NetScreen Technologies: Difference between revisions

Content deleted Content added
USA is deprecated, per MOS:NOTUSA, and correct overlinking of common places using AWB
not a good idea to use a Wikipedia article as a source - replaced with better source, fixed other ref errors, split refs 30em, removed duplicate intra-wiki link, sourced Nir Zuk info, reduced some duplicate text, added logo
Line 1:
{{Infobox company
|name = NetScreen Technologies
|logo = NetScreen_Technologies_logo.jpg
|type = [[Division (business)|Division]]
|fate = Acquired by Juniper Networks
Line 22:
}}
 
'''NetScreen Technologies''' was an American technology company that was acquired by [[Juniper Networks]] for [[US$]]4 billion stock for stock in 2004.<ref>{{cite web|url=http://www.networkworld.com/edge/news/2004/0209juniscreen.html|title=Juniper acquires NetScreen |date=2004-02/-09/2004 |publisher=networkworld.com|accessdate=20092017-01-2905}}</ref><ref name="jnprnetscreen">{{cite web|url=http://www.juniper.net/us/en/company/press-center/press-releases/2004/pr-040416.html|title=Juniper Networks Completes Acquisition of NetScreen Technologies and Appoints Frank J. Marshall to the Juniper Networks Board of Directors|date=April 16, 2004|publisher=Juniper Press Release|accessdate=2009-03-05}}</ref>
 
NetScreen Technologies developed [[Application-specific integrated circuit|ASIC]]-based Internet security systems and appliances that delivered high performance firewall, VPN and traffic shaping functionality to Internet data centers, e-business sites, broadband service providers and application service providers. NetScreen was the first firewall manufacturer to develop a gigabit-speed firewall, the NetScreen-1000.<ref>{{cite news| url=http://findarticles.com/p/articles/mi_pwwi/is_20050229/ai_mark01019684/?tag=content;col1 | work=Market Wire | title=Nupremis Deploys The NetScreen-1000 Best Of Breed Security Solution For Global Data Centers | year=2005}}</ref>
Line 31:
Robert Thomas, NetScreen's president and chief executive officer, came to NetScreen in 1998 from Sun Microsystems, where he was General Manager of Intercontinental Operations for Sun's software business, which includes security, networking, and Internet tools.<ref>http://www.highbeam.com/doc/1G1-53230275.html</ref>
 
Ken Xie left NetScreen in 2000 to found [[Fortinet]], a competing ASIC-based firewall company.<ref>[[{{cite web|url=http://www.sramanamitra.com/2010/04/21/putting-china-on-silicon-valley-map-netscreen-and-fortinet-founder-ken-xie-part-1/ |title=Putting China On The Silicon Valley Map: NetScreen And Fortinet]] Founder Ken Xie (Part 1) |website=sramanamitra.com |date=2010-04-21 |accessdate=2017-01-05}}</ref>
 
NetScreen acquired its core IPS technology through the purchase of OneSecure, Inc. for US$45 million in stock in 2002. OneSecure was created by Rakesh Loonkar (subsequently the co-founder of [[Trusteer]]), and Israeli engineer Nir Zuk, who had been one of [[Check Point|Check Point Software]]’s first employees.<ref andname=Nir>{{cite laterweb|url=http://www.itworld.com/article/2756415/careers/how-i-got-here--nir-zuk--cto--palo-alto-networks.html?page=2|title=How wentI onGot toHere: foundNir Zuk, CTO, [[Palo Alto Networks]] |website=itworld.com |date=2010-04-05 |accessdate=2017-01-05}}</ref>
 
In 2003, NetScreen hired Anson Chen as its vice president of research and development. Anson Chen, a 12-year veteran of Cisco Systems, Inc. and its former vice president and general manager of the Network Management and Services Technology Group, lead engineering, research and development efforts for NetScreen's entire product line, including its firewall, IPSec virtual private network (VPN) and intrusion detection and prevention technologies. Chen also had functional management responsibility for NetScreen's secure access products.<ref>http://www.highbeam.com/doc/1G1-131629611.html</ref>
Line 40:
Yan Ke and Feng Deng stayed with Juniper after the acquisition but then left Juniper in 2005 and started Northern Light Venture Capital, a China concept venture capital firm focused on early and growth stage opportunities in TMT, consumer, clean technologies, and life science industries.<ref>http://www.crunchbase.com/person/yan-ke</ref><ref>http://www.nlightvc.com/En/</ref>
 
Nir Zuk stayed with Juniper after the acquisition but then left in 2005 to start a new company, [[Palo Alto Networks]].<ref>http://www.paloaltonetworks.com/company/management.html</ref><ref name =Levi Nir/> Palo Alto Networks products are similar to OneSecure/NetScreen/Juniper's IPS technology as they share a common heritage.{{Citationcitation needed|date=January 2017}}
| title = Nir Zuk to leave Juniper Networks
| url = http://www.ivc-online.com/ivcWeeklyItem.asp?articleID=2829
| date = 2005-03-02
| author = Levi, Ofer
| journal = Globes
}}</ref> Palo Alto Networks products are similar to OneSecure/NetScreen/Juniper's IPS technology as they share a common heritage.
 
==2015 "unauthorized code" incident==
{{main article|ScreenOS}}
Analysis of the firmware code has also shown that there could exist a backdoor key using [[Dual_EC_DRBG]] enabling whoever hold that key to passively decrypt traffic encrypted by ScreenOS. This is enabled by some very strange code in ScreenOS, which could possibly be a deliberate backdoor. This possible backdoor still exists in ScreenOS.<ref name="wired-secret-code-in-junipers-firewalls">{{cite web | url=http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | title=Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | author=Kim Zetter | work=Wired | publisher=wired.com | language=English | date=2015-12-18 | accessdate=20152017-12-25 | archive-url=https://web.archive.org/web/*/http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | archivedate=2015-1201-2505}}</ref>
 
In December 2015 Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple root password backdoor, and the other one was changing a point in [[Dual_EC_DRBG]] so that the attackers presumably had the key to use the preexisting (intentional or unintentional) [[kleptographic]] backdoor in ScreenOS to passively decrypt traffic.<ref>http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html</ref>
 
==References==
{{reflist|30em}}
 
{{Juniper Networks}}