Content deleted Content added
USA is deprecated, per MOS:NOTUSA, and correct overlinking of common places using AWB |
Timtempleton (talk | contribs) not a good idea to use a Wikipedia article as a source - replaced with better source, fixed other ref errors, split refs 30em, removed duplicate intra-wiki link, sourced Nir Zuk info, reduced some duplicate text, added logo |
||
Line 1:
{{Infobox company
|name = NetScreen Technologies
|logo = NetScreen_Technologies_logo.jpg
|type = [[Division (business)|Division]]
|fate = Acquired by Juniper Networks
Line 22:
}}
'''NetScreen Technologies''' was an American technology company that was acquired by [[Juniper Networks]] for [[US$]]4 billion stock for stock in 2004.<ref>{{cite web|url=http://www.networkworld.com/edge/news/2004/0209juniscreen.html|title=Juniper acquires NetScreen |date=2004-02
NetScreen Technologies developed [[Application-specific integrated circuit|ASIC]]-based Internet security systems and appliances that delivered high performance firewall, VPN and traffic shaping functionality to Internet data centers, e-business sites, broadband service providers and application service providers. NetScreen was the first firewall manufacturer to develop a gigabit-speed firewall, the NetScreen-1000.<ref>{{cite news| url=http://findarticles.com/p/articles/mi_pwwi/is_20050229/ai_mark01019684/?tag=content;col1 | work=Market Wire | title=Nupremis Deploys The NetScreen-1000 Best Of Breed Security Solution For Global Data Centers | year=2005}}</ref>
Line 31:
Robert Thomas, NetScreen's president and chief executive officer, came to NetScreen in 1998 from Sun Microsystems, where he was General Manager of Intercontinental Operations for Sun's software business, which includes security, networking, and Internet tools.<ref>http://www.highbeam.com/doc/1G1-53230275.html</ref>
Ken Xie left NetScreen in 2000 to found [[Fortinet]], a competing ASIC-based firewall company.<ref>
NetScreen acquired its core IPS technology through the purchase of OneSecure, Inc. for US$45 million in stock in 2002. OneSecure was created by Rakesh Loonkar (subsequently the co-founder of [[Trusteer]]), and Israeli engineer Nir Zuk, who had been one of [[Check Point|Check Point Software]]’s first employees.<ref
In 2003, NetScreen hired Anson Chen as its vice president of research and development. Anson Chen, a 12-year veteran of Cisco Systems, Inc. and its former vice president and general manager of the Network Management and Services Technology Group, lead engineering, research and development efforts for NetScreen's entire product line, including its firewall, IPSec virtual private network (VPN) and intrusion detection and prevention technologies. Chen also had functional management responsibility for NetScreen's secure access products.<ref>http://www.highbeam.com/doc/1G1-131629611.html</ref>
Line 40:
Yan Ke and Feng Deng stayed with Juniper after the acquisition but then left Juniper in 2005 and started Northern Light Venture Capital, a China concept venture capital firm focused on early and growth stage opportunities in TMT, consumer, clean technologies, and life science industries.<ref>http://www.crunchbase.com/person/yan-ke</ref><ref>http://www.nlightvc.com/En/</ref>
Nir Zuk stayed with Juniper after the acquisition but then left in 2005 to start
==2015 "unauthorized code" incident==
{{main article|ScreenOS}}
Analysis of the firmware code has also shown that there could exist a backdoor key using [[Dual_EC_DRBG]] enabling whoever hold that key to passively decrypt traffic encrypted by ScreenOS. This is enabled by some very strange code in ScreenOS, which could possibly be a deliberate backdoor. This possible backdoor still exists in ScreenOS.<ref name="wired-secret-code-in-junipers-firewalls">{{cite web | url=http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | title=Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | author=Kim Zetter | work=Wired | publisher=wired.com | language=English | date=2015-12-18 | accessdate=
In December 2015 Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple root password backdoor, and the other one was changing a point in
==References==
{{reflist|30em}}
{{Juniper Networks}}
|