BEIJING – July 15, 2025 – AIStorm has released a version update for TrustOne, its next-generation endpoint security platform. This release redefines the standard for unified endpoint security by integrating advanced threat protection with streamlined management to eliminate the core pain points of social engineering and operational fragmentation.
A Unified Shield: Full-Link Defense Against Social Engineering
While enterprises have widely deployed EDR solutions, endpoint security operations remain trapped in three major dilemmas: high labor costs due to reliance on professional analysis of EDR logs; a vicious cycle of resource consumption caused by alert fatigue and high hardware requirements; and the inability of traditional EDR to block attacks in real-time, leaving attackers enough time to steal sensitive data.
To address these pain points, TrustOne 9.0 introduces a social engineering control function focusing on critical entry points—including IM, email attachments, and browser downloads—which account for over 71% of endpoint intrusions. Through real-time monitoring and threat detection, it achieves real-time autonomous blocking of malicious programs. This feature is as simple to operate as antivirus software, significantly lowering the barrier to entry for enterprises.
To balance protection efficiency and business continuity, TrustOne 9.0 features three innovative operational modes:
- Adaptive Learning Mode: Automatically learns and catalogs all executable programs within the system. It identifies files that trigger abnormal rules and provides multi-dimensional information (such as virus judgment and file signatures) to help administrators whitelist business programs in advance, effectively reducing false positives.
- Blocking Mode: Achieves second-level response at the client side by tracking the attack chain. It labels files from social engineering entries, monitors the decompression process, and detects abnormal behavior during execution to implement immediate blocking.
- Download Control Mode: Designed for high-security scenarios like red-team exercises, it cuts off attack vectors at the source by blocking file downloads from social engineering channels (e.g., prohibiting the download of compressed packages from email attachments).
Realizing "The Power of One": Redefining Unified Endpoint Management
Traditional integrated endpoint management often suffers from fragmented operations, where switching between multiple modules requires multiple console logins and server deployments consume excessive resources. TrustOne 9.0 breaks through these obstacles by deeply integrating atomic capabilities such as desktop management, network access control (NAC), and Data Loss Prevention (DLP). This integration realizes "The Power of One"—one management console, one agent, and one installation package.
Four-Layer Unity: Redefining Endpoint Management:
- Unified Console: Network access and desktop management menus are fully integrated into the TrustOne console, eliminating the need for system switching and authentication fatigue.
- Unified Server: Multiple modules that previously required separate servers can now be hosted on a single server, significantly reducing hardware investment.
- Unified Client: Provides a clean and unified terminal user interface, eliminating the chaos of multiple tray icons and shortcuts.
- Unified Installation Package: A single installation and upgrade package simplifies deployment processes and reduces maintenance costs.
The release of TrustOne 9.0 provides an easy-to-use and reliable endpoint security solution by solving the core pain points of social engineering protection and management fragmentation. With its core advantages of "Minimalist Operation, Efficient Protection, and Resource Optimization," TrustOne 9.0 assists enterprises in strengthening their endpoint security defenses within complex threat environments.