- Business
- Products
- Industrial Endpoint Security
-
- Portable Security 3
- TXOne StellarEnforce
- TXOne Stellar
Protect your ICS environments with industrial-grade system lockdown security
Streamlined trust listing
With trust listing only pre-registered applications and services can run, so that mission-critical systems are protected from malware with minimal impact on performance. Unlike traditional cybersecurity software, StellarEnforce requires no internet connection, no periodic updates, and no regular malware scans.
4-in-1 lockdown confirmation
TXOne StellarEnforce™ secures operational integrity with 4-in-1 lockdown confirmation: operation lockdown, USB device lockdown, data lockdown, and configuration lockdown, efficiently reducing the chance of downtime and cost of resilience.
Legacy assets protection
Because StellarEnforce requires no regular updates and supports a variety of Microsoft operating systems past their end-of-service date (Windows 2000, Windows XP, and more), it doesn’t affect operating performance.
TXOne StellarEnforce System Requirements
OS | Client OS | Server OS |
---|---|---|
Windows 2000 (SP4) [Professional] (32bit) | Windows 2000 Server (SP4) (32bit) | |
Windows XP (SP1/SP2/SP3) [Professional] (32bit) | Windows Server 2003 (SP1/SP2) [Standard / Enterprise / Storage] (32bit) | |
Windows Vista (No SP/SP1/SP2) [Business / Enterprise / Ultimate] (32bit) | Windows Server 2003 R2 (No SP/SP2) [Standard / Enterprise / Storage] (32bit) | |
Windows 7 (No SP/SP1) [Professional / Enterprise / Ultimate] (32/64bit) | Windows Server 2008 (SP1/SP2) [Standard / Enterprise / Storage] (32/64bit) | |
Windows 8 (No SP) [Pro/Enterprise] (32/64bit) | Windows Server 2008 R2 (No SP/SP1) [Standard / Enterprise / Storage] (64bit) | |
Windows 8.1 (No SP) [Pro/Enterprise/with Bing] (32/64bit) | Windows Server 2012 (No SP) [Essentials/Standard] (64bit) | |
Windows 10 (RS1/RS2/RS3/RS4/RS5) [Pro/Enterprise/IoT Enterprise] (32/64bit) | Windows Server 2012 R2 (No SP) [Essentials/Standard] (64bit) | |
Windows XP Embedded (SP1/SP2) (32bit) | Windows Server 2003 for Embedded Systems (SP1/SP2) (32bit) | |
Windows Embedded Standard 2009 (No SP) (32bit) Windows Embedded Standard 7 (No SP/SP1) (32/64bit) | Windows Server 2003 R2 for Embedded Systems (No SP/SP2) (32bit) | |
Windows Embedded 8 Standard (No SP) (32/64bit) Windows Embedded 8.1 [Pro/Industry Pro](No SP) (32/64bit) | Windows Server 2008 for Embedded Systems (SP1/SP2) (32/64bit) | |
Windows XP Professional for Embedded Systems (SP1/SP2/SP3) (32bit) | Windows Server 2008 R2 for Embedded Systems (No SP/SP1) (64bit) | |
Windows Vista for Embedded Systems (No SP/SP1/SP2) (32bit) | Windows Server 2012 for Embedded Systems (No SP) (64bit) | |
Windows 7 for Embedded Systems (No SP/SP1) (32/64bit) | Windows Server 2012 R2 for Embedded Systems (No SP) (64bit) | |
Windows Embedded POSReady (32bit) | Windows Server 2016 (No SP) [Standard] (64bit) | |
Windows Embedded POSReady 2009 (32bit) | Windows Storage Server 2016 (64bit) | |
Windows Embedded POSReady 7 (32/64bit) | ||
CPU | Conforms with minimum OS system requirements | |
Memory | Conforms with minimum OS system requirements | |
Free Disk Space | 350 MB or more | |
Display Resolution | VGA (640x480) or more, 16 colors or more |
TXOne StellarOneTM Virtual Appliance
(Recommend)
Maximum number of Agents | 30,000 | 20,000 | 15,000 | 10,000 | 5,000 | 1000 | 500 |
vCore | 12 Core | 8 Core | 8 Core | 8 Core | 8 Core | 8 / 4 Core | 4 Core |
Memory | 24 GB | 16 GB | 16 GB | 16 GB | 16 GB | 16 GB | 16 GB |
1st HDD size |
25 GB | ||||||
2st HDD Size (Recommend) | 100 GB | 100 GB | 50 GB | 50 GB | 50 GB | 50 GB | 50 GB |
Optimize operational efficiency
With its core lockdown technology, which limits the execution of applications using a trust list instead of pattern files, StellarEnforce is designed to optimize operational efficiency for mass deployment and maintenance in large factories.
Its entire trust list policy is managed from the central management console, StellarOne, granting security operations centers greater insight into OT endpoint security posture.
Achieve optimal security
All files that are allowed to execute on the terminal are automatically collected and registered in the trust list after installation, allowing stakeholders additional peace of mind with their security posture. The list is updated automatically for runtime operations during maintenance.
Safeguard long-term asset investments
While most antivirus software no longer supports legacy operating systems, they are often crucial to running customized ICS applications in work site environments. StellarEnforce trust list-based technology prevents malware from functioning on fixed-use legacy systems by enforcing a strict list of approved programs.
Explore more TXOne products
Get started with TXOne StellarEnforce