Topwalk-BSSP
Topwalk-BSSP
Topwalk-BSSP

The Topwalk Border Security Supervision Platform (Topwalk-BSSP) is deployed across national, provincial, and municipal-level information and communication departments. It delivers comprehensive border oversight through proactive detection and verification capabilities, encompassing unified asset management, identification of unauthorized border configurations, analysis of non-compliant border activities, and assessment of border device risks.

 

Home > Cross Domain Solutions >
Core Values

Security Center

Security Center

The BSSP platform is equipped with risk analysis capabilities. Upon receiving data collected from network traffic probes and detection tools, it correlates this information with registered baseline data (including links, services, and devices). Using its built-in rule-based analysis model, the platform organizes, categorizes, cross-references, and contextualizes the data to identify patterns and interconnections, thereby uncovering network boundary risk scenarios.

Reporting

Reporting

The platform supports the export of reports and dashboards to report boundary construction status, compliance posture, and security conditions to senior management. This ensures the organization meets regulatory requirements while enabling decision-makers to allocate resources based on report insights, enhancing the security and compliance of network boundaries.

Security & Compliance Check

Security & Compliance Check

Leveraging asset registration records and real-time monitoring data, the system conducts security and compliance validation across four core dimensions: link correlation verification, business relevance auditing, vulnerability scanning, and compliance benchmarking, to pinpoint potential risks.

Risk Visualization

Risk Visualization

This module supports risk posture mapping, knowledge graph visualization, device profiling, and cascading posture tracking, enabling multi-dimensional, comprehensive oversight of network boundaries.

Product Advantages
Comprehensive Device Fingerprinting with Accurate Identification
Comprehensive Device Fingerprinting with Accurate Identification

The device identification accuracy rate is over 90%.

  1. Supports distributed multi-tasking and a combination of active and passive methods to collect target device fingerprint information.

  2. Includes 885 built-in common ports for boundary devices.

  3. Contains over 1700 built-in fingerprints for boundary devices, including: anti-DDoS devices, firewalls, intrusion detection systems, intrusion prevention systems, device access control, network gateways (physical isolation), optical gateways, video exchange systems, data exchange systems, request service exchange systems, probes, and centralized monitoring and management systems.

  4. Supports user-defined addition of device fingerprints to continuously improve identification accuracy.

Machine learning assists in boundary discovery
Machine learning assists in boundary discovery

Machine learning analyzes access patterns of boundary devices across dimensions such as protocol, access period, and traffic size, aiding in boundary discovery when active scanning is restricted.

Hybrid Active-Passive Data Collection for Complete Coverage
Hybrid Active-Passive Data Collection for Complete Coverage

Supports distributed multi-tasking and a combination of active and passive methods for collecting boundary data. This approach enables more comprehensive and accurate acquisition of boundary data, providing stronger data support for risk analysis.

Powerful Rule-Based Analysis Model
Powerful Rule-Based Analysis Model

The system features a built-in powerful rule-based analysis model for conducting risk analysis on the collected boundary data. This effectively reduces false positives and false negatives, providing boundary administrators with accurate and reliable risk warnings.

Application Scenarios

01

Application Scenarios

Application Scenarios

The Topwalk Border Security Supervision Platform (Topwalk-BSSP) empowers national and provincial-level information and communication departments to proactively validate the compliance of border link deployments, device onboarding, and service access, enabling comprehensive, end-to-end oversight of network boundaries.