Topwalk-ATMS
Topwalk-ATMS
Topwalk-ATMS

The Topwalk-ATMS is an integrated security solution designed for government and enterprise organizations. This comprehensive product combines multiple capabilities including malicious code defense, vulnerability remediation, endpoint detection and response (EDR), desktop management, and data leakage prevention. Compatible with various operating systems and computing platforms, it utilizes a unified proxy and centralized management console to help clients establish a next-generation multi-layered security framework. This system provides protection against both known and unknown threats while enabling unified management and efficient operations.

Home > Network security >
Core Values

Data Leak Prevention

Data Leak Prevention

It offers a full range of screen watermarking options including text, official seal, QR code, and dot matrix types. Both visible and invisible watermarks are supported to effectively prevent information leakage via screenshots or mobile phone photography.

Intrusion Defense

Intrusion Defense

It delivers comprehensive intrusion prevention capabilities through core technologies including behavioral analysis, script defense, application hardening, and virtual patching. The system accurately detects and blocks various attack behaviors—such as fileless attacks, remote overflow, internal network lateral movement, and brute-force attacks—on both endpoint and network layers. 

 

EDR

EDR

It delivers kernel-mode data collection and correlation analysis capabilities, covering terminal processes, drivers, modules, IP access, DNS access, browser HTTP/HTTPS access, file operations, peripheral operations, print operations, registry changes, account changes, operating system logs, and other related information.

Desktop Management

Desktop Management

Provide efficient and convenient desktop management features, including baseline verification and automatic reinforcement, vulnerability detection and automatic repair, network control, process control, unauthorized external connections, peripheral device control, file distribution, remote assistance, ad blocking, and security notifications.

Malicious Code Prevention

Malicious Code Prevention

With cutting-edge antivirus capabilities, the system features a "four-engine" architecture integrating genetic profiling, AI, behavioral detection, and cloud scanning engines. This synergy enables multi-engine complementarity, delivering exceptional protection against both known and unknown viruses across online and offline environments. It effectively combats malicious codes including ransomware, mining trojans, worms, and boot sector viruses.

Product Advantages
Ransomware Hunting Matrix
Ransomware Hunting Matrix

Provide a ransomware hunting matrix, customized from both static and dynamic defense dimensions to cover the entire lifecycle of ransomware—before, during, and after an attack. Static defense includes a dedicated AI detection model for ransomware, enhancing the ability to detect ransomware. Dynamic defense includes behavior hunting and ransomware trapping. Behavior hunting captures dangerous actions such as volume shadow copy deletion, disabling of automatic repair, and deletion of backup catalogs. Ransomware trapping captures suspicious activities involving decoy files manipulated by ransomware.

The next generation of artificial intelligence engines
The next generation of artificial intelligence engines

Built with a product-grade next-generation AI-based malware detection engine, featuring high detection rates, low false positive rates, and strong adversarial robustness. It demonstrates excellent generalization capabilities, particularly in detecting unknown samples. Compared to traditional engines, it is faster, more powerful, and lighter, efficiently identifying various known and unknown threats both online and offline.

One-stop endpoint security solution
One-stop endpoint security solution

Provide users with a one-stop security solution for endpoint security, delivering multiple security functions such as malware defense, vulnerability remediation, detection and response (EDR), desktop management, and data leak prevention through a single agent and a single management console. Administrators can centrally manage all endpoints across the network via the console, including functions such as network-wide threat monitoring, unified antivirus operations, centralized vulnerability remediation, unified policy distribution, centralized desktop management, unified screen watermark settings, and centralized upgrade management.

 
 
 
 
 
 
 
 
 
 

 

Full support for heterogeneous IT ecosystems
Full support for heterogeneous IT ecosystems

Fully support the Xinchuang ecosystem, including domestic operating systems such as Kylin, NeoKylin, Deepin, UOS, Zhongke Fangde, and Red Flag, as well as domestic CPUs including Zhaoxin, Phytium, Hygon, Kunpeng, Sunway, and Loongson. Achieve unified and centralized management of both Xinchuang and non-Xinchuang endpoints, effectively meeting the antivirus requirements of domestic Xinchuang endpoints and safeguarding the network security of domestic Xinchuang terminals.

Application Scenarios

01

Application Scenario

Application Scenario

Topwalk-ATMS is engineered to align with global cybersecurity best practices and regulatory frameworks, satisfying the security protection requirements for critical information systems across all risk classification levels. For instance, in a medium-to-high risk compliance scenario, deploying this system enables the full implementation of multiple stringent security mandates, including communication port restrictions, least-privilege access control, attack detection, malicious code identification and remediation, user behavior auditing, password complexity enforcement, and data leakage prevention. This ensures users can smoothly pass compliance audits. Additionally, the cascaded deployment model facilitates centralized management from headquarters to branch offices, effectively mitigating terminal-related security risks.