CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.
CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.
Rating
3.8 / 5.0
Pricing
Contact vendor
Deployment
SaaS / Cloud
Category
Security Operations
Product Description
CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.
CHERI significantly improves system security by extending conventional hardware Instruction-Set Architectures (ISAs) with new features to enable fine-grained memory protection and highly scalable software compartmentalization. Instead of repeatedly patching newly discovered problems, CHERI adopts a preventive approach, making buffer overflows and other attack using memory misuse simply impossible.
CHERI provides the security reassurance end customers and even the most sensitive applications require. Supported to date by DARPA, UKRI, Google, Microsoft and Arm, CHERI is a major asset in the fight against cybercrime.
Contact Vendor
Interested in CHERI Alliance? Get in touch with the vendor.
arrow_upwardPOPULAR
ICT Misr
ICT Misr is a technology consulting and system integration firm based in Egypt. It provides IT services and solutions across hardware infrastructure, cloud and virtualization, business continuity, sec
Abilene Advisors Supplier Shield
Abilene Advisors Supplier Shield on SecurityListing: End-to-end TPRM platform with advisory, managed services, and cloud tools
Analyst1 Orchestrated Threat Intelligence Platform
Analyst1 Orchestrated Threat Intelligence Platform on SecurityListing: Orchestrated threat intelligence platform for CTI and SOC teams
IGRC Square
IGRC Square provides cybersecurity solutions for organizations, focusing on governance, risk management, and compliance to safeguard data, devices, and employees. The company emphasizes state-of-the-a