Topwalk-INP
Topwalk-INP
Topwalk-INP

Topwalk Integrated Control Probe System (Topwalk-INP) is a high-performance integrated hardware and software platform for data collection, analysis, and forwarding, integrating the capabilities of multiple probes such as logs, traffic, and threats. Deployed in bypass mode to access the network, the system can collect operational log data of various devices in the network environment, perform in-depth parsing and reassembly of network traffic, monitor and detect abnormal traffic and malicious attack behaviors; it also supports connecting to third-party big data platforms or business platforms to forward various collected and parsed data.

Home > Network security >
Product Advantages

Data Acquisition and Analysis

Data Acquisition and Analysis

Supports log data collection from target devices via multiple methods, including Prometheus, SNMP, and file-based approaches.

Enables real-time network traffic capture, coupled with in-depth traffic data analysis and reassembly, and is compatible with over 40 common network protocols.

Facilitates automated asset discovery and inventory management for all devices within the target network environment.

Security Monitoring

Security Monitoring

Supports comprehensive threat detection covering denial-of-service attacks, web attacks, injection attacks, vulnerability exploits, and penetration scans.

Enables detection of boundary service violations, including unauthorized agent access and abnormal service behaviors.

Data Transmission

Data Transmission
Provides flexible outbound data options by supporting standard protocols (HTTP, Socket, FTP, Syslog) and mainstream methods (Kafka, Syslog, FTP) for logs, traffic, threat, and asset data.
Guarantees reliable delivery of diverse data types across boundary links.
Product Advantages
Bypass Deployment
Bypass Deployment

Seamless integration into existing network environments with zero disruption

Fusion Probe
Fusion Probe

All-in-one functionality for logs, traffic, and risk detection

Open Integration
Open Integration

Seamless data transmission to upper-level platforms

Flexible Scenarios
Flexible Scenarios

Adapts to both standard and boundary network environments

Application Scenarios

01

Application Scenarios

Application Scenarios

Scenario 1: Log Transfer

In the border link, the Topwalk-INP is deployed on the non-trusted end to collect system logs, operation logs, and business logs from various devices, which are then provided to the trusted end's business system.

Scenario 2: Surveillance and Threat Detection

In a physical network environment, theTopwalk-INP is deployed via a bypass, connecting to the core switch to capture and analyze traffic. It reconstructs traffic and matches security rules, generating network application logs, traffic statistics, threat logs, and violation records. Asset data is ultimately transmitted to the big data system for in-depth analysis through the dedicated output interface