Skip to content

Trend Micro Portable Security 2

Malware scanning and cleanup tool for standalone PC/closed system

Portable Security

A malware scanning and cleanup tool shaped like a USB flash drive in environments that Internet connection is not available or anti-malware software cannot be installed.


No Internet connection doesn't mean safe and secure.

The source of malware infections is often thought to be the Internet or mail. These really are the main infection routes, so proper security measures are taken for systems connected to the Internet. In contrast, standalone PC/closed systems are, in many cases, believed to be safe and secure because they are not connected to external systems. However, they are in fact exposed to malware infections from USB flash drives and PCs brought in from the outside.

Security measure challenges for standalone PC/closed system

Software installation restrictions Anti-malware software cannot be installed
Restrictions for systems not connected to the Internet Malware scanning with the latest malware pattern file is difficult in a standalone PC/closed system
Use of PCs brought in from the outside and USB devices Malware infection other than via the Internet

PCs of standalone/closed systems also have malware infection risks.

 

Features

Trend Micro Portable Security 2™ scans and removes malware with a scanning tool shaped like a USB flash drive. In a variety of systems with installed USB interfaces, it can scan and remove malware easily. Systems previously unavailable to take measures against malware because they were not connected to the Internet, or anti-malware software could not be installed(*1) are enabled to scan and remove malware with the latest malware pattern file(*2).

NEW! Centralized management

Manages configurations of the scanning tools for multiple locations, malware pattern files, and logs.

The management program provides the centralized management function. This enables the comprehension of scan logs of the scanning tools in multiple locations in an integrated fashion. Also, malware pattern files and configurations of the scanning tools can be centrally managed. Moreover, the event log of the lockdown security software "Trend Micro Safe Lock (separately charged)" can be obtained with the management program of Portable Security 2.

 

NEW! Easy operation

Scan status and result notification with LED. Using only the scanning tool, malwares can be scanned and removed, and the malware pattern file can be updated.

Scan status and result notification with LED
The LED equipped on the scanning tool notifies of the scan status and result with three stages.
Since the person in charge does not have to meticulously check the scan status using the target terminal screen, it does not interfere with operational efficiency.

Red: Malware scan completed Detected and waiting for operator's action Yellow: Malware scan completed Detected and cleaned Blue: Malware scan completed Malware not detected

 

Using only the scanning tool, malwares can be scanned and removed, and the malware pattern file can be updated.
Updating the malware pattern files and viewing the logs are available using any general-purpose PC connected to the Internet and the scanning tool by selecting a mode that does not use the management program unlike conventional products that require management computers. Security measures are easily enabled even when management computers cannot be prepared separately.

 

No installation required

Scans target terminals without installing*1 scanning software.

By loading scanning software onto a scanning tool shaped like a USB flash drive, malware scanning and removal are enabled without installing the scanning software on the target terminal (*1).

 

*1 When scanning for malware, drivers are created on the target terminal and files on the local HDD temporarily. After the scan, the drivers and files do not remain on the target terminal. (A log is created on the local hard disk of the target terminal at USB boot scanning)
*2 Portable Security 2 checks for malware with the latest pattern files at the time of updating by the management computer/scanning tool.
* Portable Security 2 does not scan for malware on management computers.


Management program

The updating of malware pattern files, management of the scanning tool, and centralized management of logs can also be performed on remote systems by installing the management program on a management computer connected to the Internet.
In addition, event logs can be managed in cooperation with Trend Micro Safe Lock™.

  1. Updating the malware pattern file
    Download the latest malware pattern file and scanning engine on the management computer. Periodic downloading is also available by setting up scheduled updates. See screenshot "Updating the malware pattern file".
  2. Management of scanning tool
    Updated date and time, scanning configurations, and log synchronization date and time can be checked for each scanning tool registered to the management computer. Also, the configuration for each scanning tool registered to the management computer is available, including target folders, actions at malware detection, and scanning exclusion lists.

    1. Scanning type
      "All local folders", "IntelliScan" (*1), "Default folders (quick scan)" (*2), "Specified folders"
      1. Determine the actual file type, and scans files that have the possibility of malware infection.
      2. Scans only folders often targeted by malware (e.g. system folders of Windows).
    2. Action at detection
      "Select action manually" "Only record log" "Use Trend Micro recommended settings"


  3. Centralized management of logs
    Scan logs can be viewed and managed by sending the scan logs of each location to the management computer from the scanning tool. The event log of Trend Micro Safe Lock and the scan log of USB boot scan (Trend Micro Rescue Disk) are also viewable.

    – See screenshot "Status of registered scanning tool"
    – See screenshot "Configuration of scanning target folder, and action setting at detection"
    – See screenshot "Log"
    – See screenshot "Log display"

  4. Collaboration with Trend Micro Safe Lock
    When scanning a PC with Safe Lock installed with the scanning tool, the event log of Safe Lock can be viewed along with the scan log by automatically collecting the event log and sending it to the management computer. See screenshot "Collaboration with Safe Lock".

Scanning tool

Scans for malware of scanning target terminals with the tool shaped like a USB flash drive. When malware is detected, cleaned, quarantined, ignored, etc. depending on the configuration. The scanned result is saved on the scanning tool.

  1. Malware scanning on target terminal
    Connect the scanning tool to a target terminal to scan for malware and obtain the scan log. See screenshot "Scanning".

  2. Scan status and result notification with LED
    The LED equipped on the scanning tool notifies of the scan status and result with three stages (blue: not detected; yellow: detected and cleaned; red: detected and waiting for operator’s action; LED blinks when scanning). See screenshot "Scanning tool - LED indication list".

  3. Updating the malware pattern file
    When the management computer is being used, downloads the latest malware pattern file from the registered management computer; otherwise, downloads directly from the Trend Micro server. See screenshot "Updating the malware pattern file".

  4. USB boot scanning
    With USB boot scanning, a target terminal can be booted with the scanning tool to scan for malware. See screenshot "USB boot scanning".

  5. Malware infection prevention
    Protect the scanning tool so that the Portable Security 2 itself is not infected with malware.

Use 1: Regular checking of standalone PC/closed systems

Checks in-house standalone PC/closed systems regularly, which is difficult with standard anti-malware software.

Responds to the following requests

  • Want to check for malware easily with the latest malware pattern  file (*1) even on the standalone PC/closed system
  • Want to check for malware without installing software (*2)
    *1 When scanning for malware, drivers are created on the target terminal and files on the local HDD temporarily. After the scan, the drivers and files do not remain on the target terminal.  (A log is created on the local hard disk of the target terminal at boot scanning with the Rescue Disk.)
    *2 Portable Security 2 checks for malware with the latest pattern files at the time of updating by the management computer/scanning tool.

Example of target terminal

PC for specific task, PC for personal information management, PC outside the control of information management brought by a branch, electronic chart system, image processing system, measuring instrument, analytical instrument.

Use 2: Checking before corporate LAN connection

Checks a terminal not connected to a corporate network before connecting to the network

Responds to the following request

  • Want to prevent malware infection in a corporate network

Example of target terminal

PCs brought out on business trips, PCs for demonstrations, PCs for lending

Use 3: Restoration at time of malware infection

Checks infected terminals disconnected from the network to restore them.

Responds to the following requests

  • Want to check and recover an infected PC with the latest malware pattern file (*1) without resetting up the PC

Example of target terminal

PC for general office purposes

Use 4: Check before product shipment

Checks for malware before shipment to prevent malware contamination of the shipped product

Responds to the following requests

  • Want to prevent malware contamination of shipped product
  • Want to check for malware without installing software (*2)

Example of target terminal

Embedded device (analysis/inspection equipment, measuring instrument, medical device, manufacturing equipment), Control terminal of FA/PA

Use 5: Check at maintenance service

Checks for malware on systems and devices delivered to customers on-site at maintenance

Responds to the following requests

  • Want to solve malware infection problems of customers on-site.
  • Want to avoid becoming a cause of malware infection at maintenance.
  • Want to keep evidence

Example of target terminal

Embedded device (analysis/inspection equipment, measuring instrument, medical device, manufacturing equipment), Control terminal of FA/PA


How to operate Trend Micro Portable Security 2

Portable Security 2 has two operation methods: Centralized management type operation (centralized management mode) that is operated under management program, and scanning tool standalone operation (standalone mode) that is operated without a management program.

With a management program, the administrator can perform things such as malware scanning configuration and scanning log aggregation to scanning tools in remote branches, production and maintenance sites.

When a management program is not used, unlike conventional products that require management computers, updating of malware pattern files and viewing of the log are available using any general-purpose PC connected to the Internet and the scanning tool. Security measures can be easily implemented even when management computers cannot be prepared separately.

Operation method 1: Centralized management type operation (centralized management mode)

Suitable for the following demands:

  • Want to aggregate and check logs in the headquarters (head office), as Portable Security 2 is operated in multiple locations
  • Want to unify scanning configurations in multiple locations
  • Want to apply the same malware pattern file in multiple locations

 

Operation method 2: Scanning tool standalone operation (standalone mode)

Suitable for the following demands:

  • Want to use mainly scanning and removal
  • Want to use without preparing a management computer
  • No need to manage scanning configurations centrally

 


System requirements

  Management program Scanning tool
 
  • Windows XP Professional SP1 / SP2 / SP3 32bit
  • Windows Vista Business / Enterprise / Ultimate SP1 / SP2 32/64bit
  • Windows 7 Professional / Enterprise / Ultimate SP1 32/64bit
  • Windows 7 Home Basic / Home Premium SP1 64bit
  • Windows 8 Pro / Enterprise 32/64bit *1
  • Windows Server 2003 Standard / Enterprise SP2 / R2 SP2 32/64bit
  • Windows Server 2008 Standard / Enterprise SP2 32/64bit
  • Windows Server 2008 Standard / Enterprise R2 SP1 64bit
  • Windows Server 2012 Standard 64bit
 
 
 
OS
 
  • Windows XP Professional SP1 / SP2 / SP3 64bit
  • Windows XP Embedded SP1 / SP2 / SP3 32bit *2
  • Windows Embedded Standard 2009 32bit *2
  • Windows Embedded Standard 7 32bit/64bit
  • Windows Embedded POSReady 2009 32bit
  • Windows Embedded POSReady 7 32bit
  • Windows XP Professional for Embedded Systems SP1 / SP2 / SP3 32bit
  • Windows Vista for Embedded Systems SP1 / SP2 32bit
  • Windows 7 for Embedded Systems SP1 32bit / 64bit
  • Windows Server 2003 for Embedded Systems SP1 / SP2 32bit, R2 32bit
  • Windows Server 2008 for Embedded Systems 32bit/64bit, R2 64bit
CPU Same as the minimum system requirements for each OS * For details, please refer to Readme.
Memory Same as the minimum system requirements for each OS * For details, please refer to Readme.
Free HDD space required 300MB 200MB
Display resolution 1024 x 768 or more 640 x 480 or more
Supported languages MUI (English, Japanese) MUI (English, Japanese)

*1 Windows RT, and Windows 8 installed on tablet terminals are not supported. *2 These OS are componentized version of Windows XP Professional. When the OS components are customized by customer, we may not offer support for troubles that occur only in the customized environment and are not replicated on Windows XP Professional. *Contents of system requirements such as supported OS and hard disk capacity are subject to change without notice due to the end of OS support and product improvements by Trend Micro. For the latest information, refer to http://go2.trendmicro.com/geoip/tmps2. *Portable Security 2 does not have the real-time scanning function. *Portable Security 2 cannot be used as a general USB flash drive because it does not have the data storage area for customers. *Portable Security 2 does not scan for malwares on management computers. *A log is created on the local hard disk of the scanning target computer at USB boot scanning. *Windows 2000 can be scanned via USB boot. However, it is not supported if it does not support booting from USB devices, uses EFI/UEFI, has a RAID environment, the HDD is initialized with GPT instead of MBR, or the HDD is connected via SCSI, etc.


By implementing Trend Micro Portable Security™, efficient malware check for off-line systems not connected to the Internet can be achieved.

Here are some customers who achieved efficient malware checking with Trend Micro Portable Security™.  (*Customers of the previous version (TMPS1.x))
 

HORIBA, Ltd.

Business overview
Produce and sell automotive test systems, scientific analyzers, environment/process analyzers, medical analyzers, semiconductor analyzers, etc. By providing analysis/measuring instruments, it contributes to bring change to global problems such as environmental protection, safety, health, and energy problems.

Usage

Pre-shipment inspection


JEOL Ltd.

Business overview
A manufacturer of precision instrument designing, producing, selling, and maintaining electronic analytical equipment such as electronic optical machines and analytical instruments; industrial equipment such as measurement testing equipment, semiconductor-related equipment, and medical devices. With its technical capabilities, it develops and launches various equipment onto the market.

Usage
Malware check at maintenance and support


Kanazawa University Hospital

Business overview
Provide comprehensive medical services, with 31 departments including general internal medicine, surgery, pediatrics, urology, ophthalmology, obstetrics and gynecology, and radiology. It carries out research and teaching activities in collaboration with the University, and works to help produce the next generation of excellent physicians.

Usage

Malware check of off-line terminals


Komatsu Ltd.

Business overview
Produces and sells construction/mining machinery, utilities (small machinery), forestry machinery, and industrial machinery

Usage
Malware check of off-line terminals


NHK Spring Co., Ltd.  

Business overview
Manufactures and sells suspension springs, automotive seats, precision springs, HDD suspensions, HDD mechanism elements, industrial equipment (brazed products, ceramic products, pipe supports, polyurethane products, metal base printed wiring boards, automotive parking systems), and security products.

Usage
Malware check of off-line terminals


NIKKISO CO., LTD.

Business overview
A manufacturer of precision instrument, famous for high technological capabilities. It produces medical devices such as artificial kidneys and artificial pancreases, special pumps for superheat resistant/ultra-precise/cryogenic use, water conditioning systems for thermal/nuclear power plants, high/isotropic pressure press devices, particle analysis instruments. Also, its "Cascade", a product for controlling aircraft thrust reversers, has a high market share.

Usage

Pre-shipment inspection


Nippon COMSYS Corporation

Business overview
Operate businesses such as NTT-related information and telecommunications engineering, telecommunications engineering, and IT solutions

Usage
Malware check of off-line terminals (test PCs for construction site)


Tokai University Hospital

Business overview
Provide cutting-edge medicine as an advanced treatment hospital and as a major hospital in the area by close functional cooperation with neighbor medical facilities. Also, an advanced emergency medical service center is attached, and quickly responds to the top emergency care needs in Kanagawa Prefecture by operating an air ambulance and so forth.

Usage
Malware check of off-line terminals


USHIO INC.

Business overview
Conducts optical application product, industrial machinery and other businesses

Usage
Malware check of off-line terminals in factories (including foreign countries)


Wakayama prefectural office 

Business overview
Population of the prefecture is 999,834 (estimate as of August 1, 2010). Blessed with abundant nature, it boasts being one the leaders in shipping volume for many agricultural products, such as tangerines, plums, and persimmons. Tourism resources with historical value are also abundant, including the Sacred Sites and Pilgrimage Routes in the Kii Mountain Range that were registered as a World Heritage in 2004. Currently, the prefecture office and residents are working together in preparation for the Wakayama National Athletic Meet in 2015.

Usage
Malware check of off-line terminals


YKK Business Support Inc.  

Business overview
Undertakes businesses for YKK group companies in affairs, human resources, accounting, and information systems

Usage
Check before connecting to corporate LAN, recovery at malware infection


Yokogawa Field Engineering Service Corporation  

Business overview
Provides trustworthy maintenance services that support production sites of each industry based on technical capabilities and knowhow, starting with detailed field service that supports efficient operation of instrumentation equipment such as measurement/control equipment set up in factories and plants, electrical instrumentation, semiconductor total service, etc.

Usage
Malware check at maintenance and support


Sociala media

Ta kontakt med oss på