To Whom this Presentation is


  • Would you like to be able to:
    • verify in practice what actually happens in the network,

    • discover where from (vulnerable) services can be accessed,
    • discover misbehaving hosts,
    • discover access control violations and
    • monitor the incoming traffic flows with the ability to drill-down to the packet-level.

If your answer is yes to one or more of these questions, I believe your time is well spent.




"With Clarified Networks we had true situational awareness, real collaboration and the ability to steer the process during the whole audit.

This way we received better return than ever before and the possibility to fix critical problems at the moment they were discovered instead of waiting for formal reporting and reiterating then reiterating slow and costly process.

We also found very valuable the possibility to adjust specific plans during the process. Thus the knowledge acquired from previous stage was leveraged right away. Also re-planning because of environment changes went very smoothly.

The fact that we worked with distributed team did not harm the communication. Similar agility is very seldom achieved even with teams working in the same room."

  • - Jaan Priisalu, Head of IT Risk Management / Swedbank Baltic

Clarified Analyzer


"The analyzer has been used in helping us analyzing attempted SQL injection and Remote File Inclusion attacks upon our servers. The tool has also been used to good effect whilst penetrating botnet command and control sites.

It allowed us to automaticly trace the links involved in a SQL injection attempts, work that was previously done manually, thereby saving time and allowing us to start getting the numerous sites involved closed down in a more timely manner."

NATO Cooperative Cyber Defence Centre of Excellence

The aim of the Baltic Cyber Shield is to increase understanding of the international cyber environment and to enhance international cooperation for handling technical incidents. During the exercise, six teams from Latvia, Lithuania, Sweden and NATO headquarters (NCIRC) will attempt to defend virtual computer networks against hostile attacks ... The organisers of the exercise would like to thank Clarified Networks for their support in organising the exercise. Read full story from the original page.


The panOULU (public access network OULU) network provides wireless broadband Internet access to everybody in its coverage area . The panOULU network is provided in cooperation by the City of Oulu, the University of Oulu, the Oulu University of Applied Sciences, the Pulmonary Association Heli, the VTT Technical Research Centre of Finland, DNA Oy, Elisa Oyj, and Netplaza Oy.

The panOULU network is accessed by over 15 000 unique devices per month. We have built an extremely cost-efficient wireless network which covers the city centrum, the airport, public libraries, schools, buses and even a ferry. To avoid complexity and to enable seamless roaming, panOULU is a single large L2-network. While this approach has many advantages, it has one disadvantage: failures in certain parts of the network can propagate to affect all users. We have tackled this problem by using Clarified Analyzer to quickly detect and debug network problems. With the time travel feature we are also able to debug sporadic failures that we could not otherwise debug while the failure was ongoing.

  • Read more about our use cases with Clarified Analyzer

  • A presentation about Clarified-panOULU collaboration given in Wireless Cities Forum, Cambridge 2007-12-13.

-- Timo Ojala, Dr.Tech.

Public references


Linked in pages: Blog/2009-02-02 11-12, Clarified Generic Presentation/027-References, Traffic Audits With Clarified Analyzer/015 - To Whom 2, Clarified Networks Quality Assurance Excellence, History/080-clients, Clarified Generic Directors Cut/040-Customers



Organisation Award
Ultimate Virtual Challenge logo.png Ultimate Virtual Challenge first price ($100 000)
Telecom Scholarship logo.png Best Telecom-releated innovation (3000 EUR grant)
SMFL Award logo.png M.Sc Thesis award (2 000 EUR)
Venturecup National Finale logo.png National finale, best in northern Finland.
[edit] [csv] [zip]

Linked in pages: TrafficAuditsWithClarifiedAnalyzer


Modern Complexity


Clarified Analyzer

  • Clarified Analyzer is a tool for troubleshooting and auditing network traffic.
  • You can either record the traffic with Clarified Recorder, or read PCAPs generated by your favourite tools.
  • How we are different
    • Intuitive, interactive and beautiful visualizations.
    • Drilldown from these visualizations to the packet level.
    • Integrated collaborative features.

Typical Collaborators


Currently hosting 211 collaboration instances for 1605 collaborators from 378 organisations.


  • Centralized but low overhead information sharing
  • Secure Instant Messaging (see CollabChat)

  • Collaboration between the stakeholders
  • Integration of 3rd party tools for information exchange
  • Workflows and document templates
  • Configuration management
  • Centralized reporting
  • Improved situation awareness
  • Control through limiting access only to the relevant people
  • Concent Security

Collaborators - Technology



  • Open Collaboration concept giving compatibility over wide variety of use cases
  • Browser based user interface based on Wiki technology, partially localized in the following languages:
    • Bulgarian, Croatian, Czech, Danish, Dutch, Finnish, French, German, Hebrew, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Norwegian Bokmal, Polish, Portuguese, Romanian, Russian, Serbian, Simplified Chinese, Spanish, Swedish, Traditional Chinese and Turkish
  • An XML based API for tool integration based on object database technology
  • User and access management
  • Backups
  • Audit trails, change tracking and version history
  • Fine grained and role based access control lists
  • RSS feed of recent changes
  • Tailorable themes for client specific appearance
  • New: we are bringing encrypted & authenticated XMPP (Jabber) based instant messaging to collaborators.

Traffic Audit Demo Setup




To name a few related to traffic audit focus:

  • Get quickly more valuable results to the customer (due better understanding of the target).
  • Eliminate potential vulnerabilities by removing unnecessary protocols
  • Discover violations in Access Control
  • Document, or eliminate ad hoc workarounds that bypass security policies
  • Find hosts and protocols which do not conform to organisation policy


Jani Kenttälä