Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/19/2006
02:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Juniper & Aruba Secure Partnership

Networking companies to take on 'mutual enemy' Cisco in the WiFi security space

Wireless LAN switching startup Aruba Networks has inked a partnership deal with networking big fish Juniper Networks to jointly sell and market WiFi security equipment to enterprise customers.

Aruba’s marketing VP, Keerti Melkote, says that the deal builds on his firm’s long association with security software provider Funk. Juniper bought Funk last November for $122 million. (See Juniper Gets Funky.)

Melkote says that the pair has signed an interoperability agreement and will market combined product sets to each other’s customers. “Both of us will meet in the channel.”

Under the deal, Aruba will supply its wireless LAN controller and APs; Juniper will bring Funk client and server security software for both wired and wireless networks.

Melkote says that the pact could be beneficial for both companies in taking on Cisco, the partners' chief rival in this end of the market. "Cisco is the mutual enemy, so it made a lot of sense.”

Juniper is slowly but surely building out its wireless LAN strategy through these kinds of deals. In addition to offering a couple of home-grown WiFi products, it also has a deal with Meru for voice-over-wireless-LAN technology. On the carrier side, Juniper has a public access hotspot deal with Colubris, a company that has been particularly quiet of late.

The Aruba-Juniper deal is another sign of the changes in the WiFi security market. Startups initially rule the space, but Cisco and Juniper, along with IBM and others, have recently begun to jump in. Startups have been changing their tactics, and even merging, in order to compete more effectively.

— Dan Jones, Site Editor, Unstrung

Organizations mentioned in this article:

  • Aruba Wireless Networks
  • Cisco Systems Inc. (Nasdaq: CSCO)
  • Colubris Networks Inc.
  • Juniper Networks Inc. (Nasdaq: JNPR)
  • Meru Networks Inc.

    Dan is to hats what Will.I.Am is to ridiculous eyewear. Fedora, trilby, tam-o-shanter -- all have graced the Jones pate during his career as the go-to purveyor of mobile essentials. But hey, Dan is so much more than 4G maps and state-of-the-art headgear. Before joining the ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 11/19/2020
    New Proposed DNS Security Features Released
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
    The Yellow Brick Road to Risk Management
    Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: He hits the gong anytime he sees someone click on an email link.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-29128
    PUBLISHED: 2020-11-26
    petl before 1.68, in some configurations, allows resolution of entities in an XML document.
    CVE-2020-27251
    PUBLISHED: 2020-11-26
    A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.
    CVE-2020-27253
    PUBLISHED: 2020-11-26
    A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.
    CVE-2020-27255
    PUBLISHED: 2020-11-26
    A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the b...
    CVE-2020-25651
    PUBLISHED: 2020-11-26
    A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest...