Serving With Integrity

Artificial Intelligence / Machine Learning & Big Data Analysis

Growing volumes and varieties of available data, faster and cheaper computational resources, and affordable data storage have made it possible to quickly and automatically produce models that can analyze bigger, complex data for identifying important insights on a very large scale. These models gradually align themselves with the goals of organisations and help them identifying profitable opportunities or avoiding unknown risks by:

  • gleaning insights from the data (in real time) organisations are able to work more efficiently or gain an advantage over competitors
  • Blockchain Technology

    Transaction ledger built with distributed consensus. Blockchain is the next fundamental revolution similar to the scale of internet. We are building local peer to peer payment solutions, khazana and offering anti tampering features for critical records (of anything) using blockchain platform like hyperledger.

    Blockchain revolution has begun and a new fabric of decentralized modern applications is emerging where there is no need for central authorities. In BlockChain world, trust\conflict resolution exists in the very design of the network.

    Our team of experts helps companies consider distributed ledgers for their activities. We offer, product and PoC development using plaforms like HyperLedger and Multichain etc. We are building analytical tools that can monitor ethereum/bitcoin activities, to investigate on forensics and track payment flow.

    We are pursuing blockchain powered solutions for identity management, provenance tracking and help companies prototype their requirements quickly to create value for them.

    Formal Verification of Software/Hardware Systems

    We are adept at tackling ambiguity and uncertainty scaling it down to simple equations, abstract models and elegant programs. Our expertise in advanced model checking and static analysis techniques enables us to reason and derive facts about complex dynamical systems. We use these facts to make improvements, provide guarantees and drive transformations when needed.
    We have expertise in mathematical modeling of reactive, stochastic and real-time hybrid systems for verifying their trustworthiness aspects (such as safety, reliability, performance and survivability).

    Our major expertise are in:

  • Model-based design and engineering (MBDE)
    • - (using variants of architecture analysis and description language (AADL))
  • Model checking and quantitative extensions thereof
    • - (in particular probabilistic model checking, statistical model checking, cost/time bounds, abstractions,
      counterexample generation)
  • Modelling and verification tools
    • - (such as Spin, UPPAAL, nuSMV, MRMC model checkers, etc)
  • Reliability and dependability analysis
    • - (such as failure-mode and defect analysis)

    Workday Implementation & Integration

    Workday is a leading provider of enterprise cloud applications for finance and human resources. Workday delivers financial management, human capital management, planning, and analytics applications designed for the world’s largest companies, educational institutions, and government agencies.

    Our major expertise are in:

  • Report Writer and Custom Objects
  • Organizations Management
  • Business Process
  • Security Groups
  • Staffing Model
  • Self Service
  • Compensation
  • Transactions
  • Project Management Services

    Project management services specialize in planning, coordinating, and executing projects according to specific requirements and constraints. We perform some or all of the activities related to project work, from conceptualization to completion. Emphasis is placed on creating and maintaining project milestones and the project schedule. The end goal is to complete the project on time and within budget.

    Our major expertise are in:

  • Initiation
  • Planning
  • Execution
  • Monitoring and Control
  • Closure
  • Program Analysis & Compiler Transformations

    Compilers understand the languages users write for computers. They are fundamental tools for enabling program execution, optimization and its correctness. We provide experience with implementing new/domain specific languages, parsers and encoders and developing backends for multiple types of architectures. We use static analysis to find bugs and provide programming assistants to correct such errors at compile time.

    Our expertise lies in:

  • Building static analysis tools for various purposes..program optimization, understanding and transformations
  • Using GCC or LLVM tool suite, we can build new language frontends and backends for various hardware types
  • Analysing concurrent, multi-threaded, old legacy code to bring better program comprehension for developers to improve productivity
  • Enabling automatic root cause analysis of complex counter-example traces to speed up debugging
  • Synthesis program behaviours automatically to meet desired specifications
  • Developing debuggers, intelligent programming assistants, automatic tests, domain-specific bug finders
  • Cyber Security Intelligence

    Security breaches, persistent adversarial attacks, fraudulent sites and malicious apps are on a continuous rise leaving people and organizations completely vulnerable.
    Our experts have dealt with notorious stuXnet, flame, DigiNotar attacks in the past and delivered data-driven platform for monitoring, detecting and mitigating such attacks in the cyber space.

  • Web Security:
    • - Analysis and detection of malicious signatures on the internet and user systems
      - Monitoring, detecting and responding to threats in SSL and Authenticode space
  • Network Security
    • - Gaining visibility in the security health of enterprise system and internet security
      - We glean information with port scanning and OS fingerprinting tools such as Nmap
      - Vulnerability scanners such as Nexpose, Nessus, and OpenVAS are used to find vulnerabilities
  • Data Security
    • - We apply machine learning techniques to detect anomalous behaviour on petabytes of telemetry data
      - Metasploit is used to demonstrate accurate exploitation to help IT admins understand risk

    PKI / Applied Cryptography

    We are well versed with applying cryptography primitives for various application scenarios.

  • Secure boot
  • Code integrity
  • Verification and revocation
  • Trusted root management and updates
  • Modifying large code bases for SSL
  • Authenticode and securebooot
  • Code signing
  • Signature verification and generation
  • Certificate issuance
  • OCSP tracking and validation