TXOne Networks

Validate Every Entry Point Without Any System Modification

Air-gapped systems cannot accept agents, yet USB devices and contractor equipment continuously introduce threats. TXOne Element delivers agentless inspection with complete offline capability.

USB threats are not just malware. 81.9% of USB activity is file transfers that create exfiltration paths invisible to network security. 25% of top OT incidents are triggered by USB media. TXOne Element delivers entry point validation without system compromise. Agentless inspection leaves no traces. 100% offline operation serves air-gapped requirements. 7,200 files per minute prevents checkpoint bottlenecks that create security workarounds. Protection for systems that cannot tolerate software installation.

THE CHALLENGE

Challenges

Security Inspection Challenges

Industrial environments face unique validation challenges with external devices, media, and air-gapped systems that traditional tools cannot solve.

Supply chain exposures that were previously tolerable are now active targets.

Supply Chain Threats Bypass Network Security

Contractors, vendors, and internal teams carry USB devices that bypass every network security investment. A single infected drive delivers ransomware directly to air-gapped production systems. Supply chain attacks exploit the entry points your security cannot see.

Capabilities

Security Inspection Framework

Protecting air-gapped and isolated environments without system modification

Media Scanning

Pre-screening removable media for threats before they enter production networks

Key Capabilities

USB and portable media scanning
Multi-engine malware detection
Clean room verification
Chain of custody tracking
Features

Agentless Security Validation

TXOne Element provides comprehensive device and media inspection without system modifications, network connectivity, or cybersecurity expertise.

Zero footprint security with no compliance or warranty violations

True Agentless Operation

No software installation required on target devices. Simply plug into any USB port to begin scanning, then unplug and go. Zero files or logs left on scanned systems. Perfect for production systems that cannot tolerate modifications.

No system modifications required
Universal compatibility with legacy systems
No administrator credentials needed
Leave no traces on inspected devices

THE PRODUCTS

Portable Inspector

Portable Inspector

Agentless USB Security Scanner

Plug-and-scan malware detection for standalone and air-gapped systems. No installation required

Agentless USB scanning device for standalone and air-gapped systems. Simply plug into any USB port to scan for malware, collect asset information, and ensure system integrity. No software installation. No system reboot. No trace left behind.

  • No software installation required, runs directly from USB
  • Supports Windows 2000 through Windows 11 plus Linux distributions
  • AES-256 hardware encryption for secure file transfer (Pro Edition)
  • Visual LED indicators for scan status feedback
  • Single device can scan multiple assets
  • Agentless operation leaves no traces on inspected devices

Technical Specifications

Hardware Specifications

Scanning Tool Space (Standard)16 GB
Scanning Tool Space (Pro)64 GB with AES-256
Secure Storage (Pro)64 GB or 1 TB with AES-256
Casing (Standard)Plastic
Casing (Pro)Aluminum
InterfaceUSB 3.0 Type A
Operating Temperature0C to 70C
Relative Humidity20% - 90%
CertificationsCE, FCC, KCC, BSMI, VCCI, RoHS, REACH

Target System Requirements

CPUx86 and x64 architecture supported
MemoryMinimum required by target OS
Free HDD Space200 MB
Display Resolution640 x 480 or higher
LanguagesEnglish, Japanese (MUI)

Windows Support

Windows StandardWindows 2000 SP3/SP4, XP Professional SP1/SP2/SP3, Vista SP1/SP2, 7 SP1, 8, 8.1, 10, 11
Windows ServerServer 2003 R2 through Server 2025, Storage Server 2008/2012/2016
Windows EmbeddedXP Embedded, Embedded Standard 2009/7, POSReady 7/2009, 10/11 Enterprise LTSB/LTSC, 10/11 IoT Enterprise LTSB/LTSC

Linux Support

CentOS5.11 through 10
Debian10, 11, 12
Red Hat Enterprise Linux6, 7, 8, 9
Ubuntu Linux14.04 through 24.04
OtherAlmaLinux, Rocky Linux, Miracle Linux

FIELD PROVEN

Customer Success Story

Carlsberg Group

Thanks to OT security solution Stellar, TXOne Networks helps us mitigate risks that we couldn't address yesterday without making significant financial investments.

Chris Thompson
Director of Brewery OT Security at Carlsberg Group, Carlsberg Group
Edison Group

Today, every change to assets is optimally managed. Machines are eff ectively “locked down,” and no update is applied without prior checks.”

Giampaolo Tacchini
Group CISO & Quality Manager, Edison, Edison Group

NEXT STEP

Secure Your Supply Chain Today

Close the entry point gap that network security cannot reach. Agentless inspection for air-gapped systems, validated equipment, and every USB device that crosses your facility threshold.