
The Topwalk Database Security Audit System (Topwalk-DAS) is a management and monitoring platform engineered for granular auditing and protection of database operations. By parsing, recording, controlling and analyzing database access behaviors of administrators and business personnel, it empowers users to implement preventive measures, real-time monitoring, immediate incident response and post-incident traceability—ensuring the stable operation of databases and the security of core data assets. In response to challenges including surging data sharing demands, escalating operational complexity, cumbersome resource authorization control, unmonitored operational behaviors, rapid expansion of information systems, security risks in third-party development and maintenance, overprivileged super administrators, and insufficient human resources, the system conducts in-depth research into database security issues, proactively identifies operational risks, and delivers early warning analysis.

Upon detection of a security incident, users can leverage the event traceability feature to review all associated incidents. Search criteria include suspicion level, time range, actor IP address, rule name and event ID. The event tracking function displays full details of a specified incident—including session information, complete operation history and associated statements—to facilitate incident analysis and tracing. A corresponding response mechanism triggers timely alerts to prompt immediate user action.

Event auditing is the core function of database auditing, providing users with a threat and operation response mechanism. It is divided into three phases: the pre-event prevention phase, where unified audit policies are formulated to define operational scopes; the in-event alert phase, where real-time violation detection is enabled with instant alerts and blocking; and the post-event traceability phase, which supports the retrieval of audit records, source localization, and compliance report generation. Events are strategically classified into general, significant, and major incidents, with corresponding handling mechanisms implemented to ensure truly effective auditing.

It delivers comprehensive auditing capabilities, enabling data analysis and retrieval from any perspective. The Behavior Audit page supports detailed queries and phrase-based matching via a high-performance query solution, allowing the combination of more than 20 query conditions. It instantly returns the volume of matching data entries, resolving historical pain points of unclear overall visibility and inefficient in-depth analysis.

The system supports protocol parsing for mainstream domestic and international databases, and enables comprehensive database protocol auditing covering full dimensions from statements, sessions and SQL templates to execution results, processing duration and statement volumes. It meets users' requirements for end-to-end data monitoring, and additionally tracks non-database access initiated both to and from the target servers. Leveraging high-fidelity auditing capabilities, it provides robust security oversight for databases.
It additionally provides more complete hot backup mechanism protection for users in need. Real-time fault detection can ensure the timeliness of abnormal handling, and the node switching mechanism ensures that the system can quickly resume normal and continuous operation. Another advantage of RaySAS is that it can easily implement a high-availability cluster solution without any adjustments to the user's environment.
It supports forming key business systems with different types of database servers as atoms, presenting the overall business status to users from the perspective of business systems. It helps users effectively understand the daily operation volume, access trends in specific time periods, and details and popularity of sensitive events occurring in the business system. Users can easily achieve overall evaluation and simple operation and maintenance of each business by following the clues, and the security status of the business system and its database servers is clearly visible.
Supported by full-text retrieval and analysis engine capabilities, it provides new possibilities for balancing real-time query and ultra-large-scale retrieval. It can retrieve 10-billion-level data in seconds, and data can be queried immediately after audit. On this basis, it can also return the number of qualified data immediately, avoiding the problem of being unable to see the overall situation and conduct in-depth analysis in the past.
Database access traffic generally fluctuates periodically, and most of them have significant differences between peaks and troughs. RaySAS provides an ultra-long queue to cope with the sudden surge of database traffic, ensuring complete data audit without loss.
When users need to view reports, they usually target specific report models. The report center is designed to comply with this behavior pattern from the initial stage. Taking the task list area as the operation base to clarify specific report models, selecting required report records according to time factors in the data list area, and directly presenting the selected report content in the display area, with no extra unnecessary operations throughout the process.
Compared with industry standards, it can achieve seamless scaling through cluster expansion based on user needs, further increasing the storage limit. While meeting compliance requirements, it tries to provide users with sufficient storage, reducing the premature deletion of data due to space issues.
01

Supports single-path and multi-path deployment modes in physical environments. By collecting mirrored traffic from core switches, it audits all database operation behaviors and provides early warnings for database risks.
Contact number: +8613810035865
Enterprise Email: liuyl@topwalk.com
Address: Building 3, Courtyard 6, Jianfeng Road (South Extension), Haidian District, Beijing
All Rights Reserved by TRS Topwalk Information Technology Co., Ltd.