Juniper Networks is delivering a new network that enables businesses and consumers to maximize the potential of their products and services and meets the infrastructure needs of the next decade.T: And many companies are already taking advantage of the potential the new network provides.
Everywhere we look, we see the same trends and CIO business issues coming up around employee productivity, business agility and cost efficiencies. Much of the time these are driving specific IT initiatives like programs supporting BYOD, turning up new platforms and cloud services, and Infrastructure consolidation with data center and server virtualization projects. Transition: You may have similar initiatives in your organization today
We are also finding that the investment focus for these new initiatives around three key areas: Mobility, Cloud and in the Data Center & Campus & Branch infrastructure. And while these investments are paying off, they also come with some profound impacts to the security of the organization. Transition: Let’s take a look at the security impact of these investment areas.
Each successful exploit has three parts – the attacker, threat type, and target – we continue to see change in each. Attacker - in 2005, we saw a shift starting from attackers wanting notoriety to wanting profitability. Today, cybercrime is fully organized and we see crime syndicates out to profit from attacks. These attackers are now well funded, use sophisticated and purpose built tools and target organizations purely for profit. While this is nothing new, what we are seeing today is a move to not only attack “.gov/.com” but to attack “.me/.you”. Attackers are becoming increasingly sophisticated and are profiling not only companies but also individuals. They understand that we all have online identities but also “phyiscal profiles” or “connection points” where we connect to the internet from a variety of places……work, internet café, airport lounge, home. They have realized that often times our security defenses are down or weak at some of these connection points and penetrating individuals’ devices can work quite well outside of the work place. If you can infect a business user at an internet café and then have them walk that device into the enterprise then you can infiltrate the enterprise infrastructure and bypass many of the defenses that are in place today. Attackers understand this and have adopted their behavior. Threat – The threat landscape is also undergoing a change both in terms of the types of attacks and the sophistication and maturation of existing attacks. As expected, we continue to see new types of attacks to bypass the latest technologies that enterprises deploy.historically, the first large virus outbreak was on the Apple II in 1981. Since then there have been many well documented outbreaks that include the “iLOVEYOU” worm in 2000, SQL Slammer and Blaster worm in 2003 and countless worms, trojans and other forms of malware. Today, DOS has given way to DDOS and newer threats such as rootkits and botnets have taken hold. The most recent threat is APT which is not only a new type of threat but also a new way to profile and attack networks, systems and organizations. While we see new types of attacks we also see the morphing of existing attack types. As an example a few years ago, the majority of malware was in cleartext which could often be detected by AV or IDP solutions. Today over 80% of malware uses encryption, compression or file packing to bypass traditional AV or IDP technologies. Target - Finally, we also see significant changes with attack targets. The new attack targets are often the same as the investment areas that we talked about supporting your key business initiatives. Over the past few years there has been an explosion in devices that attackers target ranging from smart phones, to tablets to cloud services. What is particularly interesting about these new targets is the variation of the architecture of these platforms that ranges from more secure platforms such as the iphone to more open platforms such as the the Android OS. The other primary change we see is around the types of applications being attacked. Historically, most attacks have been focused on traditional corporate application servers and productivity applications such as office. Today, have seen a significant shift to web 2.0 type applications and social networking apps where attackers take advantage of a trusted relationship that is built amongst online users. Once user devices are compromised, they are used to access sensitive information in the data center over the campus and branch networks.Transition: Let’s take a look at an example
Run through the animation: A mobile user checks e-mail on his own iPhone and communicates with friends. He trust the link from his friend and inadvertently becomes infected with malware. After going to work he connects to the corporate network and the attacker, who has taken control over the device, can access sensitive information.Transition: This is not an uncommon story
The security team at his company has been avoiding the issue of what to do about employees using their own consumer devices to improve productivity and it shows. The don’t have the ability to detect malware on the mobile device, they can’t protect the user from cloud-based threats, they can’t control access based on user identity, device and location and the products they do have in place don’t have the coordination to know what is going on. Transistion: This clearly needs a new approach.
The common IT initiatives of BYOD, New Platform and Services, and Infrastructure Consolidation need to shift to deliver three key benefits:Broad coverage across the enterprise, from the device to the cloud to the data centerFlexible deployment options that can be run on as a VM or an appliance, or on a mobile device. Custom fit to deliver security easily where ever it makes the most sense in your environment Security context and coordination that allows the overall system to run in a coordinated fashion, taking contextual information about user identity, location, and device to make better security enforcement decisions.Transition: These are capabilities Juniper offers today. Let’s see where we are heading next.
We introduced a number of innovative new products last year, and have another full set of products we plan to deliver in 2012, including our new Security Design management application and a VM version of the SRX. For a longer term view of our strategic direction, you can expect to see us invest in developing next generation security services, delivering more cloud security service offerings and start to move beyond what we have from context and coordination into security intelligence.Transition: This is an integral part of the overall Juniper company strategy
From a company strategy perspective,Juniper has significant development investments across a wide range of domains for both service provider and enterprise networks. As part of the always protected vision, we consider security as a critical component and area of differentiation in each of these domains. Transition: Bringing it all together, we can build an enterprise that is always protected with Juniper
Juniper provides the critical components to securing your most valued assets by enabling BYOD policies and improve employee productivity and satisfaction with broad protection, by improving business agility with flexible deployment models tailored to your new enterprise, and to improve cost efficiencies with security context and coordination that keeps you always protected from the device to the cloud to the data center.Transition: Let’s go back to our example
When we address the new requirements and provide broad protection, flexible deployment models that can be tailored to your environment and security context and coordination, we can keep you protected and against the dynamic threat landscape. We can now detect malware on the client, we can enforce access to company resources based on the user, device and location, we can control access to sensitive information, and we can take advantage of new cloud services to improve efficiency and reduce costs.Transition: Thanks for letting us share our security direction with you. Please let us know if there are any areas you would us like to cover in greater depth with you or any member of your staff.
AppDOS: Application layer attacks. Looped attacks in applications to bring down services. Example: looped search or looped Shopping Cart additions in an online shop AppFW: Enforcement part. Black list or white list of apps that are allowed. Example: Block usage of Facebook of Telnet.AppQoS: Enforcing bandwidth based on app. Example: Limited downloads from Internet. Set preference for email services or ERP services.AppTrack: Visibility of app usage. Per protocol and also which app per protocol, good support for http.IPS: Anomaly detection, based on signatures and traffic patterns.User Identity Binding: Creating user specific rules (as opposed source IP based rules), we have!Decrypting SSL: We can do it.Blocking Skype: Can be done using multiple methods.
PRELIMINARY FOURTH QUARTER AND FISCAL YEAR 2011 FINANCIAL RESULTS Q4 Financial Highlights: Revenue: $1,120.8 million, down 6% from Q4'10 and up 1% from Q3'11Operating Margin: 11.9% GAAP; 18.6% non-GAAPGAAP Net Income Per Share: $0.18 dilutedNon-GAAP Net Income Per Share: $0.28 diluted, down 33% from Q4'10 and flat from Q3'11 2011 Financial Highlights: Revenue: $4,448.7 million, up 9% from 2010Operating Margin: 13.9% GAAP; 20.6% non-GAAPGAAP Net Income Per Share: $0.79 dilutedNon-GAAP Net Income Per Share: $1.19 diluted, down 10% from 2010 SUNNYVALE, Calif., Jan. 26, 2012 -Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today reported preliminary financial results for the three and twelve months ended December 31, 2011, and provided its outlook for the three months ending March 31, 2012. Net revenues for the fourth quarter of 2011 decreased 6% on a year-over-year basis, and increased 1% sequentially, to $1,120.8 million. For the year ended December 31, 2011, Juniper's revenue increased 9% on a year-over-year basis to $4,448.7 million. The Company posted GAAP net income of $96.2 million, or $0.18 per diluted share, and non-GAAP net income of $150.1 million, or $0.28 per diluted share, for the fourth quarter of 2011. Included in the GAAP diluted earnings per share was a $0.02 cents impact for restructuring and other charges. Non-GAAP net income per diluted share decreased 33% compared to the fourth quarter of 2010 and was flat compared to the third quarter of 2011. For the year ended December 31, 2011, GAAP net income was $425.1 million, or $0.79 per diluted share, and non-GAAP net income was $644.6 million, or $1.19 per diluted share. Non-GAAP net income per diluted share for the year ended December 31, 2011 decreased 10% on a year-over-year basis. The reconciliation between GAAP and non-GAAP results of operations is provided in a table immediately following the Share-Based Compensation Related Payroll Tax by Category table below. "While the fourth quarter was softer than we had anticipated primarily due to weak demand from service providers, Juniper delivered record revenues in a year where macro economic uncertainty increased as the year unfolded," said Kevin Johnson, president and CEO. “During the year, we introduced innovative new products across our portfolio that we believe will enable Juniper to continue to grow faster than the markets we serve. We are confident in our strategy and our innovation pipeline, and we remain committed to delivering differentiated solutions that are highly relevant to our customers.”Juniper’s GAAP operating margin for the fourth quarter of 2011 was 11.9% compared to 12.4% in the third quarter of 2011, and 19.1% in the prior year fourth quarter. Non-GAAP operating margin for the fourth quarter of 2011 was 18.6% compared to 20.0% in the third quarter of 2011, and 24.5% in the prior year fourth quarter. For the fiscal year 2011, Juniper's GAAP operating margin was 13.9% compared to 18.8% for the prior fiscal year. Non-GAAP operating margin for the fiscal year 2011 was 20.6% compared to 24.0% in the fiscal year 2010. "The December quarter was an atypical and unexpectedly weak finish to the year, with reduced spending by some of our largest customers.” said Robyn Denholm, Juniper's chief financial officer. “While long-term industry fundamentals remain strong, we expect the near-term environment to remain challenging. We will invest in support of our strategy while continuing our focus on execution and prudent cost management.” Other Financial HighlightsTotal cash, cash equivalents and investments as of the fourth quarter of 2011 was $4,292.4 million, compared to $4,130.3 million as of the third quarter of 2011 and $2,821.6 million as of the fourth quarter of 2010. Juniper generated net cash from operations in the fourth quarter of 2011 of $243.6 million, compared to net cash provided by operations of $185.2 million in the third quarter of 2011, and $371.0 million in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper generated net cash from operations of $986.7 million, compared to $812.3 million in 2010. Days sales outstanding in accounts receivable (“DSO”) was 46 days in the fourth quarter of 2011, compared to 36 days in the prior quarter and 45 days in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper repurchased 17.5 million shares, at an average share price of $30.93 per share, for a total of $541.2 million, which largely offset stock issued through our employee equity programs. Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fourth quarter of 2011, were $78.4 million and $43.3 million, respectively. Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fiscal year 2011, were $266.3 million and $169.3 million, respectively.
Juniper Provision - 13martie2012
ALWAYS PROTECTEDPERVASIVE SECURITYFROM THE DEVICE TO THE CLOUD TO THE DATA CENTERFredrik LyhagenPartner Account Manager