Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:23 PM
Bob Evans
Bob Evans

Global CIO: Juniper Attacks Cisco Head-On With Help Of IBM And Dell

Sensing Cisco is distracted with its non-networking ventures as CIOs are growing unhappy with rising network costs, Juniper is going after Cisco full-bore with key new products and partners.

"Overall my biggest question for Juniper is how a mid sized company like Juniper competes long term in this ever evolving industry. The majority of Juniper’s competitive environment is huge multifaceted companies like Alcatel Lucent, Cisco, Huawei and others. These companies go to market with a unified wired, wireless and services solution and Juniper, at its size, can’t compete along those lines. The enterprise space has Cisco and HP as well as smaller organizations that are very deep in a certain area (like Brocade in the data center). Juniper again, falls somewhere in the middle. Juniper is too small and doesn’t have the right mindset to grow significantly through acquisition but it’s too big to be an acquisition candidate for all but a few companies, most of which have too much competitive overlap. So for now, the vision of what Juniper announced is fine, but all of us Juniper watchers will be looking to see how quickly they can get there."

As noted earlier in this column, that's certainly the top question: does Juniper have the impact and the clout to sway the thinking of initially dozens and then hundreds of CIOs who, faced with enhancing or even rebuilding their indispensable global networks, will need to know that their networking vendor is unshakably strong in its strategy, its product line, its operations, and its finances?

Enter the alliances with IBM and Dell. Here's Juniper executive vice-president Gerri Elliott on the Juniper-IBM alliance from a blog post she wrote a few months ago:

"IBM will brand and resell Juniper products as part of their overall data center networking portfolio. This OEM relationship is part of our joint strategic and long-term plan to bring Juniper's High-Performance Networking solutions to IBM's enterprise customers. We expect the first IBM branded Juniper products to ship in Q409. . . . IBM and Juniper share a common vision of the data center of the future. Our two companies have been working together in varying capacities to achieve this vision, including the Stratus Project—our initiative to create a single data center fabric that will deliver a quantum leap in scale, performance and simplicity. Additionally, we are researching cloud computing security models to mitigate attacks on corporate data and computer systems."

And here's an overview of what the Juniper-Dell partnership is expected to offer to CIOs, via Zacks Investment Research:

". . . the companies are also planning to work together on standards-based solutions for virtualized data centers . . . . Going forward, Dell will shoulder the responsibility of marketing, servicing and support of networking solutions from Juniper to business entities of different sizes like large enterprise, Small and Medium Businesses (SMB) and Public Sector Organization.

"We believe this joint networking solution from Dell and Juniper will provide significant challenge to Cisco Systems Inc. Some of the equipment from Juniper competes with the market leader Cisco but also with equipment offered by Brocade Communications Systems Inc. Diversification is clearly the key strategy, by which the large enterprises are growing their business portfolio across the globe. We believe that Dell and Juniper will form a great team to offer enhanced networking solutions to the end customer."

Will CIOs be willing to listen? Will they take a chance on the power and promise of Juniper's new technologies and its new and enhanced alliances with IBM and Dell? According to CMO Flaherty, Juniper is planning to do everything in its power to make that happen at the CIO level.

"We know we've had the hearts and minds of the network administrators, and we will continue to love them and meet their needs," Flaherty said. "But we also realize that these days, with the demands companies are placing on their networks, we need to hit higher up the organization as well with business-decision makers at the level of the CIO and the CEO and the CFO. We've got to position ourselves as a strategic player, and then deliver with the products that make that happen."

More choices, more focus, more partners, more competition—sounds like just what CIOs need across the entire IT landscape in 2010.

GlobalCIO Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO,
or write to Bob at [email protected].

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.