balancing, intrusion detection and prevention (IDP), and virus protection. It also establishes robust perimeter security defenses to effectively safeguard the security of the underlying network infrastructure.

It supports security analysis based on network tags, user identities, geographic locations, and assets—covering attack types and risk postures. The system also visualizes attack chain views and enables centralized threat evidence collection.

By correlating and analyzing user accounts, behaviors, access devices, and timestamps, the system clearly and intuitively visualizes users’ internet behavior trajectories – empowering administrators to conduct more targeted and precise behavioral analysis.

The system supports one-click asset discovery, enabling users to quickly identify and manage digital assets via traffic learning, scan detection, endpoint linkage, and manual entry. It also facilitates unified asset security assessments for users based on attributes including department, business system, and asset criticality.
Users access the Internet with real names to avoid illegal risks of anonymous users;
Implements domain-controlled single sign-on for enterprise employees to simplify the access process;
Provides a universal and easy-to-use Internet authentication mechanism for guests and visitors, reducing access difficulty.
Standardizes enterprise management and improves employees' work efficiency;
Formulates Internet behavior management systems to block slacking off; refines access permissions based on business content and organizational structure; ensures bandwidth for key businesses to improve efficiency.
Fully meets scenario-based construction needs and reduces enterprise construction costs; undertakes the construction of Internet exit gateways to provide network services for users; realizes intelligent routing of multiple Internet exits to ensure stable business operation.
01

Deployment modes can be flexibly selected as bypass or routing based on actual user requirements. Routing mode is typically deployed at public network egresses or Layer 3 switch nodes; it provides NAT and other egress networking capabilities while implementing traffic control, behavior auditing, and management for internal network users. Bypass mode preserves the customer’s existing network architecture by mirroring target traffic to the device via the switch’s mirror port, enabling seamless user behavior analysis and auditing. The system conducts in-depth data parsing and reconstruction, analyzes the 7-layer traffic model of bearer services, and retains complete logs including internet access behavior records and application traffic data.

Contact number: +8613810035865
Enterprise Email: liuyl@topwalk.com
Address: Building 3, Courtyard 6, Jianfeng Road (South Extension), Haidian District, Beijing
All Rights Reserved by TRS Topwalk Information Technology Co., Ltd.