TXOne Networks | Portable Inspector

An Agentless Malware-Free Solution for Risk Assessment and Asset Management

Manufacturer: TXOne Networks
Manufacturer: TXOne Networks
  • Portable antivirus dedicated to OT environments.
  • Agentless operation (does not require installation or device restart).
  • Support for older operating system versions (Windows 7, Windows XP).
  • Support for Linux.
  • LED indicator signaling upon detection of malicious software.
  • Encrypted file storage for secure file transfer (PRO version).
  • Centralized management through ElementOne (paid) or Management Platform (free).
Product out of stock

Free shipping from €300

Promocja cenowa na model HDR-15-5

Useful products


Identify All the Blind Spots in Your IT/OT Assets

TXOne Portable Inspector provides effective malware scanning and removal for standalone computers and air-gapped systems. This portable tool can be plugged into the USB port of any Windows or Linux device to detect and eliminate malware without the need to install software or reboot the target system.

In addition, the Portable Inspector collects asset information to generate an inventory list that grants IT/OT visibility and eliminates shadow IT/OT. It then scans all files with a built-in anti-malware engine and encrypts them on the spot using its AES-256 encryption engine before placing them into secure, malware-free storage.

The Portable Inspector is easy to implement and helps customers quickly adopt a cybersecurity solution that can keep the operation running.

Technical Specification

Portable Inspector
(Scanning Tool)

Portable Inspector Pro
(Scanning Tool + Secure Storage)

Scanning Tool Space 16 GB *1 64 GB *2
Secure Storage N/A 64 GB with AES-256 hardware encryption
Casing Material Plastic Aluminum
Casing Interface USB 3.0 Type A
Hardware Warranty 5 years
Operating Temperature 0°C to 70°C
Relative Humidity 20 % ~ 90%
Standard Certification CE, FCC, KCC, BSMI, VCCI, RoHS and REACH
CPU Same as the minimum system requirements for each OS
Memory Same as the minimum system requirements for each OS
Free HDD Space Required 200MB
Display Resolution 640 x 480 or more
Supported Languages MUI (English, Japanese)


Management Program System Requirements

CPU Same as the minimum system requirements for each OS
Memory Same as the minimum system requirements for each OS
Free HDD Space Required TXOne recommends setting aside a minimum of 3.5 GB of disk space on the Management Program endpoint
  • 2.5 GB for the Management Program
  • 1 GB for log files
Display Resolution 640 x 480 or more
Supported Languages MUI (English, Japanese)
CPU Same as the minimum system requirements for each OS

The system requirements for Portable Inspector are as follows.

Operation System Scanning Tool Secure Storage Scanning Tool Agent Management Program
Windows 2000 SP3 / SP4 (32-bit) *1      
Windows XP Professional SP1 / SP2 / SP3 (32/64-bit) *2 *3  
Windows Vista Business / Enterprise / Ultimate SP1 / SP2 (32/64-bit)  
Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate SP1 (32/64-bit)
Windows 8 Pro / Enterprise (32/64-bit) *4
Windows 8.1 Pro / Enterprise (32/64-bit) *4
Windows 10 Home (32/64-bit)  
Windows 10 Pro / Enterprise (32/64-bit)
Windows 11 Home (64-bit)  
Windows 11 Pro / Enterprise (64-bit)
Windows 2000 Server SP3/SP4 *1      
Windows Server 2003 Standard / Enterprise R2 (32/64-bit) *2 *5  
Windows Server 2008 Standard / Enterprise R2 (64-bit), R2 SP1 (64-bit) *5
Windows Server 2012 Standard / Datacenter / Foundation / Essentials (64-bit), R2 (64-bit)*5
Windows Server 2016 Standard / Essentials (64-bit) *5
Windows Server 2019 Standard / Essentials (64-bit) *5
Windows Server 2022 Standard / Essentials (64-bit) *5
Windows Embedded
Windows XP Embedded SP1 / SP2 / SP3 (32-bit) *2 *6  
Windows XP Embedded SP1 / SP2 / SP3 (32-bit) *6  
Windows Embedded Standard 7 (32/64-bit)  
Windows Embedded POSReady 2009 (32-bit)  
Windows Embedded POSReady 7 (32-bit)  
Windows XP Professional for Embedded Systems SP1 / SP2 / SP3 (32-bit) *2 *6  
Windows Vista for Embedded Systems SP1 / SP2 (32-bit)  
Windows 7 for Embedded Systems SP1 (32/64-bit)  
Windows 8 Standard for Embedded Systems (32/64-bit)  
Windows 8.1 Pro / Industry for Embedded Systems (32/64-bit)  
Windows 10 IoT Enterprise (32/64-bit)  
Windows 11 IoT Enterprise (64-bit)  
Windows Server 2003 for Embedded Systems SP1 / SP2 (32-bit), R2 (32-bit) *2 *5  
Windows Server 2008 for Embedded Systems (32/64-bit), R2 (64-bit) *5  
Windows Server 2012 for Embedded Systems (32/64-bit), R2 (64-bit) *5  
CentOS 6 (32/64-bit)      
CentOS 7 (32/64-bit)      
CentOS 8 (32/64-bit)      
Red Hat Enterprise Linux 6 (32/64-bit)      
Red Hat Enterprise Linux 7 (32/64-bit)      
Red Hat Enterprise Linux 8 (32/64-bit)      
Ubuntu Linux 14.04 to 20.10 (32/64-bit)      
*1 : Only supports functions that are related to Virus Scan & Asset Information Collection on Windows 2000 SP3/SP4 and Windows Server and Windows Server. For more information about Windows 2000 support, please see Legal Disclaimer.

*2 : On Windows XP or Windows 2003 servers, only Administrator accounts are allowed to access the Secure Storage drive (PI SEC). However, logging in with a Standard account and running Secure Storage as an Administrator account gives the user interface different privileges within Windows File Explorer. This makes the "dragging" action unavailable in Windows.
Here are several options for solving this problem:


  • Log out then log in again using an Administrator account to launch Secure Storage.
  • Run Secure Storage and File Explorer as the same Administrator account with corresponding settings.
  • Install a Scanning Tool Agent.

*3 : Windows XP with no service pack is not supported.

*4 : Windows 8 and Windows 8.1 installed on tablet terminals are not supported. Windows RT 8 and Windows RT 8.1 are not supported.

*5 : On some versions of Windows, right-click SecureStorage.exe and select ‘Run as Administrator’ to start it – this is because administrator privileges are required for file exchange. This restriction is based on the fact that the secure file transfer technology used by Secure Storage must align with the operating system's allowance for USB usage control.

*6 : These OS are componentized version of Windows XP Professional. When the OS components are customized by the customer, we may nbe unable to offer support.