Comparison
TURI vs. Existing Tools
How the AI agent firewall compares to EDR, SAST, prompt guardrails, and macOS Sandbox.
The core difference
Your EDR blocks malicious processes.
TURI knows which ones were AI-initiated.
Modern EDR/XDR platforms block known-bad process chains and correlate threat signals. TURI adds what they can't: agent identity. It classifies whether execution was AI-initiated or human-initiated, and applies different policy based on that distinction.
Capability comparison
Knows the actor is AI
Code-signing identity verification per-process
Blocks runtime actions
Sync AUTH on exec, file open, and network
Correlates multi-step chains
Causal graph with DAG traversal + BFS
Applies different AI vs. human policy
Parent-chain signing-ID classification
Governs MCP tool calls
Classifies MCP runtimes by process lineage
Supply chain install gate
AUTH_EXEC intercept + postinstall evaluation
Behavioral detection rules
25 production rules across 6 tiers, IR-compiled
macOS native (no KEXT)
ES + NE + DNS Proxy system extensions
Real-time classification

253 agents classified in real time — AI Agents, Execution Engines, Developer Environments, Interaction Surfaces, Utility Tooling
How TURI sees execution
What EDR sees
node ← normal processopen ~/.aws/credentials ← allowedconnect api.evil.io:443 ← allowedSame policy whether human or AI spawned this process.
No agent context. No causal chain.
What TURI sees
Cursor → node mcp-server.js agent: aiClientopen ~/.aws/credentials → readSensitiveFileconnect api.evil.io:443 → networkConnectExternalCausal graph detected: AI agent read credentials → connected external. Quarantine + VerdictCache flush.
Enforcement flow
Cursor spawns
node mcp-server.jsTURI classifies
agent: aiClient → mcpRuntimenode reads
~/.aws/credentialsnode curls
external-api.ioTURI verdict
QUARANTINE — secret→egress chainFits your stack
EDR co-existence
Apple's multi-client ES API. Runs alongside CrowdStrike, SentinelOne, Defender.
SIEM output
Splunk HEC, Datadog API, syslog. Native integration, not just webhooks.
MDM deployment
PKG + config profiles. Jamf, Kandji, Mosyle — standard fleet tools.
MITRE ATT&CK
Every behavioral rule maps to ATT&CK technique IDs.
Honest gaps
macOS only
TURI uses Apple's ES + NE APIs. Windows and Linux are on the roadmap but not shipped.
Behavioral detection is async
Sync enforcement blocks the first gate. Behavioral rules catch the next action in the chain, not always the first.
Early stage
TURI is in active development with design partners. Enterprise features are shipping, not all GA.
Want to see the proof?
Running AI agents on Mac at scale? We'll tune policy with you.
Design partners →