Slide background

MIT Geospatial Data Center

The MIT Geospatial Data Center is the uniting force of MIT's Auto-ID labs, the Geonumerics Group, the Center for Grid Computing, and the Intelligent Engineering Systems Laboratory.
Read more
Slide background

Cyberphysical Security

Large In-Memory Cyber-Physical Security-Related Analytics via Scalable Coherent Shared Memory Architectures
Read more
Slide background

Tackling Big Data

GDC’s Large-Scale Simulator for Global Data Infrastructure Optimization tackles Big Data
Read more
Slide background

MIT Simulator

"Predicting the performance of these systems is extremely difficult”, says Williams, the Director of MIT Geospatial Data Center. To address these questions we have built a simulator so companies can test potential solutions before.
Read more
Slide background

The Internet of Things

Connecting the physical and the virtual world
Read more

GDC is always looking for strong students and researchers. A strong preference is given to students who have been admitted to MIT. Similarly, research assistant positions are typically filled internally by graduate students.

Applied Cyber Security Course

Date: June 23-24, 2014. The course covers securing computers, applications, networks, digital forensics, and the ethical and legal practices affecting all computer users. The course also covers the strategies, implementation and management of a business information continuity plan, mitigation of cyber vulnerabilities, and incident response and analysis. The content is targeted at ensuring the privacy, reliability, and integrity of information systems

More Info

Cyber-Physical Security

Cyber-physical security-related queries and analytics run on traditional relational databases can take many hours to return. Furthermore, programming analytics on distributed databases requires great skill, and there is a shortage of such talent worldwide. In this talk on computational intelligence within cyber security, we will review developments of processing large datasets in-memory using a coherent shared memory approach. The coherent shared memory approach allows programmers to view a cluster of servers as a system with a single large RAM.

Big Data Lab

To evaluate the impact of ”what if” scenarios on the performance availability and reliability of the system a Big Data infrastructure simulator has been architected. The goal is to provide datacenter operators with a tool that allows understanding and predicting the consequences of the deployment of new network topologies, hardware configurations or software applications in a global data infrastructure, without affecting the service. The simulator was validated on the data infrastructure of a Fortune 500 company.

Data Center Infrastructure Simulator

"Predicting the performance of these systems is extremely difficult", says Williams, the Director of MIT Geospatial Data Center. To address these questions we have built a simulator so companies can test potential solutions before spending the money to purchase. "We built the MIT Global Infrastructure Simulator so we could accurately predict performance and detect vulnerabilities in global IT systems," says Sanchez, MIT's GDC Executive Director and Chief Architect. "The simulator has been tested by a Global 100 company with excellent results."

Kaspersky Lab's Security Startup Challenge

GDC Directors John R Williams and Abel Sanchez judged Kaspersky Lab's Security Startup Challenge. The 11 finalists were (videos below):

Excalibur

Just use your mobile phone as a universal digital key. Just approach your computer and Excalibur will automagically log you in. Leave it and it will lock itself.

Keygo

Save and Share files, photos & videos or have a private chat without worrying if anyone else has access. Neither loved ones nor seasoned hackers can get near your data. We keep your secrets safe. Keygo is like having a secret chamber on your phone and only you have the key.

Whispeer

Send any image or text to your friends. We can't read anything you share! Speak freely about politics, health or black humour.

Security in Motion

We offer a software-based solution, currently built with Android OS, but can be deployed with most infotainment systems existing today in the market. Our solution is comprised of a set of engines that are installed on the infotainment unit.

Pipe

Secure browser-to-browser file transfer service without ANY file size limit.

ZeroDB

ZeroDB enables clients to run queries over encrypted databases without exposing decrypted data to the server and without a proxy gateway. Data at rest and in use is secure - the cloud is no longer a single point of failure.

Re-Sec

Re-Sec is dedicated to redefining the cyber security landscape. Re-Sec prevents cyber threats from entering and spreading within the organization using Advanced Content Disarm & Reconstruction (‘ACDR’).

SiteSecure

SiteSecure protects online businesses from downtime and loss caused by internet threats with a technology that identifies security issues faster than link engines.

Crypho

Encrypted enterprise messaging. Crypho is a multiplatform chat and file sharing application that helps businesses communicate securely by means of end-to-end encryption.

CTF365

We're a Security Training Platform for the IT Industry with a focus on Security Professionals, System Administrators and Web Developers - offering security training labs on demand.

Cyber DriveWare

Protecting enterprises from catastrophe due to Destructive Malware, a form of attack which most enterprises are vulnerable to and concerned about!