Intelligent CIO Middle East Issue 84 | Page 21

removal are facilitated without installing software on the target systems . This allows you to perform on-demand malware scans whenever and wherever required .
One Solution , Multiple Platforms
Supports multiple platforms including Windows and Linux , from legacy versions to the latest builds . Even Windows XP or Windows 7 can be secured . Multiple
tool .
Detected and further action is required
Malware detected and cleaned
No malware is detected . System is safe computer information , Windows Update status , and application lists . * 1 This information is collected effortlessly while the scan is being performed .
1
LATEST INTELLIGENCE

TREND MICRO PORTABLE SECURITY3 PRO GOLDEN LIMITED EDITION

Trend Micro Portable Security™ 3 Pro Golden Limited Edition
Agentless Inspection Tool for Cybersecurity Audit Check and Secure File Transferring
Portable Security is an agentless inspection tool for OT / ICS cybersecurity audits , checks , and secure file transfers . You make the call to eliminate or monitor cyber threat on Windows or Linux systems without installing software . Scans maximize visibility by recording detailed asset information in a centralized inventory , granting users of companion Management Program a holistic overview of endpoint risk status via connecting multiple scanning tools . Pro edition also includes malware-free secure storage for secure file transfer : all files stored in secure storage will be scanned by a built-in anti-malware engine and encrypted on the fly with AES-256 encryption , streamlining scheduled patch updates and ensuring data integrity .
Advantages
No software installation required By loading scanning software onto a portable tool resembling a USB flash drive , malware detection and
Extend OT Visibility and Insight Collects a detailed snapshot of asset data including
DATASHEET

Portable Security is an agentless inspection tool for OT / ICS cybersecurity audits , checks , and secure file transfers . You make the call to eliminate or monitor cyber threat on Windows or Linux systems without installing software . Scans maximise visibility by recording detailed asset information in a centralised inventory , granting users of companion Management Program a holistic overview of endpoint risk status via connecting multiple scanning tools . Pro edition also includes malware-free secure storage for secure file transfer : all files stored in secure storage will be scanned by a built-in anti-malware engine and encrypted on the fly with AES-256 encryption , streamlining scheduled patch updates and ensuring data integrity .

Advantages removal are facilitated without installing software on the target systems . This allows you to perform on-demand malware scans whenever and wherever required .
One solution , multiple platforms Supports multiple platforms including Windows and Linux , from legacy versions to the latest builds . Even Windows XP or Windows 7 can be secured . Multiple platforms are securely protected with a single scanning tool .
Easy operation The portable malware scanning tool can be use d across multiple ICS or endpoint devices . You can launch multiple connected scanning tools on multiple endpoints simultaneously . The built-in notification LEDs display the status of a malware scan . p platforms are securely protected with a single scanning
Easy Operation The portable malware scanning tool can be used across multiple ICS or endpoint devices . You can launch multiple connected scanning tools on multiple endpoints simultaneously . The built-in notification LEDs display the status of a malware scan .
Scan status and result notification with LED
PRESENTED BY
Centralized Management
The Management Program provides an integrated view of scans occurring across multiple scanning tools and endpoints . Pattern file updates , configuration deployment , and correlation of scan logs and asset information can all be performed through this program to meet administrator policy requirements .
The Secure Transporter Equipped with an AES-256 hardware encryption engine , the secure storage allows ICS owners and operators to carry sensitive data in air-gapped environments while ensuring the business ’ operational integrity . Files are scanned as they are transferred into secure storage and only clean files can be stored .
www . TXOne . com
© 2022 by TXOne Networks , Inc . All rights reserved . Trend Micro , the Trend Micro t-ball logo , Trend Micro Portable Security are trademarks or registered trademarks of Trend Micro , Incorporated . All other product or company names may be trademarks or registered trademarks of their owners
No software installation required By loading scanning software onto a portable tool resembling a USB flash dri ve , malware detection and
Download whitepapers free from www . intelligentcio . com / me / whitepapers /
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 21