Trust-based security solution goes beyond ‘traditional’ Application Control and Whitelisting