Juniper Provision - 13martie2012
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Juniper Provision - 13martie2012

on

  • 806 views

 

Statistics

Views

Total Views
806
Views on SlideShare
794
Embed Views
12

Actions

Likes
0
Downloads
23
Comments
0

1 Embed 12

http://www.agora.ro 12

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Juniper Networks is delivering a new network that enables businesses and consumers to maximize the potential of their products and services and meets the infrastructure needs of the next decade.T: And many companies are already taking advantage of the potential the new network provides.
  • Everywhere we look, we see the same trends and CIO business issues coming up around employee productivity, business agility and cost efficiencies. Much of the time these are driving specific IT initiatives like programs supporting BYOD, turning up new platforms and cloud services, and Infrastructure consolidation with data center and server virtualization projects. Transition: You may have similar initiatives in your organization today
  • We are also finding that the investment focus for these new initiatives around three key areas: Mobility, Cloud and in the Data Center & Campus & Branch infrastructure. And while these investments are paying off, they also come with some profound impacts to the security of the organization. Transition: Let’s take a look at the security impact of these investment areas.
  • Each successful exploit has three parts – the attacker, threat type, and target – we continue to see change in each. Attacker - in 2005, we saw a shift starting from attackers wanting notoriety to wanting profitability. Today, cybercrime is fully organized and we see crime syndicates out to profit from attacks. These attackers are now well funded, use sophisticated and purpose built tools and target organizations purely for profit. While this is nothing new, what we are seeing today is a move to not only attack “.gov/.com” but to attack “.me/.you”. Attackers are becoming increasingly sophisticated and are profiling not only companies but also individuals. They understand that we all have online identities but also “phyiscal profiles” or “connection points” where we connect to the internet from a variety of places……work, internet café, airport lounge, home. They have realized that often times our security defenses are down or weak at some of these connection points and penetrating individuals’ devices can work quite well outside of the work place. If you can infect a business user at an internet café and then have them walk that device into the enterprise then you can infiltrate the enterprise infrastructure and bypass many of the defenses that are in place today. Attackers understand this and have adopted their behavior. Threat – The threat landscape is also undergoing a change both in terms of the types of attacks and the sophistication and maturation of existing attacks. As expected, we continue to see new types of attacks to bypass the latest technologies that enterprises deploy.historically, the first large virus outbreak was on the Apple II in 1981. Since then there have been many well documented outbreaks that include the “iLOVEYOU” worm in 2000, SQL Slammer and Blaster worm in 2003 and countless worms, trojans and other forms of malware. Today, DOS has given way to DDOS and newer threats such as rootkits and botnets have taken hold. The most recent threat is APT which is not only a new type of threat but also a new way to profile and attack networks, systems and organizations. While we see new types of attacks we also see the morphing of existing attack types. As an example a few years ago, the majority of malware was in cleartext which could often be detected by AV or IDP solutions. Today over 80% of malware uses encryption, compression or file packing to bypass traditional AV or IDP technologies. Target - Finally, we also see significant changes with attack targets. The new attack targets are often the same as the investment areas that we talked about supporting your key business initiatives. Over the past few years there has been an explosion in devices that attackers target ranging from smart phones, to tablets to cloud services. What is particularly interesting about these new targets is the variation of the architecture of these platforms that ranges from more secure platforms such as the iphone to more open platforms such as the the Android OS. The other primary change we see is around the types of applications being attacked. Historically, most attacks have been focused on traditional corporate application servers and productivity applications such as office. Today, have seen a significant shift to web 2.0 type applications and social networking apps where attackers take advantage of a trusted relationship that is built amongst online users. Once user devices are compromised, they are used to access sensitive information in the data center over the campus and branch networks.Transition: Let’s take a look at an example
  • Run through the animation: A mobile user checks e-mail on his own iPhone and communicates with friends. He trust the link from his friend and inadvertently becomes infected with malware. After going to work he connects to the corporate network and the attacker, who has taken control over the device, can access sensitive information.Transition: This is not an uncommon story
  • The security team at his company has been avoiding the issue of what to do about employees using their own consumer devices to improve productivity and it shows. The don’t have the ability to detect malware on the mobile device, they can’t protect the user from cloud-based threats, they can’t control access based on user identity, device and location and the products they do have in place don’t have the coordination to know what is going on. Transistion: This clearly needs a new approach.
  • The common IT initiatives of BYOD, New Platform and Services, and Infrastructure Consolidation need to shift to deliver three key benefits:Broad coverage across the enterprise, from the device to the cloud to the data centerFlexible deployment options that can be run on as a VM or an appliance, or on a mobile device. Custom fit to deliver security easily where ever it makes the most sense in your environment Security context and coordination that allows the overall system to run in a coordinated fashion, taking contextual information about user identity, location, and device to make better security enforcement decisions.Transition: These are capabilities Juniper offers today. Let’s see where we are heading next.
  • We introduced a number of innovative new products last year, and have another full set of products we plan to deliver in 2012, including our new Security Design management application and a VM version of the SRX. For a longer term view of our strategic direction, you can expect to see us invest in developing next generation security services, delivering more cloud security service offerings and start to move beyond what we have from context and coordination into security intelligence.Transition: This is an integral part of the overall Juniper company strategy
  • From a company strategy perspective,Juniper has significant development investments across a wide range of domains for both service provider and enterprise networks. As part of the always protected vision, we consider security as a critical component and area of differentiation in each of these domains. Transition: Bringing it all together, we can build an enterprise that is always protected with Juniper
  • Juniper provides the critical components to securing your most valued assets by enabling BYOD policies and improve employee productivity and satisfaction with broad protection, by improving business agility with flexible deployment models tailored to your new enterprise, and to improve cost efficiencies with security context and coordination that keeps you always protected from the device to the cloud to the data center.Transition: Let’s go back to our example
  • When we address the new requirements and provide broad protection, flexible deployment models that can be tailored to your environment and security context and coordination, we can keep you protected and against the dynamic threat landscape. We can now detect malware on the client, we can enforce access to company resources based on the user, device and location, we can control access to sensitive information, and we can take advantage of new cloud services to improve efficiency and reduce costs.Transition: Thanks for letting us share our security direction with you. Please let us know if there are any areas you would us like to cover in greater depth with you or any member of your staff.
  • AppDOS: Application layer attacks. Looped attacks in applications to bring down services. Example: looped search or looped Shopping Cart additions in an online shop AppFW: Enforcement part. Black list or white list of apps that are allowed. Example: Block usage of Facebook of Telnet.AppQoS: Enforcing bandwidth based on app. Example: Limited downloads from Internet. Set preference for email services or ERP services.AppTrack: Visibility of app usage. Per protocol and also which app per protocol, good support for http.IPS: Anomaly detection, based on signatures and traffic patterns.User Identity Binding: Creating user specific rules (as opposed source IP based rules), we have!Decrypting SSL: We can do it.Blocking Skype: Can be done using multiple methods.
  • PRELIMINARY FOURTH QUARTER AND FISCAL YEAR 2011 FINANCIAL RESULTS Q4 Financial Highlights: Revenue: $1,120.8 million, down 6% from Q4'10 and up 1% from Q3'11Operating Margin: 11.9% GAAP; 18.6% non-GAAPGAAP Net Income Per Share: $0.18 dilutedNon-GAAP Net Income Per Share: $0.28 diluted, down 33% from Q4'10 and flat from Q3'11 2011 Financial Highlights: Revenue: $4,448.7 million, up 9% from 2010Operating Margin: 13.9% GAAP; 20.6% non-GAAPGAAP Net Income Per Share: $0.79 dilutedNon-GAAP Net Income Per Share: $1.19 diluted, down 10% from 2010 SUNNYVALE, Calif., Jan. 26, 2012 -Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today reported preliminary financial results for the three and twelve months ended December 31, 2011, and provided its outlook for the three months ending March 31, 2012.  Net revenues for the fourth quarter of 2011 decreased 6% on a year-over-year basis, and increased 1% sequentially, to $1,120.8 million.  For the year ended December 31, 2011, Juniper's revenue increased 9% on a year-over-year basis to $4,448.7 million. The Company posted GAAP net income of $96.2 million, or $0.18 per diluted share, and non-GAAP net income of $150.1 million, or $0.28 per diluted share, for the fourth quarter of 2011.  Included in the GAAP diluted earnings per share was a $0.02 cents impact for restructuring and other charges.  Non-GAAP net income per diluted share decreased 33% compared to the fourth quarter of 2010 and was flat compared to the third quarter of 2011.  For the year ended December 31, 2011, GAAP net income was $425.1 million, or $0.79 per diluted share, and non-GAAP net income was $644.6 million, or $1.19 per diluted share. Non-GAAP net income per diluted share for the year ended December 31, 2011 decreased 10% on a year-over-year basis. The reconciliation between GAAP and non-GAAP results of operations is provided in a table immediately following the Share-Based Compensation Related Payroll Tax by Category table below. "While the fourth quarter was softer than we had anticipated primarily due to weak demand from service providers, Juniper delivered record revenues in a year where macro economic uncertainty increased as the year unfolded," said Kevin Johnson, president and CEO. “During the year, we introduced innovative new products across our portfolio that we believe will enable Juniper to continue to grow faster than the markets we serve.  We are confident in our strategy and our innovation pipeline, and we remain committed to delivering differentiated solutions that are highly relevant to our customers.”Juniper’s GAAP operating margin for the fourth quarter of 2011 was 11.9% compared to 12.4% in the third quarter of 2011, and 19.1% in the prior year fourth quarter. Non-GAAP operating margin for the fourth quarter of 2011 was 18.6% compared to 20.0% in the third quarter of 2011, and 24.5% in the prior year fourth quarter. For the fiscal year 2011, Juniper's GAAP operating margin was 13.9% compared to 18.8% for the prior fiscal year. Non-GAAP operating margin for the fiscal year 2011 was 20.6% compared to 24.0% in the fiscal year 2010. "The December quarter was an atypical and unexpectedly weak finish to the year, with reduced spending by some of our largest customers.” said Robyn Denholm, Juniper's chief financial officer. “While long-term industry fundamentals remain strong, we expect the near-term environment to remain challenging.  We will invest in support of our strategy while continuing our focus on execution and prudent cost management.” Other Financial HighlightsTotal cash, cash equivalents and investments as of the fourth quarter of 2011 was $4,292.4 million, compared to $4,130.3 million as of the third quarter of 2011 and $2,821.6 million as of the fourth quarter of 2010. Juniper generated net cash from operations in the fourth quarter of 2011 of $243.6 million, compared to net cash provided by operations of $185.2 million in the third quarter of 2011, and $371.0 million in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper generated net cash from operations of $986.7 million, compared to $812.3 million in 2010. Days sales outstanding in accounts receivable (“DSO”) was 46 days in the fourth quarter of 2011, compared to 36 days in the prior quarter and 45 days in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper repurchased 17.5 million shares, at an average share price of $30.93 per share, for a total of $541.2 million, which largely offset stock issued through our employee equity programs.    Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fourth quarter of 2011, were $78.4 million and $43.3 million, respectively. Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fiscal year 2011, were $266.3 million and $169.3 million, respectively.  

Juniper Provision - 13martie2012 Presentation Transcript

  • 1. ALWAYS PROTECTEDPERVASIVE SECURITYFROM THE DEVICE TO THE CLOUD TO THE DATA CENTERFredrik LyhagenPartner Account Manager
  • 2. SETTING THE AGENDA FOR THE NEXT DECADE Juniper Networks is transforming the experience and economics of networking2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 3. JUNIPER AT A GLANCE 2011 Revenue: $4.5 Billion Global Presence: Offices In 47 Countries 9000 Employees #2 In Core #3 In Edge Routing, #1 In High-end Routing, SP Routing, Ethernet Switching Firewall Network Security Doing Business With 96% Of Fortune 100 Powering 6 Of The World’s 7 Largest Stock Exchanges Securing 80% Of All Smart Phone Traffic In North America Mission: Connect Everything. Empower Everyone3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 4. CLEAR MISSION AND FOCUSED STRATEGY Connect everything. Empower everyone. Silicon Systems Software Through high-performance network and industry innovation4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 5. CIO TOP 3 BUSINESS TRENDS & IT INITIATIVES - 2012 Employee Business Cost Productivity & Agility Efficiency Satisfaction New Platforms & Infrastructure BYOD Services Consolidation5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 6. INVESTMENT FOCUS AREAS New Platforms & Infrastructure BYOD Services Consolidation Mobility Mobility Cloud Data Center, Campus & Branch6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 7. SECURITY IMPACT Notoriety Profitability .gov /.com .me / .you Attacker Type of Attack APT Botnets Threats DOS Malware Trojans Worms Virus New Devices & Platforms New Applications & Delivery Models Targets Internet Information Services7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 8. EVERYDAY EXPLOITS Robert Smith Funniest video ever! Check out the link! Click Here Intranet Quarter EndEmail Connect to Sales Results MALWARE Corporate Corporate SITE Financial Data Network8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 9. OFTEN INFECTED Can’t inspect content ! in network Robert Smith Funniest video ever! Check out the link! Doesn’t have Intelligence Click Here Intranet Email ! to detect Malware on Client Connected To MALWARE Corporate Corporate SITE Financial Data Network Can’t control ! access to sensitive data Can’t protect user from ! cloud-based threats9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 10. NEW SOLUTION REQUIREMENTS BYOD Broad Flexible Coverage Deployment New Platforms & Services Security Context and Coordination Infrastructure Consolidation10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 11. JUNIPER – CONTINUED INNOVATION AND DISRUPTION What We Are Doing In 2012 What We Did In 2011 • Security Design Introduction • AppSecure for SRX • Low Latency SRX Option • SRX 110 Introduction • AppSecure for Branch SRX • vGW introduction • SRX 550 Introduction • Added AV to vGW • vGW KVM Hypervisor support • Delivered Pulse Mobile Security Suite • Junos Pulse Enhancements • Expanded Pulse OS support • Virtual SRX (vSRX) Where We Are Going Develop Next Generation Deliver Cloud Security Invest In Security Security Services Platform Intelligence11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 12. SECURITY IS REQUIRED ACROSS ALL DOMAINS S E C U R I T Y: ALWAY S P R O T E C T E D12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 13. WHY JUNIPER? Employee Security Context and Broad Protection Productivity Flexible Deployment Business Agility Cost Efficiency and Satisfaction Coordination Always Protected Mobility Cloud Data Center, Campus and Branch Pulse, SA, MAG, STRM, SRX, vGW, STRM SRX, MAG, STRM, UAC & UAC & SRX Security Design13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 14. ALWAYS PROTECTED – THE VISION CAN enforce access via User, ! CAN detect malware on the client ! location and device context Robert Smith Funniest video ever! Check out the link! Click Here Intranet Email MALWARE X Corporate SITE Financial Data X CAN coordinate security CAN enable Client traffic! to provide access control ! directed to Cloud, CAN to sensitive information scrub and detect malware 14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 15. APPSECURE SERVICE MODULES FOR THE ENTERPRISE NAI Flow Ingress AI EgressProcessing Application Identification Engine Application ID Results AppDoS IPS AppFW AppTrack AppQoS16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 16. Q4’11 RESULTS: SOLID PERFORMANCE IN A CHALLENGING MACRO-ENVIRONMENT Revenue and Non-GAAP EPS Q4‘11 Highlights $1,140 $0.50 Revenue ($M) EPS ($)  $1,120.8 million, up 1% Q/Q $1,121 $1,121  Non-GAAP EPS $0.28 $1,120 $1,106 $0.40  Cash flow from operations, $243.6M $1,102 $1,100  Service Provider 60% of revenue  Enterprise 40% of revenue $0.30 $1,080 $0.32 $0.32 $0.28 $0.28 $1,060 $0.20 Q4‘11 Revenue Diversification $1,040 $0.10 $1,020 36% 46% EMEA $1,000 $0.00 18% APAC Q111 Q211 Q311 Q411 Americas Chart reflects non-GAAP EPS17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net