Topwalk-DAS
Topwalk-DAS
Topwalk-DAS

The Topwalk Database Security Audit System (Topwalk-DAS) is a management and monitoring platform engineered for granular auditing and protection of database operations. By parsing, recording, controlling and analyzing database access behaviors of administrators and business personnel, it empowers users to implement preventive measures, real-time monitoring, immediate incident response and post-incident traceability—ensuring the stable operation of databases and the security of core data assets. In response to challenges including surging data sharing demands, escalating operational complexity, cumbersome resource authorization control, unmonitored operational behaviors, rapid expansion of information systems, security risks in third-party development and maintenance, overprivileged super administrators, and insufficient human resources, the system conducts in-depth research into database security issues, proactively identifies operational risks, and delivers early warning analysis.

 

Home > Security management >
Core Values

Event Precise Traceability

Event Precise Traceability

Upon detection of a security incident, users can leverage the event traceability feature to review all associated incidents. Search criteria include suspicion level, time range, actor IP address, rule name and event ID. The event tracking function displays full details of a specified incident—including session information, complete operation history and associated statements—to facilitate incident analysis and tracing. A corresponding response mechanism triggers timely alerts to prompt immediate user action.

Event Audit, Business Audit & Operation Audit

Event Audit, Business Audit & Operation Audit

Event auditing is the core function of database auditing, providing users with a threat and operation response mechanism. It is divided into three phases: the pre-event prevention phase, where unified audit policies are formulated to define operational scopes; the in-event alert phase, where real-time violation detection is enabled with instant alerts and blocking; and the post-event traceability phase, which supports the retrieval of audit records, source localization, and compliance report generation. Events are strategically classified into general, significant, and major incidents, with corresponding handling mechanisms implemented to ensure truly effective auditing.

Intelligent Retrieval

Intelligent Retrieval

It delivers comprehensive auditing capabilities, enabling data analysis and retrieval from any perspective. The Behavior Audit page supports detailed queries and phrase-based matching via a high-performance query solution, allowing the combination of more than 20 query conditions. It instantly returns the volume of matching data entries, resolving historical pain points of unclear overall visibility and inefficient in-depth analysis.

Protocol Audit

Protocol Audit

The system supports protocol parsing for mainstream domestic and international databases, and enables comprehensive database protocol auditing covering full dimensions from statements, sessions and SQL templates to execution results, processing duration and statement volumes. It meets users' requirements for end-to-end data monitoring, and additionally tracks non-database access initiated both to and from the target servers. Leveraging high-fidelity auditing capabilities, it provides robust security oversight for databases.

Product Advantages
High-Availability Cluster Deployment
High-Availability Cluster Deployment

It additionally provides more complete hot backup mechanism protection for users in need. Real-time fault detection can ensure the timeliness of abnormal handling, and the node switching mechanism ensures that the system can quickly resume normal and continuous operation. Another advantage of RaySAS is that it can easily implement a high-availability cluster solution without any adjustments to the user's environment.

Comprehensive Business Perspective
Comprehensive Business Perspective

It supports forming key business systems with different types of database servers as atoms, presenting the overall business status to users from the perspective of business systems. It helps users effectively understand the daily operation volume, access trends in specific time periods, and details and popularity of sensitive events occurring in the business system. Users can easily achieve overall evaluation and simple operation and maintenance of each business by following the clues, and the security status of the business system and its database servers is clearly visible.

Real-Time Audit and Real-Time Query
Real-Time Audit and Real-Time Query

Supported by full-text retrieval and analysis engine capabilities, it provides new possibilities for balancing real-time query and ultra-large-scale retrieval. It can retrieve 10-billion-level data in seconds, and data can be queried immediately after audit. On this basis, it can also return the number of qualified data immediately, avoiding the problem of being unable to see the overall situation and conduct in-depth analysis in the past.

Data Integrity Protection Technology
Data Integrity Protection Technology

Database access traffic generally fluctuates periodically, and most of them have significant differences between peaks and troughs. RaySAS provides an ultra-long queue to cope with the sudden surge of database traffic, ensuring complete data audit without loss.

 

Personalized Report Display
Personalized Report Display

When users need to view reports, they usually target specific report models. The report center is designed to comply with this behavior pattern from the initial stage. Taking the task list area as the operation base to clarify specific report models, selecting required report records according to time factors in the data list area, and directly presenting the selected report content in the display area, with no extra unnecessary operations throughout the process.

Flexible Elastic Scaling Capability
Flexible Elastic Scaling Capability

Compared with industry standards, it can achieve seamless scaling through cluster expansion based on user needs, further increasing the storage limit. While meeting compliance requirements, it tries to provide users with sufficient storage, reducing the premature deletion of data due to space issues.

Application Scenarios

01

Topwalk-DAS

Topwalk-DAS

 

Supports single-path and multi-path deployment modes in physical environments. By collecting mirrored traffic from core switches, it audits all database operation behaviors and provides early warnings for database risks.