News
News
9/14/2006
09:40 AM
Connect Directly
RSS
E-Mail
50%
50%

Symantec-Juniper Mega-Deal: Merger Preview?

In addition to co-marketing each other's products, the two companies will begin to fortify Juniper's networking wares with Symantec's anti-spam technology, IDS/IPS signatures, and vulnerability information and research. Can a full-fledged merger be far behind?

The cooperative agreement between Juniper and Symantec calls for the following:

Co-development of UTM and IPS
Expanding the support for Symantec content on Juniper devices will give users simplified network topologies in the form of fewer devices.

Cooperative building of standards-based access-control and compliance solutions
Includes provisions for support of the Trusted Network Connect (TNC) open standard, a set of network access-control specifications that enable the application and enforcement of security requirements for network endpoints.

Collaboration on security and threat research
Juniper's J-Security worldwide team will partner with Symantec's Global Intelligence Network to create IPS signatures for Juniper's appliances. The pair will also work to root out emerging network and application threats.

Participation in cooperative sales and marketing efforts
Symantec will recommend Juniper's Integrated Security and IDP appliances to enterprise customers. Juniper will market and sell Symantec's security content as part of its Integrated Security Solutions portfolio.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.