Content deleted Content added
added section: ==2015 "Unauthorized Code" Incident== |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(31 intermediate revisions by 25 users not shown) | |||
Line 1:
{{Short description|American technology company that was acquired by Juniper Networks}}
{{Infobox company
|name = NetScreen Technologies
|logo = NetScreen_Technologies_logo.jpg
|type = [[Division (business)|Division]]
|fate = Acquired by Juniper Networks
|slogan =
|foundation = 1997
|location_city = [[Sunnyvale, California|Sunnyvale, CA]].
|location_country =
|key_people = [[Ken Xie]], CTO, CEO, and Co-Founder, <br>Yan Ke, Co-Founder, Feng Deng, Co-Founder, Robert Thomas, CEO, Anson Chen, VP R&D, Nir Zuk, CTO
|num_employees =
Line 22 ⟶ 23:
}}
'''NetScreen Technologies''' was an American technology company that was acquired by [[Juniper Networks]] for [[US$]]4 billion stock for stock in 2004.<ref>{{cite
NetScreen Technologies developed [[Application-specific integrated circuit|ASIC]]-based Internet security systems and appliances that delivered high performance firewall, [[VPN]] and traffic shaping functionality to Internet [[data
==History==
NetScreen Technologies was founded by Yan Ke, [[Ken Xie]], and Feng Deng.<ref>[http://www.highbeam.com/doc/1G1-87845891.html HighBeam]{{dead link|date=February 2019|bot=medic}}{{cbignore|bot=medic}}</ref> Ken Xie, Chief Technology Officer and co-founder was also the CEO until Robert Thomas joined in 1998.<ref>[http://www.highbeam.com/doc/1G1-50106034.html HighBeam]{{dead link|date=February 2019|bot=medic}}{{cbignore|bot=medic}}</ref>
Robert Thomas, NetScreen's president and chief executive officer, came to NetScreen in 1998 from [[Sun Microsystems]], where he was General Manager of Intercontinental Operations for Sun's software business, which includes security, networking, and Internet tools.<ref>[http://www.highbeam.com/doc/1G1-53230275.html HighBeam]{{dead link|date=February 2019|bot=medic}}{{cbignore|bot=medic}}</ref>
Ken Xie left NetScreen in 2000 to found [[Fortinet]], a competing ASIC-based firewall company.<ref>
NetScreen acquired its core IPS technology through the purchase of OneSecure, Inc. for US$45 million in stock in 2002. OneSecure was created by Rakesh Loonkar (subsequently the co-founder of [[Trusteer]]), and
In 2003, NetScreen hired Anson Chen as its vice president of research and development.<ref name=":0">{{Cite web|url=http://newsroom.juniper.net/manual-releases/2003/NetScreen-Hires-Vice-President-of-Research-and-Dev|title=NetScreen Hires Vice President of Research and Development; Co-Founder Feng Deng Takes on New Role as Chief Strategy Officer|website=Juniper Networks|access-date=2019-01-28|archive-date=2012-11-02|archive-url=https://web.archive.org/web/20121102063123/http://newsroom.juniper.net/manual-releases/2003/NetScreen-Hires-Vice-President-of-Research-and-Dev|url-status=dead}}</ref> Anson Chen, a 12-year veteran of [[Cisco Systems]], Inc. and
==2015 "unauthorized code" incident==
{{main article|ScreenOS}}
Analysis of the [[firmware]] code in 2015 showed that a backdoor [[Key (cryptography)|key]] could exist using [[Dual_EC_DRBG]]. This would enable whoever held that key to passively decrypt traffic [[encrypted]] by ScreenOS.<ref name="wired-secret-code-in-junipers-firewalls">{{cite magazine | url=https://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | title=Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | author=Kim Zetter | magazine=Wired | publisher=wired.com | language=English | date=2015-12-18 | accessdate=2017-01-05}}</ref>
In December 2015, Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple [[root password]] [[Backdoor (computing)|backdoor]], and the other one was changing a point in Dual_EC_DRBG so that the attackers presumably had the key to use the pre-existing (intentional or unintentional) [[kleptographic]] backdoor in ScreenOS to passively decrypt traffic.<ref>{{Cite web|url=http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html|title=On the Juniper backdoor|date=22 December 2015}}</ref><ref>{{Cite web|url=https://finance.yahoo.com/news/juniper-breach-mystery-starts-clear-130016591.html?guccounter=2|title=Juniper Breach Mystery Starts to Clear with New Details on Hackers and U.S. Role|date=2 September 2021 }}</ref>
==References==
{{reflist|30em}}
{{Juniper Networks}}
[[Category:Juniper Networks]]
[[Category:Defunct computer companies based in California]]
[[Category:
[[Category:Computer companies disestablished in 2004]]
[[Category:Networking hardware companies]]
[[Category:Server appliance]]
[[Category:Computer security companies]]
[[Category:2004 mergers and acquisitions]]
[[Category:2001 initial public offerings]]
[[Category:Defunct computer companies of the United States]]
[[Category:Defunct computer hardware companies]]
|