Intrinsic's one-of-a-kind technology allows you to define the exact privileges of your application, drastically reducing its attack surface.
Fine-grained security policies enable you to truly apply the principle of least privilege to your applications.
Intrinsic is just a library. Include it, write security policies, and Intrinsic works its magic.
Intrinsic is fully compatible with your legacy code. There's no need to modify pre-existing code.
We don't monkey-patch. We ensure that even actively malicious code can't get around our security policy enforcement.
Intrinsic policies follow a whitelist approach. Only allow your application to do exactly what you want it to do.
Unlike heuristic-based approaches, we strictly enforce policies on your application, so policy violations are 100% accurate.