Skip to content

Trend Micro Portable Security 2

A malware scanning and cleanup tool shaped like a USB flash drive in environments that Internet connection is not available or anti-malware software cannot be installed

 

 

READ DATASHEET


No Internet connection does not mean safe and secure.

The source of malware infections is often thought to be the Internet or mail. These really are the main infection routes, so proper security measures are taken for systems connected to the Internet.

In contrast, standalone PC/closed systems are, in many cases, believed to be safe and secure because they are not connected to external systems.

However, they are in fact exposed to malware infections from USB flash drives and PCs brought in from the outside.

PCs of standalone/closed systems also have malware infection risks.

 

Features of Trend Micro Portable Security 2™ (TMPS2)

Trend Micro USB Security 2™ scans and removes malware with a scanning tool shaped like a USB flash drive.

In a variety of systems with installed USB interfaces, it can scan and remove malware easily.

Systems previously unavailable to take measures against malware because they were not connected to the Internet, or anti-malware software could not be installed (*1) are enabled to scan and remove malware with the latest malware pattern file (*2).

The features of TMPS2 are as follows:

The management program provides the centralized management function. This enables the comprehension of scan logs of the scanning tools in multiple locations in an integrated fashion.

Also, malware pattern files and configurations of the scanning tools can be centrally managed.

Moreover, the event log of the lockdown security software "Trend Micro Safe Lock (separately charged)" can be obtained with the management program of TMPS2.

 Figure-tmps2-overview04b-20140124

Scan status and result notification with LED
The LED equipped on the scanning tool notifies of the scan status and result with three stages.

Since the person in charge does not have to meticulously check the scan status using the target terminal screen, it does not interfere with operational efficiency.

  • Red: Malware scan completed Detected and waiting for operator’s action
  • Yellow: Malware scan completed Detected and cleaned
  • Blue: Malware scan completed Malware not detected

Using only the scanning tool, malwares can be scanned and removed, and the malware pattern file can be updated.
Updating the malware pattern files and viewing the logs are available using any general-purpose PC connected to the Internet and the scanning tool by selecting a mode that does not use the management program unlike conventional products that require management computers.

Security measures are easily enabled even when management computers cannot be prepared separately.

By loading scanning software onto a scanning tool shaped like a USB flash drive, malware scanning and removal are enabled without installing the scanning software on the target terminal (*1).

 

*1 When scanning for malware, drivers are created on the target terminal and files on the local HDD temporarily. After the scan, the drivers and files do not remain on the target terminal. (A log is created on the local hard disk of the target terminal at USB boot scanning)
*2 TMPS2 checks for malware with the latest pattern files at the time of updating by the management computer/scanning tool.
* TMPS2 does not scan for malware on management computers.


Functions of Trend Micro Portable Security 2™ (TMPS2)

Open all

Management program

Scanning tool


How to utilize Trend Micro Portable Security 2™ (TMPS2)

Open all

Use 1: Regular checking of standalone PC/ closed systems

Use 2: Checking before corporate LAN connection

Use 3: Restoration at time of malware infection

Use 4: Check before product shipment

Use 5: Check at maintenance service


How to operate Trend Micro Portable Security 2™

Trend Micro Portable Security 2 (TMPS2) has two operation methods: Centralized management type operation (centralized management mode) that is operated under management program, and scanning tool standalone operation (standalone mode) that is operated without a management program.

With a management program, the administrator can perform things such as malware scanning configuration and scanning log aggregation to scanning tools in remote branches, production and maintenance sites.

When a management program is not used, unlike conventional products that require management computers, updating of malware pattern files and viewing of the log are available using any general-purpose PC connected to the Internet and the scanning tool. Security measures can be easily implemented even when management computers cannot be prepared separately.

Operation method 1: Centralized management type operation (centralized management mode)

Suitable for the following demands:

  • Want to aggregate and check logs in the headquarters (head office), as TMPS2 is operated in multiple locations
  • Want to unify scanning configurations in multiple locations
  • Want to apply the same malware pattern file in multiple locations

Operation image

Operation method 2: Scanning tool standalone operation (standalone mode)

Suitable for the following demands:

  • • Want to use mainly scanning and removal
  • • Want to use without preparing a management computer
  • • No need to manage scanning configurations centrally

Operation image


System requirements for Trend Micro Portable Security 2 (TMPS2)

Management program Scanning tool
  • Windows XP Professional SP1 / SP2 / SP3 32bit
  • Windows Vista Business / Enterprise / Ultimate SP1 / SP2 32/64bit
  • Windows 7 Professional / Enterprise / Ultimate SP1 32/64bit
  • Windows 7 Home Basic / Home Premium SP1 64bit
  • Windows 8 Pro / Enterprise 32/64bit *1
  • Windows Server 2003 Standard / Enterprise SP2 / R2 SP2 32/64bit
  • Windows Server 2008 Standard / Enterprise SP2 32/64bit
  • Windows Server 2008 Standard / Enterprise R2 SP1 64bit
  • Windows Server 2012 Standard 64bit
 
 
 
OS
  • Windows XP Professional SP1 / SP2 / SP3 64bit
  • Windows XP Embedded SP1 / SP2 / SP3 32bit *2
  • Windows Embedded Standard 2009 32bit *2
  • Windows Embedded Standard 7 32bit/64bit
  • Windows Embedded POSReady 2009 32bit
  • Windows Embedded POSReady 7 32bit
  • Windows XP Professional for Embedded Systems SP1 / SP2 / SP3 32bit
  • Windows Vista for Embedded Systems SP1 / SP2 32bit
  • Windows 7 for Embedded Systems SP1 32bit / 64bit
  • Windows Server 2003 for Embedded Systems SP1 / SP2 32bit, R2 32bit
  • Windows Server 2008 for Embedded Systems 32bit/64bit, R2 64bit
CPU Same as the minimum system requirements for each OS * For details, please refer to Readme.
Memory Same as the minimum system requirements for each OS * For details, please refer to Readme.
Free HDD space required 300MB 200MB
Display resolution 1024 x 768 or more 640 x 480 or more
Supported languages MUI (English, Japanese) MUI (English, Japanese)

*1 Windows RT, and Windows 8 installed on tablet terminals are not supported. *2 These OS are componentized version of Windows XP Professional. When the OS components are customized by customer, we may not offer support for troubles that occur only in the customized environment and are not replicated on Windows XP Professional. * Contents of system requirements such as supported OS and hard disk capacity are subject to change without notice due to the end of OS support and product improvements by Trend Micro. For the latest information, refer to http://go2.trendmicro.com/geoip/tmps2. * TMPS2 does not have the real-time scanning function. * TMPS2 cannot be used as a general USB flash drive because it does not have the data storage area for customers. * TMPS2 does not scan for malwares on management computers. * A log is created on the local hard disk of the scanning target computer at USB boot scanning. * Windows 2000 can be scanned via USB boot. However, it is not supported if it does not support booting from USB devices, uses EFI/UEFI, has a RAID environment, the HDD is initialized with GPT instead of MBR, or the HDD is connected via SCSI, etc.


By implementing Trend Micro Portable Security™, efficient malware check for off-line systems not connected to the Internet can be achieved.

Here are some customers who achieved efficient malware checking with Trend Micro Portable Security™. (*Customers of the previous version (TMPS1.x))

 

 Customers (alphabetical order)

USHIO INC.

Business overview
Conducts optical application product, industrial machinery and other businesses

Usage
Malware check of off-line terminals in factories (including foreign countries)


Img-logo-kanazawa-hospital-20140108

Kanazawa University Hospital

 

Business overview
Provide comprehensive medical services, with 31 departments including general internal medicine, surgery, pediatrics, urology, ophthalmology, obstetrics and gynecology, and radiology.
It carries out research and teaching activities in collaboration with the University, and works to help produce the next generation of excellent physicians.

Usage
Malware check of off-line terminals


Komatsu Ltd.

Business overview
Produces and sells construction/mining machinery, utilities (small machinery), forestry machinery, and industrial machinery

Usage
Malware check of off-line terminals


 

HORIBA, Ltd.

Business overview
Produce and sell automotive test systems, scientific analyzers, environment/process analyzers, medical analyzers, semiconductor analyzers, etc.
By providing analysis/measuring instruments, it contributes to bring change to global problems such as environmental protection, safety, health, and energy problems.

Usage
Pre-shipment inspection


Tokai University Hospital

Business overview
Provide cutting-edge medicine as an advanced treatment hospital and as a major hospital in the area by close functional cooperation with neighbor medical facilities.
Also, an advanced emergency medical service center is attached, and quickly responds to the top emergency care needs in Kanagawa Prefecture by operating an air ambulance and so forth.

Usage
Malware check of off-line terminals


NIKKISO CO., LTD.

Business overview
A manufacturer of precision instrument, famous for high technological capabilities. It produces medical devices such as artificial kidneys and artificial pancreases, special pumps for superheat resistant/ultra-precise/cryogenic use, water conditioning systems for thermal/nuclear power plants, high/isotropic pressure press devices, particle analysis instruments.
Also, its "Cascade", a product for controlling aircraft thrust reversers, has a high market share.

Usage
Pre-shipment inspection


日本コムシス株式会社様

Nippon COMSYS Corporation

Business overview
Operate businesses such as NTT-related information and telecommunications engineering, telecommunications engineering, and IT solutions

Usage
Malware check of off-line terminals (test PCs for construction site)


JEOL Ltd.

Business overview
A manufacturer of precision instrument designing, producing, selling, and maintaining electronic analytical equipment such as electronic optical machines and analytical instruments; industrial equipment such as measurement testing equipment, semiconductor-related equipment, and medical devices.
With its technical capabilities, it develops and launches various equipment onto the market.

Usage
Malware check at maintenance and support


NHK Spring Co., Ltd.

 

Business overview
Manufactures and sells suspension springs, automotive seats, precision springs, HDD suspensions, HDD mechanism elements, industrial equipment (brazed products, ceramic products, pipe supports, polyurethane products, metal base printed wiring boards, automotive parking systems), and security products.

Usage
Malware check of off-line terminals


Yokogawa Field Engineering Service Corporation

Business overview
Provides trustworthy maintenance services that support production sites of each industry based on technical capabilities and knowhow, starting with detailed field service that supports efficient operation of instrumentation equipment such as measurement/control equipment set up in factories and plants, electrical instrumentation, semiconductor total service, etc.

Usage
Malware check at maintenance and support


YKK Business Support Inc.

Business overview
Undertakes businesses for YKK group companies in affairs, human resources, accounting, and information systems

Usage
Check before connecting to corporate LAN, recovery at malware infection


Wakayama prefectural office

Business overview
Population of the prefecture is 999,834 (estimate as of August 1, 2010). Blessed with abundant nature, it boasts being one the leaders in shipping volume for many agricultural products, such as tangerines, plums, and persimmons.
Tourism resources with historical value are also abundant, including the Sacred Sites and Pilgrimage Routes in the Kii Mountain Range that were registered as a World Heritage in 2004.
Currently, the prefecture office and residents are working together in preparation for the Wakayama National Athletic Meet in 2015.

Usage
Malware check of off-line terminals


Connect with us on