0% found this document useful (0 votes)
43 views11 pages

Business Challenges Due To Cyber Threats: Treacle Technologies

Treacle Technologies provides a cyber deception platform called MUTACON to help organizations defend against increasingly sophisticated cyber attacks. MUTACON uses deception technology to engage attackers and gather threat intelligence while securing infrastructure. It aims to give attackers a taste of their own medicine through active defense. The founders have experience in cybersecurity, electrical engineering, and software development. Treacle is seeking funding to develop its MVP and expand to more customer verticals like BFSI, enterprises, government and healthcare. It plans partner with system integrators and channel partners to reach customers. Pricing starts from $3,000 per month for small networks to $20,000 per month for large networks. Treacle is in talks with potential customers like

Uploaded by

Sagar Singhal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views11 pages

Business Challenges Due To Cyber Threats: Treacle Technologies

Treacle Technologies provides a cyber deception platform called MUTACON to help organizations defend against increasingly sophisticated cyber attacks. MUTACON uses deception technology to engage attackers and gather threat intelligence while securing infrastructure. It aims to give attackers a taste of their own medicine through active defense. The founders have experience in cybersecurity, electrical engineering, and software development. Treacle is seeking funding to develop its MVP and expand to more customer verticals like BFSI, enterprises, government and healthcare. It plans partner with system integrators and channel partners to reach customers. Pricing starts from $3,000 per month for small networks to $20,000 per month for large networks. Treacle is in talks with potential customers like

Uploaded by

Sagar Singhal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Treacle Technologies

Business Challenges due to Cyber Threats


• 2 in 3 Indian SMBs suffered • $171 million – Sony (April to June
over Rs 3.5 crore business loss 2011)
in post-pandemic cyber-
attacks (MSME) • $180 million - Beanstalk Farms
cryptocurrency theft (April 2022)
• Cyberattacks cost companies
$200,000 on average, putting • CashMama data breach (April 2022)
many out of business(CNBC) • Morgan Stanley targeted in Accellion
• Indian firms paying Rs 14 crore hack (July 2021)
for a data breach in 2020.
Cyber Security Market Size: $197.36 Billion in 2020
(IBM)

$478.68 Billion by 2030 (Allied Market Research)


The Deception Market
• On-demand access to highly decentralized data and information platforms is
growing.
• Hackers are using AI, machine learning, and other technologies to launch
increasingly sophisticated attacks
• Ever-growing regulatory landscape and continued gaps in resources, knowledge,
and talent will outpace cybersecurity -- (McKinsey)

• Market Size: USD 3.88 Billion by 2028

• The marketplace for web-


hosting services is expected to
generate $183.18 billion by
2026
Treacle MUTACON System

• Unleashing the power


of Deception Technology

• Give attackers a taste of their own


medicine – Active Defence

• Secure your infrastructure

• Gather Credible Threat Intel. Detect


APTs in your network
The Team

Subhasis Mukhopadhyay – Prof. Sandeep K Shukla -


Subhajit Manna - Director Partha Das - Director Sudheer Vaidya -- Partner Advisor
Director
• MS(R), IIT Kanpur - • B.Tech ECE from TIU • BCA from SMU • Masters from California • Director, Center for Cyber
Pursuing • Experience in designing • Strong backend and State University Security, IIT Kanpur
• 4+ years of experience OT systems security frontend development skills • 16+ years of industry • IEEE
working in Defensive • 3+ years of experience • 5+ years of experience experience fellow, ACM Distinguished
Cyber Security, C3i Center, working in Core Electrical working in IT and software • Ex- Morgan Stanley, Scientist
IIT Kanpur and IT development Sophos, Juniper • PECASE Awardee from
• Internationally Recognized • 1 Year Experience in • NetDevOps and Network President Bush
Research Professional Cybersecurity Field Security
specializing in docker.
USP of Treacle MUTACON – Higher Attacker Engagement
Go to Market Plan
Partner with system
Development integrators, existing
MVP Client PoC Customer Ready
Roadmap start-ups, channel
partners

Customer Verticals
Banking, Financial Services, Insurance (BFSI)

Small, Medium, and Large Enterprises

Energy & utilities

Government

Healthcare
Fund
IT & Telecom Required
Retails, and others • INR 2 crores -- for the next 2 years and Usage
Manpower Breakdown
Business Process

• Lead Generation
• Client Pitch
• Follow Up
• Inside Sales
• Cold Calling

Revenue Stream

Small Networks – VAPT Medium Networks – Large Networks – VAPT


+ Deception Engine + VAPT + Deception + Deception Engine +
Policy Design – INR 3 Engine + Policy Design Policy Design – INR 20
Lakhs/month – INR 8 Lakhs/month Lakhs/month
Prices in Dollars ($)
Forecast and
In-Talks

Microsoft Research

Ministry of Power

BDO

Mazars

IAN

Campus Fund
Thanks

You might also like