Differences between revisions 2 and 3
Revision 2 as of 2008-05-15 06:22:48
Size: 171
Editor: dsl-jnsbrasgw1-fe83de00-229
Comment:
Revision 3 as of 2008-12-28 20:16:28
Size: 171
Editor: localhost
Comment: converted to 1.6 markup
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
[[Include(^Clarified Generic Directors Cut/[0-9].*,,editlink)]] <<Include(^Clarified Generic Directors Cut/[0-9].*,,editlink)>>
Line 5: Line 5:
 Author:: ["Jani Kenttälä"]  Author:: [[Jani Kenttälä]]

Awards

Organisation Award
Ultimate Virtual Challenge logo.png Ultimate Virtual Challenge first price ($100 000)
Telecom Scholarship logo.png Best Telecom-releated innovation (3000 EUR grant)
SMFL Award logo.png M.Sc Thesis award (2 000 EUR)
Venturecup National Finale logo.png National finale, best in northern Finland.
[edit] [csv] [zip]

Testimonials

Services

image.png

"With Clarified Networks we had true situational awareness, real collaboration and the ability to steer the process during the whole audit.

This way we received better return than ever before and the possibility to fix critical problems at the moment they were discovered instead of waiting for formal reporting and reiterating then reiterating slow and costly process.

We also found very valuable the possibility to adjust specific plans during the process. Thus the knowledge acquired from previous stage was leveraged right away. Also re-planning because of environment changes went very smoothly.

The fact that we worked with distributed team did not harm the communication. Similar agility is very seldom achieved even with teams working in the same room."

  • - Jaan Priisalu, Head of IT Risk Management / Swedbank Baltic



Clarified Analyzer

malwareremoval.png

"The analyzer has been used in helping us analyzing attempted SQL injection and Remote File Inclusion attacks upon our servers. The tool has also been used to good effect whilst penetrating botnet command and control sites.

It allowed us to automaticly trace the links involved in a SQL injection attempts, work that was previously done manually, thereby saving time and allowing us to start getting the numerous sites involved closed down in a more timely manner."

NATO Cooperative Cyber Defence Centre of Excellence

The aim of the Baltic Cyber Shield is to increase understanding of the international cyber environment and to enhance international cooperation for handling technical incidents. During the exercise, six teams from Latvia, Lithuania, Sweden and NATO headquarters (NCIRC) will attempt to defend virtual computer networks against hostile attacks ... The organisers of the exercise would like to thank Clarified Networks for their support in organising the exercise. Read full story from the original page.


image.png

The panOULU (public access network OULU) network provides wireless broadband Internet access to everybody in its coverage area . The panOULU network is provided in cooperation by the City of Oulu, the University of Oulu, the Oulu University of Applied Sciences, the Pulmonary Association Heli, the VTT Technical Research Centre of Finland, DNA Oy, Elisa Oyj, and Netplaza Oy.

The panOULU network is accessed by over 15 000 unique devices per month. We have built an extremely cost-efficient wireless network which covers the city centrum, the airport, public libraries, schools, buses and even a ferry. To avoid complexity and to enable seamless roaming, panOULU is a single large L2-network. While this approach has many advantages, it has one disadvantage: failures in certain parts of the network can propagate to affect all users. We have tackled this problem by using Clarified Analyzer to quickly detect and debug network problems. With the time travel feature we are also able to debug sporadic failures that we could not otherwise debug while the failure was ongoing.

  • Read more about our use cases with Clarified Analyzer

  • A presentation about Clarified-panOULU collaboration given in Wireless Cities Forum, Cambridge 2007-12-13.

-- Timo Ojala, Dr.Tech.

Public references

customers.png


Linked in pages: Blog/2009-02-02 11-12, Clarified Generic Presentation/027-References, Traffic Audits With Clarified Analyzer/015 - To Whom 2, Clarified Networks Quality Assurance Excellence, History/080-clients, Clarified Generic Directors Cut/040-Customers


CategoryRawSlide






Analysing 21st century networks with 20th century mindset.




Do You Remember the Network Analysis Tools Looking Like This?

attachment:wireshark-pile.png

"Our Networks are Castles"

attachment:castle-softedges.png

This is the traditional misconception of network perimeter security. Default assumption is that there is only a single point of entry guarded by firewall and possibly IDS.

Modern Complexity

attachment:complex-simple.png

So Many Protocols

attachment:image.png


Title
Clarified Generic Directors Cut
Author

Jani Kenttälä


CategorySlideShow