Trend Micro Portable Security™ 3 Pro

Trend Micro Portable Security™ 3 Pro is the Secure Transporter. Malware scanning and cleanup for air-gapped systems and standalone PCs now with 64GB of AES-256 encrypted storage for secure file transfer.

ICS owners and operators can mitigate the risk of insider threat while transferring files with Portable Security Pro Edition’s 64GB of encrypted secure storage, in addition to its malware scanning and asset info collection for standalone computers and air-gapped systems.

No Software Installation Required

By loading scanning software onto a portable tool resembling a USB flash drive, malware detection and removal are facilitated without installing software on the target systems. This allows you to perform on-demand malware scans whenever and wherever required, and you never have to worry about performance impact on scanned devices.

Agentless Inspection & Auditing

By loading scanning software onto a portable tool resembling a USB flash drive, malware detection and removal are facilitated without installing software on the target systems. This allows you to perform on-demand malware scans whenever and wherever required, and you never have to worry about performance impact on scanned devices. Meanwhile, the built-in notification LEDs display the status of the malware scan, making operation quick and convenient.

Extend OT Visibility and Insight

Portable Security collects a detailed snapshot of asset data including computer information, Windows Update status, and application lists. This information is collected effortlessly while the scan is being performed. Asset data can now be collected from standalone PCs and devices in air-gapped systems that were previously undetected using asset discovery and management tools. Asset information can be managed from the new web console ProtableOne, or exported to CSV files or SIEM.

Centralized Management

The Portable Security Management Program provides an integrated view of scans occurring across multiple scanning tools and endpoints. Pattern file updates, configuration deployment, and correlation of scan logs and asset information can all be performed through this program to meet administrator policy requirements.

The Secure Transporter

Equipped with an AES-256 hardware encryption engine, TMPS3 Pro’s 64GB of secure storage allows ICS owners and operators to carry sensitive data in air-gapped environments while ensuring the business’ operational integrity. Files are scanned as they are transferred into secure storage and only clean files can be stored.

Easily Secure Air-Gapped Systems

Portable Security Pro makes it much easier for ICS owners and operators to scan for malware and collect asset info on standalone computers as well as air-gapped systems. Unlike traditional anti-virus software, Portable Security scans and cleans up malware without installing scanning software, showing status with an easy-to-understand LED display. During the scan, Portable Security 3 also collects asset information, helping to improve OT visibility and eliminate shadow OT. The Management Program can deploy scanning configuration settings to multiple scanning tools, either remotely or physically. It also compiles and integrates the scan logs and asset information from multiple scanning tools in multiple locations, providing a holistic view of all endpoints. TMPS3 Pro is also equipped for secure file transfer, allowing end users to mitigate insider threats to air-gapped and standalone environments by transporting sensitive data with its 64GB of AES-256 hardware encrypted storage.

Portable Security Pro fits flexibly into your daily security routines

  • Periodically scan your mission-critical assets
  • Inspect incoming or outgoing devices
  • Collect and centralize asset information
  • Transfer sensitive data with secure storage

One solution. Multiple environments.

Portable Security supports multiple platforms including Windows and Linux, from legacy versions to the latest builds. Even Windows XP or Windows 7 can be secured. Multiple platforms are securely protected with a single scanning tool.

Would you like to learn more?

We look forward to hearing from you! To send us your questions, fill out this form. A member of the TXOne team will get in touch shortly.

icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running.

Inquiry Form

Inquiry Form

TXOne Networks is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content, products, and events. You may unsubscribe at any time. For more information, view our Privacy Policy.
By clicking submit below, you consent to allow TXOne Networks to store and process the personal information submitted above to provide you the content requested.