Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Juniper Chief Touts SOA

Kriens tells Interop crowd that Services Oriented Architecture will drive major shifts in security, infrastructure

NEW YORK -- For the CEO and chairman of one of networking's biggest vendors, Juniper's Scott Kriens did a lot of wondering aloud today.

"What's the next big thing in IT? What's going to send the market back upward again?" Kriens asked today during his opening keynote. "I think it's SOA [Services Oriented Architecture]. I think applications are more important than infrastructure."

The networking and security spaces in the future will be driven by the need for businesses to link applications to increase speed and flexibility of business objectives, Kriens said. Businesses need to speed their response times and be able to change priorities quickly, he added. And that means changing the way applications operate. And that means changing the way network infrastructure and security work.

Kriens pointed to projections by Gartner that SOA will provide the basis of 80 percent of new software development projects across the industry by 2008. The Yankee Group estimates that SOA applications will be an $11 billion business by 2011. And that's convinced Kriens that SOA will be the catalyst needed to send the IT industry back upward again, following its post-Internet-boom crash.

"There's a big thing looming out there, and this is it," he said.

The sea change will occur as the IT industry -- which currently spends about 70 percent of budgets on infrastructure, rather than app development, according to Gartner -- moves toward an application-oriented business model, Kriens said. He cited figures from Cimi Corp. which indicate that only 20 percent of companies have an adequate infrastructure to support SOA. "The change has to start with infrastructure because of its disproportionate role in the budget."

As SOA takes hold, enterprises will look for ways to implement networking and security that are extremely flexible and can change quickly, Kriens said. "What's important to security is making a faster response to threats and getting better, more complete coverage of the end points." Juniper's recently announced partnership with Symantec is designed to speed the development of these answers, he said. (See Symantec & Juniper Join Forces.)

Kriens said the evolution of the SOA infrastructure would be faster if his fellow vendors (he didn’t mention any names) would stop promising the moon. "These vendors keep saying they have the answer to all things, and that causes the buyers to write RFPs asking for the impossible."

"I challenge my fellow vendors -- let's do away with the PowerPoint promises and develop a real understanding of the business problem," Kriens said. "Hopefully, that will lead to real collaboration, a commitment to open standards, real solutions, and real progress."

— Tim Wilson, Site Editor, Dark Reading

  • Juniper Networks Inc. (Nasdaq: JNPR)
  • Symantec Corp. (Nasdaq: SYMC)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio


    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/13/2020
    Omdia Research Launches Page on Dark Reading
    Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
    Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
    Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-13
    The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
    PUBLISHED: 2020-07-13
    The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
    PUBLISHED: 2020-07-13
    An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
    PUBLISHED: 2020-07-13
    The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
    PUBLISHED: 2020-07-13
    A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.