Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security //


04:23 PM
Curtis Franklin
Curtis Franklin
Curt Franklin

Cloud Pumps Up Juniper's Q4

The transition to cloud infrastructure helped Juniper overcome a drop in security sales in the fourth quarter of 2016.

If you're bullish on the cloud, the fourth-quarter earnings report from Juniper Networks, released Thursday, will have looked promising. And if your primary focus is cybersecurity, the challenges Juniper has faced will be revealing, if not shocking.

Juniper Networks reported fourth-quarter revenues of nearly $1.4 billion, an increase of 5% compared with the same quarter a year earlier. For the full year, revenues were $4.9 billion, a 3% increase over 2015.

The vendor's revenue mix provides the greatest insight into where the market action is currently and where it's headed for Juniper. In the fourth quarter, $978 million in revenues came from service providers, while $407 million was generated by enterprise customers. The service provider revenues were up by 15% compared with the third quarter, and up 5% year-on-year, while the revenues from the enterprise business declined by 5% quarter-on-quarter but grew also by 5% year-on-year.

Juniper noted that, of its ten largest customers in the fourth quarter, five were cloud providers, three were telcos, and two were enterprises. In the earnings call with analysts and journalists, CEO Rami Rahim noted that cloud transformation is a primary area of focus for the company, regardless of the customer type. In a response to an analyst question, Rahim said, "Cloud vertical and cloud transformation are the biggest drivers of strategy" at the company.

Even among Juniper's telecoms operator customers, executives said, the push to cloud is a major sales driver. As telcos shift more of their infrastructure to a cloud-based, SDN-controlled architectures, the balance of their product choice changes. "The demand for cloud services is growing rapidly and cloud customers value high performance infrastructure," Rahim said. "As telcos evolve to cloud infrastructure, they'll delay investment in traditional infrastructure." The net result for Juniper is not an increase in overall sales to telecom companies, but a dramatic shift in the products sold to that vertical.

Want to know more about the companies, people and organizations driving developments in the virtualization sector? Check out Virtuapedia, the most comprehensive online resource covering the virtualization industry.

The one area in which Juniper saw a dramatic drop in sales was security hardware. Rahim said, "Security did worse in 2016 because we mis-timed the transition [to cloud]. In the 3 year period it won't grow as well as predicted because of the slow start." In spite of that, Rahim did say that the company predicts that its security business will grow in 2017 and will continue to grow in subsequent years.

Overall, Rahim said the company is seeing solid growth in its QFX series of switches. In many customer cases, the switches are, "…still being evaluated and tested, customers are becoming more confident," Rahim said. "Some are net-new customers. In other cases they've been relying on relationships with existing customers who now have the ability to take advantage of the switch line that has the same OS and operational model as their routers."

According to Juniper, its largest customer base and sales growth remains in North America, where there is a greater concentration of hyper-scale cloud service providers than in the rest of the world. Along with telecoms, those companies are seen as remaining at the heart of Juniper's customer base for the foreseeable future.

— Curtis Franklin, Security Editor, Light Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-04
An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.
PUBLISHED: 2020-08-04
The administrative interface of Cohesive Networks vns3:vpn appliances before version 4.11.1 is vulnerable to authenticated remote code execution leading to server compromise.
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.