C-DAC Logo
 
...

Cyber Security & Forensics

Increased Internet penetration has given exponential rise in sophisticated attacks on Information Technology (IT) infrastructure. Attackers are gaining access to sensitive information like credit card details and other financial information. Smartphone attacks are growing in multiple folds. Also with the growth of 3G services and business transactions using mobile phones, there is a substantial increase in mobile malware. In order to make our IT infrastructure resilient against these threats, there is a need for cutting-edge Research and Development efforts in Cyber Security. C-DAC has been actively pursuing R & D in a number of sub-areas in Cyber Security domain.

Biometrics

C-DAC is working in the field of Biometrics focusing on Fingerprint, Iris, Vascular, Periocular, Handwritten Signature, Voice and Face Recognition. Research efforts are also being made for developing multi-biometric products/solutions (using Fingerprint, Iris, etc. modalities)...

Cyber Forensics

In order to make our IT infrastructure resilient against these threats, there is a need for cutting-edge Research and Development efforts in Cyber Security. C-DAC has been actively pursuing R & D in a number of sub-areas in Cyber Security domain.....

End Point Security

C-DAC developed solutions defending the end point security threats. These solutions span across mitigating threats through USB mass storage devices, data exfiltration, malicious / unknown applications, application behavior, malware and web browser...

Mobile and Web Security

C-DAC is developing mobile device security solution to provide features like secure storage, application monitoring and control, local and remote secure device backup and restore, Remote Erase/ Lock and Call & SMS Black listing/ White listing, etc...

Critical Infrastructure Security

C-DAC's SCADA security testbed follows a Live, Virtual and Constructive (LVC) technology model with real, simulated and emulated SCADA network components. Provides simulation environment for various SCADA attacks with operational dashboard for analysis, retention of events data and web-based administration. Asset Management Tool and Security Operations Center for OT uses the testbed for real-time risk assessment and alerting

Network Security

Adaptive intrusion detection, dynamic firewall, unified threat management, and network management using behaviour based model. This enables the detection engines to learn new attack patterns by continuously analyzing various events, such as, network traffic, host parameter etc...

Honeynet Technologies

Honeynet technologies is a security research dedicated to investigating the latest cyber-attacks on networks and developing security tools to improve Internet security. We capture the latest attacks and educating the public about the threats to information systems...

SOC- as-a-Service

CDAC provides 24x7 Managed Security Services and Managed Detection and Response services to organizations across verticals with a centralized security monitoring system, enabling to detect & respond to any cyber security incident...

CDACSIEM

A comprehensive security solution having a data aggregator which gathers immense amounts of log data from the entire networked environment, normalizes and applies analytics, as well as provides complete visibility of security to the SOC analyst. It is a centralized solution that enables detection and allows for investigation while providing insight visibility....

Top