The company was renamed Trusing.
The translation offers an explanation of their HIPS software:
The difference between iDefender and other HIPS software
People often ask, what is the difference between iDefender and other HIPS software, and why choose iDefender instead of other security software.
iDefender breaks the traditional object-based operation protection model (such as file addition, deletion, modification, reading and other operation defense), adopts an innovative rule model based on scenario mode (such as prohibiting process startup, document protection, privacy protection), and designs. The rules engine based on templates + parameters greatly reduces the difficulty of editing defense rules. It also provides a rules market, making the sharing and acquisition of rules within easy reach.
In terms of performance, the iDefender rule engine adopts double cache mode, which improves the matching efficiency to the extreme. There is almost no performance consumption on the system without setting the rules incorrectly. There will be no memory growth or cumulative performance consumption during long-term operation. It is not only suitable for personal computers, but also for cloud servers.
iDefender completely uses the standard kernel API recommended by Microsoft to implement its functions. It has good compatibility and can coexist well with other security software.