Trend Micro Portable Security-product photo

Trend Micro Portable Security™ 3

Malware scanning and cleanup for air-gapped systems and standalone PCs.

Trend Micro Portable Security-product photo

Portable Security helps ICS owners and operators with malware scanning and asset info collection for standalone computers and air-gapped systems.

No Software Installation Required

By loading scanning software onto a portable tool resembling a USB flash drive, malware detection and removal are facilitated without installing software on the target systems. This allows you to perform on-demand malware scans whenever and wherever required, and you never have to worry about performance impact on scanned devices.

Agentless Inspection & Auditing

By loading scanning software onto a portable tool resembling a USB flash drive, malware detection and removal are facilitated without installing software on the target systems. This allows you to perform on-demand malware scans whenever and wherever required, and you never have to worry about performance impact on scanned devices. Meanwhile, the built-in notification LEDs display the status of the malware scan, making operation quick and convenient.

Extend OT Visibility and Insight

Portable Security collects a detailed snapshot of asset data including computer information, Windows Update status, and application lists. This information is collected effortlessly while the scan is being performed. Asset data can now be collected from standalone PCs and devices in air-gapped systems that were previously undetected using asset discovery and management tools. Asset information can be managed from the new web console ProtableOne, or exported to CSV files or SIEM.

Centralized Management

The Portable Security Management Program provides an integrated view of scans occurring across multiple scanning tools and endpoints. Pattern file updates, configuration deployment, and correlation of scan logs and asset information can all be performed through this program to meet administrator policy requirements.

Easily Secure Air-Gapped Systems

Portable Security makes it much easier for ICS owners and operators to scan for malware and collect asset info on standalone computers as well as air-gapped systems. Unlike traditional anti-virus software, Portable Security scans and cleans up malware without installing scanning software, showing status with an easy-to-understand LED display. During the scan, Portable Security 3 also collects asset information, helping to improve OT visibility and eliminate shadow OT. The Management Program can deploy scanning configuration settings to multiple scanning tools, either remotely or physically. It also compiles and integrates the scan logs and asset information from multiple scanning tools in multiple locations, providing a holistic view of all endpoints.

Portable Security fits flexibly into your daily security routines

  • Periodically scan your mission-critical assets
  • Inspect incoming or outgoing devices
  • Collect and centralize asset information

One solution. Multiple environments.

Portable Security supports multiple platforms including Windows and Linux, from legacy versions to the latest builds. Even Windows XP or Windows 7 can be secured. Multiple platforms are securely protected with a single scanning tool.

Would you like to learn more?

We look forward to hearing from you! To send us your questions, fill out this form. A member of the TXOne team will get in touch shortly.

icon-expert-blackicon-expert-blackicon-expert-black

Never trust, always verify

Learn more about how TXOne’s OT zero trust approach can help you keep the operation running

Inquiry Form

Inquiry Form

TXOne Networks is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content, products, and events. You may unsubscribe at any time. For more information, view our Privacy Policy.
By clicking submit below, you consent to allow TXOne Networks to store and process the personal information submitted above to provide you the content requested.