The only commercial implementation of CHERI technology
Is your product secure enough? By using our CHERI-enabled processor core you can prevent up to 70% of potential attacks. And, we have done most of the work. We have added built-in, fine-grained memory protection by extending the RISC-V ISA with CHERI-based custom instructions.
You can get access to a full software environment to take advantage of CHERI technology. You could even enhance the security of your existing products with a small effort, often through a simple code recompilation.
It’s time to improve the security of your next design.
Reach out to us and we will contact you within 48 hours to learn more about your requirements.