Welcome To Treacle Technologies
Who are we?
Treacle is a cybersecurity startup that was born out of the IHub program at FIRST, IIT Kanpur. Our prime focus is Defensive Security, ensuring that businesses stay safe in a constantly evolving digital world.

Our standout product is the AI-Based Proactive Defense System with in-built Deception. This service is designed to protect businesses even if their firewalls and defense layers have been breached. It works by tracking and analyzing attacker behavior in the early stages, then luring the attacker into a complex, containerized mirage network. This strategy keeps other systems safe and allows us to gather important data about the threat. This data is used to provide early warnings to SOC analysts, helping to prevent an attack before it takes place. The strategy we use is inspired by real-world warfare techniques, making it a crucial tool for organizations aiming to safeguard their critical networks.

We also provide a range of other services, including Customized Honeypot Solutions, Network and Host-Based Intrusion Detection Systems, Insider Threat Detection Systems, and OT Network Security Systems. Plus, we can conduct thorough Cyber Security Audits and help design effective security policies.

Our team at Treacle is composed of passionate professionals and experienced technical advisors who are committed to developing new and innovative cybersecurity solutions. With Treacle, you can be confident that your digital security is in good hands.
Our Aim:
Our mission is to bolster the nation's cybersecurity infrastructure, serving both private and government organizations. We aim to secure their network infrastructures through the deployment of solutions underpinned by rigorous and robust research.
High-Quality Service
Our unwavering commitment is centered on delivering exceptional service quality, which we consider as the most vital aspect in serving our clients.
Effective Protection
With our avant-garde cybersecurity solutions safeguarding your IT/OT network, you can be assured of comprehensive protection. In the unlikely event of an incident, our response will be both immediate and efficient, serving as the first line of defense to secure your systems effectively.
Why choose us?
Choosing Treacle as your cybersecurity partner comes with several advantages.

Firstly, incubated at FIRST, IIT Kanpur, one of India's leading technical institutes, Treacle has harnessed extensive expertise in the field of cybersecurity. The wealth of experience our team and top-tier advisors bring to the table ensures our services are not just competent, but at the forefront of cybersecurity innovation.

Our standout offering is the AI-Based Proactive Defense System with in-built Deception, a testament to our innovative approach. Borrowing principles from real-world warfare, we have designed a dynamic defense system capable of isolating and neutralizing threats even after traditional defense layers have been compromised.

In addition to our flagship product, Treacle offers a comprehensive suite of cybersecurity services. From Customized Honeypot Solutions and Intrusion Detection Systems to Cyber Security Audits and Policy Designs, we cater to all aspects of cybersecurity under one roof.

What sets our services apart is the robust research that forms the foundation of all our solutions. At Treacle, we believe in the power of knowledge and its practical application to bolster security measures.

We also understand that each organization has unique security requirements. Hence, we adopt a tailored approach, crafting bespoke solutions that align with your specific needs and objectives.

Our commitment extends beyond individual organizations to the wider landscape of national cybersecurity. By choosing Treacle, you are not only fortifying your organization's defenses but also contributing to the strengthening of our nation's digital infrastructure.

Lastly, our systems are designed with a focus on proactive protection. They provide early warnings, facilitating prompt responses that can prevent cyber threats before they manifest into significant damage.

With Treacle, you are not simply choosing a service provider, but a dedicated partner in securing your organization's digital safety and integrity.

The security of our client's assets is our utmost priority, a responsibility we deeply respect as it stems from the trust they bestow upon us. By synergizing human and machine intelligence, our innovative systems streamline the task of ensuring robust protection. These pioneering solutions simplify our efforts while amplifying the security we provide, reinforcing the faith our clients place in us.
Products & Services
AI-Based Proactive Defense System with in-built Deception

Treacle is proud to introduce its innovative product, MUTACON Blackbox. Designed to enhance cybersecurity, MUTACON Blackbox is a cutting-edge solution that utilizes machine learning and artificial intelligence to identify and thwart cyber threats. By creating realistic decoys and lures, MUTACON Blackbox provides a proactive approach to cybersecurity, allowing organizations to stay one step ahead of potential attackers. With its advanced capabilities, it is an essential tool for any organization looking to protect their critical assets and data from cyber threats. It introduces the concept of cyber mines in the network, just like land mines are used by Armed Forces to trap and detect attackers, Treacle's indigenious and flagship product MUTACON Blackbox uses dynamic cyber mines to trap and detect attackers that have infiltrated the organization being undetected by existing defensive techniques providing an extra layer of security to critical assets.

Honeypots -- IT and OT

Treacle is a leading provider of custom honeypots and decoys for clients looking to improve their cybersecurity defenses. Honeypots are a valuable tool for organizations to detect, identify, and analyze potential cyber threats by creating realistic decoys that mimic legitimate assets. By proactively identifying and analyzing cyber threats, organizations can better understand their security posture and potential vulnerabilities. This allows them to take proactive steps to protect their critical assets and data from attackers. With Treacle's custom honeypots and decoys, clients can receive a tailored solution that meets their specific needs and provides an added layer of security. In today's increasingly complex threat landscape, honeypots are essential for every organization to ensure the protection of their digital assets.

Intrusion Detection -- IT and OT

Treacle is proud to offer its Web Intrusion Detection System (WIDS), an innovative solution designed to detect and prevent attacks on web applications. WIDS utilizes advanced algorithms and machine learning to analyze web traffic, identify potential threats, and generate alerts in real-time. This proactive approach to cybersecurity helps organizations stay ahead of potential attackers and protect their sensitive data from unauthorized access. With its easy-to-use interface and customizable features, WIDS is a versatile solution that can be tailored to meet the specific needs of various clients across different industries. By leveraging the power of WIDS, organizations can ensure the safety and security of their web applications, maintain compliance, and safeguard their reputation.

Network Traffic Analysis -- IT and OT

Treacle's Network Traffic Analysis (NTA) service is an essential tool for organizations looking to proactively detect and mitigate potential cyber threats. NTA leverages advanced algorithms and machine learning to analyze network traffic, identifying anomalies such as devices communicating with blacklisted servers, possible data exfiltration, and suspicious activity. By providing a comprehensive view of the network, NTA empowers management to make informed decisions and take proactive measures to safeguard critical assets and data. With its customizable features and easy-to-use interface, NTA is a versatile solution that can be tailored to meet the specific needs of various clients across different industries. With Treacle's Network Traffic Analysis service, clients can have peace of mind knowing that their network is protected from potential cyber threats, enabling them to focus on their core business objectives.

Cyber Security Audit -- IT and OT

Treacle is a company that provides exceptional Cyber Security Audit Services to organizations. We understand the critical nature of cybersecurity and conduct our audits in a very detailed way, providing a much better service than what the generic industry offers. Our comprehensive audit process includes a Cyber Resilience Review, which helps to determine the cyber resilience of an organization. Additionally, our Cyber Crisis Management Exercise is like a fire drill, helping organizations to test the capability of their IT/security team to handle a cyber crisis. We also assess problems related to People, Process, and Technology in the organization and conduct a Vulnerability Assessment and Penetration Testing for Infrastructure, Web, and Data Assets in a detailed manner. We also perform Network Traffic Analysis for organizations. Our team is comprised of highly skilled individuals in offensive and defensive cybersecurity, proven and famed hackers, and those with CISA and CISM certification, as well as an ISO 27001 lead auditor. We have provided these services to big clients, demonstrating our ability to deliver exceptional results. With Treacle, organizations can be confident in their cybersecurity posture and their ability to respond to any cyber threats that may arise.

Cyber Security Policy

Treacle is a leading company that specializes in designing Cyber Security Policies for organizations. We understand the critical importance of cybersecurity and its impact on an organization's operations, reputation, and financial stability. Our team of experts works closely with organizations to identify their unique security needs and develop tailored policies that align with industry standards and regulations. Additionally, we provide recommendations to improve the overall cybersecurity posture of the organization. Our comprehensive approach ensures that organizations have the necessary policies in place to protect their data, systems, and networks from cyber threats. With Treacle's Cyber Security Policy design services, organizations can be confident in their ability to mitigate risks and protect their assets from cyberattacks.


Subhasis Mukhopadhyay

(Founder and CEO)
Subhasis, CEO of Treacle, is concurrently advancing his academic pursuits as a Masters student in the Department of Computer Science and Engineering at IIT Kanpur. Over the past five years, he has developed a multifaceted expertise in the field of Cyber Security while at the renowned institute.
His technical proficiency spans various domains such as Malware Analysis, Probabilistic Model Checking, Formal Verification, and notably, Deception Technology. Subhasis's scholarly contributions have found their way into respected conferences such as AsiaJCIS, CICT, and IEEE DSC, where he has collaborated with Prof. Sandeep Shukla. His research excellence was recognized at CICT, where he received the best paper award, in collaboration with Hitachi Research and Development Private Limited.
Moreover, Subhasis has lent his insights to the literary world, authoring a chapter on Honeypots in the book 'Cyber Security in India', written by Prof. Sandeep Shukla and Prof. Manindra Agrawal. As an internationally acclaimed expert in Deception Technology, his focal point remains the development of innovative and indigenous Cyber Security solutions that cater to the global community. With his leadership at Treacle, he is set to redefine cybersecurity standards across the world.

Prof. Sandeep Shukla

(Mentor and Advisor)
Prof. Sandeep Kumar Shukla is a professor (HAG) of Computer Science and Engineering department of IIT Kanpur (IITK). He headed the department between 2017 and 2020, and was the Poonam & Prabhu Goel Chair Professor between 2016-2019, along with being a joint director of the National Interdisciplinary Centre for Cyber Security & Cyber Defense of Critical Infrastructures (C3i Centre) at IIT Kanpur. He is also a joint director of the National Blockchain Project funded by the PMO. He is a program director of the C3i Hub, a Technology Innovation Hub on Cyber Security created by the DST, Government of India. He completed his Bachelors in CSE at Jadavpur University, Kolkata and his Masters and PhD degrees from the SUNY, Albany.  See more...

Prof. Manindra Agrawal

(Mentor and Advisor)
Prof. Manindra Agrawal received his B.Tech and PhD in Computer Science and Engineering from the Indian Institute of Technology, Kanpur in 1986 and 1991, respectively. He was a fellow at the School of Mathematics, SPIC Science Foundation, Chennai from 1993 to 1995, and a Humboldt Fellow at the University of Ulm, Germany, from 1995 to 1996. He joined the faculty at IIT Kanpur as an Assistant Professor in the Department of Computer Science and Engineering in 1996. He was appointed as the N. Rama Rao Chair Professor in 2003. He is the recipent of several international awards including the Fulkersion Prize 2006 and the Godel Prize 2006 and has published and presented papers in reputed journals. He was also the recipent of the first Infosys Prize for Mathematics and the Shanti Swarup Bhatnagar Award in Mathematical Sciences in 2003. He has been honored with Padma Shri in 2013.

Ranjeet Mishra

(Chief Business Advisor)
An electrical engineer by degree and an MBA from Western International University, Arizona and a sales and BD guy at heart, Ranjeet is a technology business professional with extensive experience in the field of high-end technologies,having more than 22 years of experience in GTM strategy, international business, solution selling, business development and direct & indirect sales in North America, APAC, and Middle East region.Extensive experience in startups ecosystem across IT, telecom and cyber security verticals covering customer segments like BFSI, Aerospace & Defence, Corporate enterprises,Healthcare,Critical infrastructures etc.See more...

Mohit Pandey

(Technical Analyst)
Mohit Pandey is a highly accomplished individual with diverse achievements in academia and leadership roles. Currently, he is pursuing Ph.D. from the Department of Design, IITK, focusing on surface modification of polymers for biomedical applications. Prior to this, he did his B. Tech. from IITK in Chemical Engineering. With past experiences as the Festival Coordinator for Techkriti'17, Asia’s largest technical and entrepreneurial festival (student-organized), and as the Team Captain of the Autonomous Underwater Vehicle (AUV) team at IITK, he has proven his exceptional organizational and leadership skills. Additionally, his role as the Overall Coordinator for the UP Open State Taekwondo Championship 2017, and as a core team member of the Institute Counselling Service in 2016, highlight his commitment to sports and student well-being. His remarkable achievements and dedication position him for significant contributions in his research, entrepreneurial, and leadership endeavors.

Subhajit Manna

Subhajit, an accomplished Electronics Engineer, boasts an impressive track record of over five years in IT/OT infrastructure. His diverse portfolio includes the design, repair, and maintenance of OT and Automated Control systems, primarily deployed in Tea Gardens.
His professional journey has also seen him don the hat of a Technical Advisor at a renowned GPS Device Manufacturing company based in Kolkata. This role allowed him to further hone his technical acumen and industry knowledge.
Currently, as the spearhead of Treacle, Subhajit is directing his efforts towards the development of indigenous Cyber Security solutions. His technical prowess extends to designing resilient, fault-tolerant systems. He specializes in crafting containerized and custom deception environments, further strengthening his position as a leader in the cybersecurity field. With his guidance, Treacle is poised to make significant strides in cybersecurity innovation.

Partha Das

With a solid foundation of over seven years in the IT industry, Partha has accrued significant expertise in product and web development. As a certified MERN, MEAN Stack, and Python specialist, and also a Certified Ethical Hacker, Partha brings a breadth of knowledge and skill to his role at Treacle.
In his capacity at Treacle, Partha helms both front-end and back-end web development as well as product development, demonstrating his comprehensive understanding of the digital landscape. His professional prowess is complemented by his ability to work seamlessly within a team, where he is recognized for his proactivity and ability to independently spearhead and execute initiatives. With Partha's expertise in the mix, Treacle is able to deliver top-notch cybersecurity solutions.

History Of Our Company

Treacle was established in June 2021, following the selection of its pioneering product idea for investment. The company was founded with the noble objective of enhancing the cybersecurity infrastructure of our country.
Our innovative approach towards developing a Deception Technology solution caught the attention of C3iHub, leading to an investment of INR 22 Lakhs. Our dedication and hard work also resulted in us securing the prestigious SISFS grant of INR 4 Lakhs from the Government of India.
Since July 2021, Treacle has been part of the esteemed IHub Programme, incubated at SIIC, IIT Kanpur. This association has further strengthened our commitment to developing cybersecurity solutions that stand the test of time.


Contact Us