SlideShare a Scribd company logo
1 of 2
Download to read offline
Continuous Research Service
This is a paid service intended for the recipient organization only; reproduction and sharing with third parties is prohibited.
Copyright © 2014 by Infonetics Research, Inc. All rights reserved.
Juniper Analyst Day Review
May 29, 2014
Juniper’s event at the Aspiration Dome at their Sunnyvale HQ obviously covered much more than
security, but I’ll share my thoughts on the security piece here. They started off with a very strong
statement, that they’re in 3 businesses: routing, switching, and security. This message was displayed
over and over and was part of nearly every presentation. If there were any questions about their
commitment to security broadly in the wake of Elliot Management’s open letter, they should be answered
at this point: Juniper isn’t getting out of the security business. There are some pretty well-substantiated
rumors pointing at possible shedding of the Pulse client and/or their SSL VPN business, but those
operate fairly separately from their core security business at this point and from a revenue standpoint are
fairly small.
Interesting tidbits coming out of the day included a mention that there have been high-end SRX wins this
year because they have customers demanding 100G interfaces today. We’ve certainly seen fairly broad
demand (in the context of high-end security applications) for 40G interfaces this year, with several
vendors reporting displacements (or new sales) as a result of availability of 40G ports, but this is the first
confirmed time I’ve heard of a product win based largely on the availability of 100G ports. We’ve been
cautioning vendors for several years that 2014 will be the year that 40G and 100G are required, and it
looks like that’s bearing out.
Juniper said that they’re revamping management and reporting capabilities for security, which is clearly a
key area of focus as it’s rumored that in deals they’ve lost to rivals like Palo Alto and Check Point,
management has been a key sticking point—and as Check Point articulated, the scale and speed of
management in a world of billions of smart devices is a critical issue. They also previewed the release of
the second generation of their AppID function, a key piece of the next-gen firewall picture. When
discussing where they were investing in development for security, they basically said there were no
revolutionary changes coming, just more work on paths they’re already moving down: scaling the
products/management up, continuing down the virtual path, continuing to improve efficacy, and focusing
on mobile (device and infrastructure).
The afternoon was spent in product roundtables and 1:1 meetings. The most interesting thing by far that
came out of the roundtables was a discussion of SDN and NFV and its impact on security. AT&T
announced on April 23rd that Juniper would be part of its “User-Defined Cloud” offering, which uses NFV
technology to allow easy (or self) provisioning of network services. Juniper will deliver a virtualized SRX to
AT&T customers through the platform, and it’s a bold step overall in delivering security services; it’s
certainly, just the tip of the iceberg, and Juniper is at the center of the discussion, which is always a good
place to be. Juniper spoke about this deployment but also a longer-term vision where it’s not whole
appliances that are virtualized and delivered dynamically, but individual features (firewall, IPS, app
control, web security, etc.).
CONTINUOUS RESEARCH SERVICE
JUNIPER ANALYST DAY REVIEW
This is a paid service intended for the recipient organization only; reproduction and sharing with third parties is prohibited.
Copyright © 2014 by Infonetics Research, Inc. All rights reserved.
Juniper is a well-established veteran in the enterprise and provider security space (holding the number 3
spot in network security based on our data), but they face significant challenges from the bottom
(aggressive, nimble, highly focused competition that has capitalized on their mistakes over the last few
years) and the top (a 500lb gorilla with the capital and market presence to make massive moves). They
have the ingredients and lineage to remain a top-3 player in our tracking. Their emphasis at the analyst
event on high-end customers, improving scale, management, and efficacy, and boldly moving toward a
world where hardware security appliances aren’t the norm from the core to the edge will help them stay
there as we head into the second half of this decade.
As always, I invite your comments.
Jeff Wilson
Principal Analyst, Security
+1 (408) 583.3337
jeff@infonetics.com

More Related Content

More from Juniper Networks

More from Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Infonetics Research: Juniper Analyst Day Review

  • 1. Continuous Research Service This is a paid service intended for the recipient organization only; reproduction and sharing with third parties is prohibited. Copyright © 2014 by Infonetics Research, Inc. All rights reserved. Juniper Analyst Day Review May 29, 2014 Juniper’s event at the Aspiration Dome at their Sunnyvale HQ obviously covered much more than security, but I’ll share my thoughts on the security piece here. They started off with a very strong statement, that they’re in 3 businesses: routing, switching, and security. This message was displayed over and over and was part of nearly every presentation. If there were any questions about their commitment to security broadly in the wake of Elliot Management’s open letter, they should be answered at this point: Juniper isn’t getting out of the security business. There are some pretty well-substantiated rumors pointing at possible shedding of the Pulse client and/or their SSL VPN business, but those operate fairly separately from their core security business at this point and from a revenue standpoint are fairly small. Interesting tidbits coming out of the day included a mention that there have been high-end SRX wins this year because they have customers demanding 100G interfaces today. We’ve certainly seen fairly broad demand (in the context of high-end security applications) for 40G interfaces this year, with several vendors reporting displacements (or new sales) as a result of availability of 40G ports, but this is the first confirmed time I’ve heard of a product win based largely on the availability of 100G ports. We’ve been cautioning vendors for several years that 2014 will be the year that 40G and 100G are required, and it looks like that’s bearing out. Juniper said that they’re revamping management and reporting capabilities for security, which is clearly a key area of focus as it’s rumored that in deals they’ve lost to rivals like Palo Alto and Check Point, management has been a key sticking point—and as Check Point articulated, the scale and speed of management in a world of billions of smart devices is a critical issue. They also previewed the release of the second generation of their AppID function, a key piece of the next-gen firewall picture. When discussing where they were investing in development for security, they basically said there were no revolutionary changes coming, just more work on paths they’re already moving down: scaling the products/management up, continuing down the virtual path, continuing to improve efficacy, and focusing on mobile (device and infrastructure). The afternoon was spent in product roundtables and 1:1 meetings. The most interesting thing by far that came out of the roundtables was a discussion of SDN and NFV and its impact on security. AT&T announced on April 23rd that Juniper would be part of its “User-Defined Cloud” offering, which uses NFV technology to allow easy (or self) provisioning of network services. Juniper will deliver a virtualized SRX to AT&T customers through the platform, and it’s a bold step overall in delivering security services; it’s certainly, just the tip of the iceberg, and Juniper is at the center of the discussion, which is always a good place to be. Juniper spoke about this deployment but also a longer-term vision where it’s not whole appliances that are virtualized and delivered dynamically, but individual features (firewall, IPS, app control, web security, etc.).
  • 2. CONTINUOUS RESEARCH SERVICE JUNIPER ANALYST DAY REVIEW This is a paid service intended for the recipient organization only; reproduction and sharing with third parties is prohibited. Copyright © 2014 by Infonetics Research, Inc. All rights reserved. Juniper is a well-established veteran in the enterprise and provider security space (holding the number 3 spot in network security based on our data), but they face significant challenges from the bottom (aggressive, nimble, highly focused competition that has capitalized on their mistakes over the last few years) and the top (a 500lb gorilla with the capital and market presence to make massive moves). They have the ingredients and lineage to remain a top-3 player in our tracking. Their emphasis at the analyst event on high-end customers, improving scale, management, and efficacy, and boldly moving toward a world where hardware security appliances aren’t the norm from the core to the edge will help them stay there as we head into the second half of this decade. As always, I invite your comments. Jeff Wilson Principal Analyst, Security +1 (408) 583.3337 jeff@infonetics.com