header
 
C-DAC Logo
 
...

Cyber Security & Forensics

Increased Internet penetration has given exponential rise in sophisticated attacks on Information Technology (IT) infrastructure. Attackers are gaining access to sensitive information like credit card details and other financial information. Smartphone attacks are growing in multiple folds. Also with the growth of 3G services and business transactions using mobile phones, there is a substantial increase in mobile malware. In order to make our IT infrastructure resilient against these threats, there is a need for cutting-edge Research and Development efforts in Cyber Security. C-DAC has been actively pursuing R & D in a number of sub-areas in Cyber Security domain.

Biometrics

C-DAC is working in the field of Biometrics focusing on Fingerprint, Iris, Vascular, Periocular, Handwritten Signature, Voice and Face Recognition. Research efforts are also being made for developing multi-biometric products/solutions (using Fingerprint, Iris, etc. modalities)....

Cyber Forensics

In order to make our IT infrastructure resilient against these threats, there is a need for cutting-edge Research and Development efforts in Cyber Security. C-DAC has been actively pursuing R & D in a number of sub-areas in Cyber Security domain.....

End Point Security

C-DAC developed solutions defending the end point security threats. These solutions span across mitigating threats through USB mass storage devices, data exfiltration, malicious / unknown applications, application behavior, malware and web browser.....

Mobile and Web Security

C-DAC is developing mobile device security solution to provide features like secure storage, application monitoring and control, local and remote secure device backup and restore, Remote Erase/ Lock and Call & SMS Black listing/ White listing, etc.....

SCADA Security

SCADA test bed will be modeled in Defense-In-Depth architecture. Defense-In-Depth architecture strategy includes the use of firewalls, Digital simulator for simulating field devices and RTUs, detection and analysis of threats and vulnerabilities and incident response mechanisms.....

Network Security

Adaptive intrusion detection, dynamic firewall, unified threat management, and network management using behaviour based model. This enables the detection engines to learn new attack patterns by continuously analyzing various events, such as, network traffic, host parameter etc.....

Honeynet Technologies

Honeynet technologies is a security research dedicated to investigating the latest cyber-attacks on networks and developing security tools to improve Internet security. We capture the latest attacks and educating the public about the threats to information systems.....

SOC- as-a-Service

CDAC provides 24x7 Managed Security Services and Managed Detection and Response services to organizations across verticals with a centralized security monitoring system, enabling to detect & respond to any cyber security incident.....