Fact-checked by Grok 2 weeks ago

NetScreen Technologies

NetScreen Technologies, Inc. was an American computer networking company that developed and marketed purpose-built security appliances for firewalls, virtual private networks (VPNs), and intrusion detection. Founded in 1997 by and headquartered in , the company pioneered the use of application-specific integrated circuits () to deliver high-performance network protection superior to software-based alternatives prevalent at the time. NetScreen went public on in 2001 under the ticker NSCN and rapidly grew its market share in enterprise and carrier security solutions. Its defining achievement was innovating hardware-accelerated security systems that addressed the performance bottlenecks of early internet-era threats, culminating in its acquisition by in 2004 for approximately $4 billion in stock, one of the largest technology mergers of the period.

Founding and Early Years

Establishment and Key Founders

NetScreen Technologies was founded in 1996 by , Yan Ke, and Feng Deng, all alumni of , with initial operations in the . The company emerged from Xie's prior experience with software at his 1993 startup, Systems Integration Solutions (), where he identified scalability and performance constraints in processor-based security solutions running on general-purpose servers. To overcome these, Xie prototyped the industry's first (ASIC)-based and VPN appliance in his Palo Alto garage that year, laying the groundwork for hardware-accelerated products. Xie served as NetScreen's inaugural president, CEO, and from 1996 to 1999, directing early engineering efforts toward dedicated security processors that integrated , VPN, and functions at wire-speed performance. Yan Ke and Feng Deng contributed to core technical development, with Deng later holding the role of . The venture capitalized on rising demand for secure remote access amid the boom, positioning NetScreen to ship its first products in 1998 and achieve rapid market traction through ASIC innovation over software emulation. By formal incorporation as Netscreen Technologies, Inc., the firm relocated headquarters to , focusing exclusively on purpose-built appliances rather than retrofitting commodity hardware.

Initial Product Development

NetScreen Technologies, established in , prioritized the creation of dedicated hardware appliances for from its inception, aiming to integrate protection, VPN encryption, and into compact, high-performance devices. Unlike prevailing software-based s that relied on general-purpose CPUs and suffered from processing limitations at higher speeds, NetScreen's engineers developed custom to accelerate packet inspection, decryption, and policy enforcement, enabling throughput rates that exceeded competitors by orders of magnitude. This hardware-centric architecture stemmed from the founders' backgrounds in chip design and networking, including Feng Deng's prior experience at , which informed the optimization of silicon for security workloads. The company's inaugural products emphasized scalability for enterprise environments, with the NetScreen-1000 series representing a breakthrough as the first capable of sustaining gigabit-per-second speeds while maintaining full security features. This appliance combined stateful packet filtering, VPN termination, and quality-of-service mechanisms in a single unit, reducing complexity and cost for deployments over links. Early development involved iterative ASIC prototyping to balance security depth—such as for application-layer threats—with minimal latency, a necessity as volumes surged in the late . Prototyping and testing occurred in , where the small team refined firmware and hardware integrations to ensure reliability under load, drawing on custom operating systems tailored for embedded security rather than repurposed general OS kernels. By shipping initial units to beta customers around 1998–1999, NetScreen validated its approach, achieving performance metrics like 1 Gbps firewall throughput that outpaced software alternatives by factors of 10 or more in independent benchmarks. This focus on ASIC acceleration not only differentiated the products but also laid the groundwork for subsequent lines, establishing NetScreen as a pioneer in appliance-based security before its 2001 IPO.

Growth and Commercial Success

Market Expansion and Milestones

NetScreen Technologies achieved substantial revenue growth during its early commercial phase, expanding from $5.9 million in fiscal year 1999 to $26.6 million in 2000, $85.6 million in 2001, $138.5 million in 2002, and $245.3 million in 2003, reflecting a 77% year-over-year increase in the final year reported. This expansion was driven by increasing demand for its ASIC-based appliances in and markets, with hardware unit shipments rising from approximately 74,000 in 2002 to 128,000 in 2003. Geographic market penetration accelerated significantly, with international revenues comprising 46.8% of total sales in 2001, 55.3% in 2002, and 60.6% in 2003. In fiscal 2003, generated 38.5% of revenue ($94.4 million), bolstered by strong performance in where NetScreen held the top position among firewall vendors according to data; , , and contributed 22.1% ($54.2 million); while the accounted for 39.4% ($96.7 million). The company targeted key vertical sectors including , government agencies, , and firms, achieving notable gains in these areas across the and . Key milestones included the on December 17, 2001, which raised $168.6 million through the sale of 11.5 million shares at $16 each, providing capital for further scaling operations. In September 2002, NetScreen acquired OneSecure, Inc. for $60.8 million, integrating intrusion detection and prevention technologies to broaden its security offerings and support market diversification. The acquisition of Neoteris, Inc. on November 14, 2003, for $20 million in cash plus 9.7 million shares (with potential additional $30 million contingent on revenue targets), added SSL VPN capabilities and expanded remote access solutions for enterprise customers. Financially, the company reached its first GAAP-profitable quarter ending December 31, 2002, and reported $51.5 million in net income for fiscal 2003, alongside $85 million in , signaling operational maturity amid sustained expansion.

Competitive Landscape

In the late 1990s and early 2000s, the firewall and VPN appliance market was primarily dominated by Cisco Systems' PIX hardware firewalls and Software Technologies' Firewall-1, which held leading positions through scalable software-based stateful inspection deployed on various hardware platforms. also competed effectively by integrating Check Point's software onto its appliances with hardware acceleration and high-availability features via VRRP clustering. NetScreen Technologies positioned itself as a performance-oriented challenger, leveraging custom for packet processing to deliver superior throughput—such as the first gigabit-speed firewalls—and lower relative to software-heavy rivals like , which initially lacked comparable hardware optimization. Its 10-K filing identified and as core competitors in firewall/VPN and intrusion detection/prevention segments, where NetScreen targeted enterprises needing integrated, high-speed appliances over modular or general-purpose systems. By 2002, NetScreen achieved a 57% in the high-end firewall segment for deployments exceeding $50,000, capitalizing on rising demands that exposed issues in legacy solutions. , claiming 41% of the overall market in 2000, dismissed NetScreen as a marginal player despite performance benchmarks showing NetScreen-500 matching or exceeding VPN-1 Pro in throughput for certain packet sizes. Emerging vendors like offered SMB-focused alternatives, but the landscape emphasized a shift toward dedicated appliances amid growing threats and needs. This rivalry accelerated features like centralized management, with NetScreen later adopting GUI-driven platforms to rival 's Provider-1.

Core Technologies and Innovations

ASIC-Based Security Appliances

NetScreen Technologies differentiated its security appliances through the integration of custom-designed Application-Specific Integrated Circuits (), which enabled hardware-accelerated processing of policies, VPN , and tasks, achieving throughput levels unattainable by contemporary software-only solutions running on general-purpose processors. The company's GigaScreen ASIC family formed the core of this architecture, performing policy lookups and cryptographic operations directly in to minimize latency and maximize packet-per-second rates. This hardware-centric approach addressed the performance bottlenecks inherent in software , where CPU cycles were divided among , , and other functions, often resulting in sub-line-rate speeds under load. The initial GigaScreen ASIC, introduced in early appliances, accelerated and decisions, supporting scalable deployments for and carrier environments. Subsequent iterations evolved the technology: the second-generation GigaScreen in the NetScreen-500 series provided enhanced acceleration and policy processing, delivering up to 700 Mbps throughput with large packets. The third-generation variant underpinned the NetScreen-5000 series, incorporating distributed processing across multiple modules for scalability in data centers. By the fourth in the ISG 2000 series, the GigaScreen3 ASIC integrated session balancing across security modules with dual-GHz processors, enabling gigabit-level VPN and performance while maintaining low . These advancements stemmed from NetScreen's founding focus on optimization, as articulated by co-founder , who developed the first ASIC-based prototype in 1996. Compared to competitors' software-based firewalls, NetScreen's offered superior efficiency by offloading compute-intensive tasks like and 3DES/ encryption to dedicated hardware, reducing overhead and enabling wire-speed operation even with enabled features. For instance, hardware policy engines processed access control lists in parallel, avoiding the serial bottlenecks of systems, which could degrade to 10-20% of line rate under encrypted traffic. This was particularly evident in high-volume scenarios, where GigaScreen-equipped appliances sustained multi-gigabit throughput without session drops, a capability validated in independent tests and deployments. However, the ASIC reliance also meant firmware updates required careful validation to avoid compatibility issues with evolving threat landscapes, though NetScreen's ScreenOS operating system mitigated this through modular integration. Overall, the ASIC foundation propelled NetScreen's market leadership in purpose-built hardware during the late 1990s and early 2000s.

Firewall, VPN, and Traffic Management Features

NetScreen security appliances integrated , VPN, and functionalities through the ScreenOS operating system, enabling high-performance security on a unified platform. The utilized stateful to monitor the state of network connections, enforcing security policies that permitted or blocked packets based on context such as source, destination, and session history. This approach provided robust defense against unauthorized intrusions and Denial-of-Service () attacks by maintaining connection tables and inspecting packet payloads for anomalies. Appliances supported both routed and transparent modes, allowing deployment as a Layer 3 router or Layer 2 without altering existing addressing schemes. Advanced firewall protections included detection of protocol-based exploits, such as attacks, Teardrop fragmentation issues, and floods, integrated into the core inspection engine. Later models incorporated Unified Threat Management (UTM) extensions, adding capabilities like antivirus scanning, anti-spyware, and intrusion prevention to complement basic stateful filtering. Performance scaled with hardware; for instance, the NetScreen-50 delivered 170 Mbps of firewall throughput, suitable for small to medium enterprises protecting LANs and public-facing servers. The VPN subsystem supported standards for secure site-to-site and remote access tunnels, certified by the VPN Consortium (VPNC) for interoperability. It handled encryption protocols including 3DES and , with configurable policies for via pre-shared keys or certificates. ScreenOS enabled both policy-based VPNs, tying tunnels directly to access rules, and route-based VPNs using virtual tunnel interfaces for flexible routing integration. Throughput examples included 50 Mbps for 3DES on the NetScreen-50, supporting up to 64,000 concurrent sessions across models. Features like Auto Connect VPN facilitated dynamic hub-and-spoke topologies, automating tunnel establishment and . Traffic management capabilities focused on shaping and to optimize usage amid or attacks. QoS policies allowed administrators to enforce maximum limits per physical , preventing any single from monopolizing resources, though guaranteed minimum was not natively supported in core implementations. Integrated and screened and rate-limited suspicious at wire speed, preserving legitimate . These functions operated seamlessly with and VPN rules, enabling zone-based policies for differential treatment of classes in environments.

Acquisition and Integration

Negotiations and Deal Structure

On August 2003, preliminary discussions between and NetScreen Technologies regarding a potential acquisition began, as documented in subsequent filings. Informal negotiations between Juniper CEO Scott Kriens and NetScreen CEO occurred in casual settings, including over coffee at a restaurant. These talks progressed to formal agreement by early 2004, culminating in a definitive merger agreement signed on February 9, 2004. The transaction was structured as a stock-for-stock merger, with Juniper issuing shares to NetScreen shareholders at a fixed exchange ratio of 1.404 shares of Juniper for each outstanding share of NetScreen . Based on Juniper's closing stock price of $29.47 on February 6, 2004—the last trading day before the announcement—this valued NetScreen shares at approximately $41.37, representing a 57% premium over NetScreen's closing price of $26.40 on that date. The total deal value was estimated at $4 billion, marking it as one of the largest mergers since the Hewlett-Packard-Compaq combination. Closing was conditioned on approval by both companies' stockholders, regulatory clearances including Hart-Scott-Rodino antitrust review, and other customary conditions, with completion anticipated in the second quarter of 2004. The merger received early termination of the HSR waiting period on March 16, 2004, facilitating regulatory progress. Juniper executives described the deal as accretive on a non-GAAP basis, emphasizing complementary strengths in and without detailing further negotiation dynamics.

Post-Acquisition Developments

Following the acquisition's completion on April 16, 2004, pursued integration of NetScreen Technologies by combining operational strengths without immediate consolidation of product lines, aiming to develop "best in class" integrated networking and security devices while maintaining NetScreen's dedicated security focus. Juniper CFO Marcel Gani projected full sales integration within six months, leveraging the combined entity's projected Q1 2004 revenue of $270–$275 million from Juniper's $224.1 million and NetScreen's $93.5 million. No major layoffs were planned, with emphasis on preserving NetScreen's enterprise security expertise to compete against integrated rivals like Cisco Systems. Juniper sustained and advanced NetScreen's core ScreenOS operating system, issuing version 5.1 on October 22, 2004, followed by subsequent releases including 6.0 and 6.1 supporting expanded compatibility. The company evolved NetScreen's into the SSG (Secure Services Gateway) series, introduced as the second-generation running ScreenOS, which enhanced performance for , VPN, and intrusion prevention features across small to mid-sized deployments. These developments extended NetScreen's ASIC-based appliances into Juniper's broader portfolio, with ScreenOS updates continuing into the late to address evolving threats and . By 2008, Juniper shifted toward unification with the launch of the SRX Series Services Gateways, operating on the and incorporating NetScreen-derived security capabilities such as stateful firewalls and VPN termination alongside routing functions for branch and high-end environments. This marked a transition from standalone ScreenOS appliances to converged platforms, with Juniper providing dedicated NetScreen-to-SRX migration services to assist customers in configuration translation and feature parity. ScreenOS legacy support persisted, with version 6.3's end-of-engineering extended and end-of-support set for May 1, 2021, allowing prolonged deployment of NetScreen and SSG hardware amid the phased adoption of SRX.

Legacy and Industry Impact

Contributions to Cybersecurity

NetScreen Technologies pioneered the development of application-specific integrated circuit (ASIC)-based security appliances, introducing the first such firewall in 1996, which enabled hardware-accelerated processing of firewall policies and encryption algorithms at near-wire-speed performance without the bottlenecks of software-only solutions. This innovation shifted network security from general-purpose processors to dedicated hardware, supporting high capacities such as 128,000 concurrent sessions and 1,000 VPN tunnels on mid-range models like the NetScreen-100, while minimizing latency even under 3DES encryption. By offloading security computations to custom ASICs tightly integrated with the ScreenOS operating system, NetScreen eliminated unnecessary software layers, reducing potential vulnerabilities and enhancing reliability in enterprise deployments. ScreenOS further contributed through advanced features like configurable security zones—up to six on models such as the NetScreen-5GT—allowing flexible segmentation of networks into trust/untrust areas with OSI Layer 2/3 policies, instant rule application without delays, and protocol for threats including floods and attacks. These appliances integrated unified threat management (UTM) capabilities, such as optional anti-virus, anti-spam, and web filtering, alongside stateful inspection certified by ICSA Labs, enabling comprehensive protection in a single device rather than layered software approaches prevalent at the time. NetScreen's hardware-centric design also supported scalable VPN deployments, processing and efficiently for carriers and enterprises. The company's technologies established benchmarks for in cybersecurity , influencing subsequent generations of firewalls by demonstrating the viability of ASIC for and paving the way for alumni-founded firms like and to build on similar hardware-software integration principles. By , NetScreen's innovations had driven $223 million in annual revenue, underscoring their role in commercializing high-throughput solutions amid rising threats.

Alumni Networks and Derivative Companies

Former employees of NetScreen Technologies, often referred to as the "NetScreen mafia" in cybersecurity circles, have formed an influential informal network that has significantly shaped the industry through entrepreneurial ventures. This group, drawing from NetScreen's early engineering and leadership talent—many with roots in —has leveraged expertise in ASIC-based firewalls and to launch multiple high-profile companies post-NetScreen's 2004 acquisition by . Key derivative companies include , founded in 2000 by and Michael Xie, who co-founded NetScreen in 1997 before departing to pioneer unified threat management solutions using custom . has grown into a major cybersecurity firm, emphasizing integrated security platforms. was co-founded in 2005 by Nir Zuk, NetScreen's CTO following the 2002 acquisition of his prior startup OneSecure by NetScreen. Zuk's work at NetScreen informed his vision for next-generation firewalls that inspect traffic by application, user, and content, disrupting traditional port-based security models. Other notable ventures by NetScreen alumni encompass Hillstone Networks, established by former employees Tim Liu, DongPing Luo, and Zhong Wang to develop next-generation firewalls and cloud security; (later Stellar Cyber) involving Changming Liu and Adam Conway, focusing on wireless networking and AI-driven security operations; vArmour (rebranded Mammoth Cybersecurity) led by Michael Shieh for security; and InfinyOn by A.J. Hunyady, targeting streaming and edge security. These firms highlight the alumni network's emphasis on scalable, hardware-accelerated security innovations.
CompanyKey NetScreen Alumni Founders/RolesFounding YearFocus Area
Fortinet (co-founder), (co-founder)2000Unified threat management
Palo Alto NetworksNir Zuk (CTO)2005Next-gen firewalls
Hillstone NetworksTim Liu, DongPing Luo, Zhong Wang (employees)2006NGFW and cloud
Aerohive/Stellar CyberChangming Liu (Sr. Manager), Adam Conway ()2006 (Aerohive)/AI ops
vArmour/MammothMichael Shieh (Manager)2011SDN
InfinyOnA.J. Hunyady (Manager)2019/edge
This ecosystem underscores NetScreen's legacy in fostering serial entrepreneurs who advanced hardware-centric cybersecurity paradigms.

Security Vulnerabilities and Controversies

2015 ScreenOS Unauthorized Code Incident

In December 2015, Juniper Networks announced the discovery of unauthorized code within ScreenOS, the operating system powering NetScreen firewalls, during an internal code review. The code enabled two primary vulnerabilities: an authentication bypass mechanism and alterations to the Dual_EC_DRBG pseudorandom number generator used for VPN encryption. Juniper described the insertions as non-standard modifications not introduced by their engineering teams, potentially allowing remote attackers to compromise devices and decrypt traffic without detection. The authentication backdoor, designated CVE-2015-7755, permitted unauthorized remote administrative access via SSH or sessions. Attackers could exploit it by supplying any username paired with a hardcoded backdoor password in the format <<< %s(un='%s') = %u, which triggered a strcmp function check granting an interactive root shell. This affected ScreenOS versions 6.3.0r17 through r20 (initially reported as broader ranges including 6.2.0r15–r18 and 6.3.0r12–r20). Exploitation required network access to the management interface but could lead to full device control, including traffic monitoring, rule modifications, or denial-of-service conditions. Separately, the tampered implementation compromised SSL VPN and encryption integrity. Researchers determined that attackers had altered the algorithm's Q point parameter, exploiting known weaknesses in —originally standardized with NSA influence and criticized since 2007 for predictability with minimal output observation. Combined with ScreenOS's failure to use a secure fallback generator, this allowed decryption of VPN sessions using just 32 bytes of keystream data, assuming knowledge of a secret multiplier 'e' tied to the Q point. The changes deviated from prior clean implementations in older ScreenOS versions, indicating post-deployment tampering. Juniper responded by issuing an out-of-cycle security bulletin on December 17, 2015, urging immediate upgrades to patched releases such as ScreenOS 6.3.0r21 or later, which rebuilt affected components without the unauthorized modifications. Additional mitigations included disabling Telnet/SSH exposure, monitoring logs for suspicious admin logins, and implementing intrusion detection signatures for backdoor attempts. However, the patch retained Dual_EC_DRBG without fully addressing configuration flaws, leaving residual risks. Attribution remains unconfirmed by Juniper, though security analysts linked the RNG flaws to NSA-designed backdoors in Dual_EC while speculating on supply-chain insertion by nation-state actors, without conclusive evidence. The incident highlighted vulnerabilities in legacy NetScreen-derived systems still deployed in enterprise environments.

References

  1. [1]
    Juniper acquires NetScreen | Network World
    Feb 9, 2004 · Juniper this week said it signed an agreement to acquire NetScreen Technologies for $4 billion in stock.Missing: founders | Show results with:founders
  2. [2]
    Ken Xie | Board of Directors | Fortinet, Inc.
    Prior to cofounding Fortinet, Mr. Ken Xie was the Founder, President and Chief Executive Officer of NetScreen Technologies, Inc., a provider of network security ...
  3. [3]
    Ken Xie - Committee of 100
    Ken lead NetScreen developed industry's first ASIC and dedicated hardware systems for high performance firewall and VPNs. NetScreen (NASDAQ: NSCN) later was ...
  4. [4]
    NetScreen Technologies - Products, Competitors, Financials ...
    NetScreen Technologies was founded in 1997. Where is NetScreen Technologies's headquarters? NetScreen Technologies's headquarters is located at 805 11th Avenue, ...
  5. [5]
    [PDF] NETSCREEN TECHNOLOGIES INC - Cloudfront.net
    NetScreen Technologies is a leading developer of network security and access solutions for enterprises and carriers worldwide. NetScreen is.Missing: founded headquarters
  6. [6]
    Fenwick Represents NetScreen in $4.0B Acquisition By…
    Feb 9, 2004 · The acquisition is subject to regulatory review and other customary closing conditions and is expected to close by the end of May 2004.
  7. [7]
    Follow the people: @stake, NetScreen, IBM, Israel Defense Forces ...
    Oct 23, 2023 · NetScreen Technologies was founded in 1997 by Tsinghua alumni Yan Ke, Ken Xie, and Feng Deng and went on to become one of the most impactful ...
  8. [8]
    Ken Xie & family - Forbes
    He started another cybersecurity firm, NetScreen, three years later, before founding Fortinet with brother Michael Xie in 2000. The California-based company ...
  9. [9]
    Ken Xie: A Masterclass in Cybersecurity Excellence | Cyber Magazine
    Oct 4, 2024 · First founded alongside his brother and current Chief Technology Officer, Michael Xie, Ken has served as the company's CEO since 2000. The ...
  10. [10]
    [PDF] Ken Q. Xie - Frontiers of Engineering
    May 20, 2015 · 1996 – 1999: Founder, President & CEO, NetScreen Technologies, Inc. Architected industry's first network security ASIC appliance and dedicated ...<|control11|><|separator|>
  11. [11]
    Netscreen - 2025 Company Profile, Team, Funding & Competitors
    Jul 14, 2025 · The founders of Netscreen are Feng Deng, Ken Xie and Ke Yan. Here are the details of Netscreen's key team members: Feng Deng: Co-Founder & CSO ...Missing: history | Show results with:history
  12. [12]
  13. [13]
    NetScreen 2025 Company Profile: Valuation, Investors, Acquisition
    NetScreen was acquired on 16-Apr-2004. Who acquired NetScreen? NetScreen was acquired by Juniper Networks. Data Transparency.Missing: founders | Show results with:founders
  14. [14]
    Netscreen Firewall - an overview | ScienceDirect Topics
    The NetScreen product line is robust and competitive, and is now part of Juniper Networks. As of April 16,2004, Juniper Networks completed its purchase of ...
  15. [15]
    A Practical History of the Firewall - Part 3 - FireMon
    Apr 9, 2024 · Netscreenintroduced the purpose-built firewall “appliance.” By controlling the hardware, OS and software, they were able to significantly out-perform the ...Missing: development | Show results with:development
  16. [16]
    Asia offers bright spot for NetScreen | South China Morning Post
    NetScreen was co-founded in 1997 by former Intel chip designer Feng Deng and former Cisco software engineer Yan Ke, both graduates of China's Tsinghua ...
  17. [17]
    NetScreen Technologies company information, funding & investors
    Launch date. 1997. Employees. 10001+ people ... A key milestone was the development of the NetScreen-1000, the industry's first gigabit-speed firewall.
  18. [18]
    Ex-NetScreen CEO joins start-up - CNET
    Sep 23, 2004 · NetScreen was one of the first companies to introduce a product that allowed customers to buy a single device that offered several security ...
  19. [19]
    The history of Juniper Networks: innovation and growth
    Jan 28, 2025 · One key acquisition that helped Juniper expand its existing portfolio was the network security company NetScreen Technologies.Missing: achievements | Show results with:achievements
  20. [20]
    Juniper to Acquire NetScreen - Spectrum Equity
    Juniper Networks Inc. said it agreed to acquire NetScreen Technologies Inc. ... Juniper was an early investor in NetScreen, which was founded in 1997. Mr ...Missing: development | Show results with:development
  21. [21]
    NetScreen's careful path to Wall Street - CNET
    NetScreen's reported sales have risen astronomically over the past three years, from $5.9 million in 1999 to $26.6 million in 2000, and then to $85.6 million in ...
  22. [22]
    [PDF] NetScreen Technologies, Inc. 2003 Annual Report
    Dec 24, 2003 · During the year, we significantly expanded and enhanced our product offerings, strengthened our presence in the security market, and improved ...
  23. [23]
    The birth and death of NGFW - 5FeetNetworks Oy
    Jan 30, 2023 · Firewall market in the late 90s. In the late 90s, the business firewall market was dominated by Cisco Systems™ PIX and CheckPoint™ Firewall-1.Missing: 1990s | Show results with:1990s
  24. [24]
    Can Firewalls Repel Stock Jitters? - Bloomberg.com
    Mar 20, 2002 · Among high-end firewall users, defined as those who plunk down $50,000 or more for massive coverage, NetScreen has a 57% market share, according ...
  25. [25]
    Check Point's Marius Nacht to NetScreen: You are small fry - TheStreet
    Jan 29, 2002 · According to its recent survey, Check Point claims to have 62% of the VPN market and 41% of the firewall market in the year 2000. One of Check ...
  26. [26]
    Check Point VPN-1 Pro vs. Cisco Systems PIX-535 and NetScreen ...
    Aug 1, 2002 · At 1,450 bytes it delivered 180 Mbit/s compared with PIX-535's 100 Mbit/s and NetScreen-500's identical 180 Mbit/s. Switching to AES, VPN-1 Pro ...
  27. [27]
    [PDF] NetScreen Security Appliances - ICANN
    NetScreen's GigaScreen security. ASIC processes the firewall access policies and encryption algorithms in hardware, which is a significantly faster approach.
  28. [28]
    [PDF] NetScreen Security Appliances
    NetScreen's GigaScreen security ASIC acceler- ates the firewall policy lookups and encryption and authentication algorithms in hardware. This is a significantly ...
  29. [29]
    Cryptographic Algorithm Validation Program | CSRC
    Integrated into NetScreen's purpose-built firewall/VPN appliance andsystems, the GigaScreen ASIC is designed to accelerate IPSec encryptionand firewall ...
  30. [30]
    [PDF] NetScreen-500 System
    Firewall performance scales to 700. Mbps and ... GigaScreen ASIC, GigaScreen-II ASIC and NetScreen ScreenOS are trademarks of NetScreen Technologies, Inc.
  31. [31]
    [PDF] NetScreen-5000 Series User's Guide - of /sup
    Built around NetScreen's third-generation ASIC technology and distributed system architecture, the NetScreen-5000 Series offers excellent scalability and ...
  32. [32]
    [PDF] Netscreen Isg 2000 Data Sheet - Andover Consulting Group
    Firewall performance. 2 Gbps. 3DES performance. 1 Gbps. Deep Inspection ... ASIC, GigaScreen-II ASIC, and NetScreen ScreenOS are trademarks of Juniper.
  33. [33]
    NetScreen Firewall Appliances - InterWorld Communications
    NetScreen's custombuilt ASIC processes the firewall access policies and encryption algorithms in hardware; providing significantly higher performance than ...
  34. [34]
    [PDF] Security Policy, NetScreen NS-5200 and NS-5400 - CSRC
    The main hardware components consist of a main processor, memory, flash, GigaScreen 3 ASIC, 10/100 Mbps ethernet interface, GBIC network interface, console ...
  35. [35]
    [PDF] NetScreen Concepts & Examples
    If it is not installed in accordance with NetScreen's installation instructions, it may cause interference with radio and television reception. This equipment ...
  36. [36]
    NetScreen firewall: Five-star security - InfoWorld
    UTM comes with a moderate amount of built-in protocol anomaly detection events (LAND, Tear drop, SYN flood, and others); Anti-Virus, Anti-Adware, Anti-Phishing, ...
  37. [37]
    [PDF] NetScreen-50 User's Guide - of /sup
    The NetScreen-50 provides security for small to medium companies, offering 170 Mbps firewall and 50 Mbps 3DES VPN, protecting LANs and public servers.
  38. [38]
    ScreenOS IPSEC VPN Configurations - Steve Puluka
    Aug 13, 2017 · The screenOS platform offers two basic types of VPN for site-to-site tunnels, route based and policy based. The policy based option is what all ...Missing: NetScreen | Show results with:NetScreen
  39. [39]
    [PDF] Juniper Networks Integrated Firewall/VPN Solutions
    Juniper Networks ScreenOS features such as Auto Connect VPN can help ease the administration and management of VPNs, particularly in hub-and-spoke ...
  40. [40]
    [PDF] Juniper Networks NetScreen-5000 Series
    ScreenOS 6.1. Firewall performance (Large packets)(2). 10/8 Gbps. 30/24 Gbps. Firewall performance (Small packets). 4 Gbps. 12 Gbps. Firewall Packets Per Second ...
  41. [41]
    [PDF] Juniper Networks NetScreen-5000 Series - Andover Consulting Group
    The NetScreen-5000 series is a high-performance firewall/VPN for large enterprises, offering firewall, VPN, traffic management, and DoS/DDoS protection. It has ...
  42. [42]
  43. [43]
    2004: Juniper Networks to buy NetScreen – The Mercury News
    He does not own any Juniper shares. Some of the negotiations between Kriens and NetScreen President and CEO Robert Thomas took place over coffee at Denny's.
  44. [44]
    FORM 8-K - SEC.gov
    On February 9, 2004, NetScreen Technologies, Inc. entered into an agreement to be acquired by Juniper Networks, Inc. in a stock-for-stock merger transaction.Missing: IPO | Show results with:IPO
  45. [45]
  46. [46]
    Juniper Buys NetScreen in $4 Billion Deal - E-Commerce Times
    Juniper Networks has announced it will buy NetScreen Technologies in an all-stock deal worth an estimated $4 billion ... competitive landscape in the firewall ...
  47. [47]
    e425 - SEC.gov
    The following is a script of a conference call held on February 9, 2004 regarding Juniper Networks, Inc.'s proposed acquisition of NetScreen Technologies, Inc.
  48. [48]
    20040501: Juniper Networks, Inc.; NetScreen Technologies, Inc.
    20040501: Juniper Networks, Inc.; NetScreen Technologies, Inc. Date. March 16, 2004. Transaction Number. 20040501. Acquiring Party. Juniper Networks, Inc.<|separator|>
  49. [49]
    Juniper secures its future with NetScreen - CNET
    Apr 21, 2004 · NetScreen's first-quarter revenue was about $93.5 million, compared with $58.3 million for the same period last year, an increase of 60 percent.
  50. [50]
    NetScreen ScreenOS Software Release Dates & Milestones - Support
    For ScreenOS software products released after July 15, 2008, the period of active engineering support will be the current release plus two (2) subsequent ...Missing: Technologies | Show results with:Technologies
  51. [51]
    Overview of the Juniper SSG Series Firewalls - SKULLBOX.NET
    Apr 18, 2011 · Overview. Juniper SSG (Secure Series Gateway) firewalls represent the 2nd generation of Netscreen products. This article provides information ...Missing: introduction | Show results with:introduction
  52. [52]
    [PDF] NetScreen-to-SRX Series Migration Service | Juniper Networks
    This service gives your organization access to a firewall conversion team with extensive knowledge of NetScreen Series and SRX Series deployments.
  53. [53]
    ScreenOS Dates & Milestones - Juniper Support
    ScreenOS 6.3 EOS date, for this release and branches only, has been extended to May 1, 2021 (Some NetScreen platforms may EOL before this date, please refer to ...Missing: Technologies | Show results with:Technologies
  54. [54]
    Putting China On The Silicon Valley Map: NetScreen And Fortinet ...
    Apr 21, 2010 · NetScreen later was acquired by Juniper for $3.5 billion. At the end of 2000, Xie founded Fortinet, which pioneered Unified Threat Management ( ...Missing: alumni | Show results with:alumni
  55. [55]
    Nir Zuk - RSA Conference
    Prior to co-founding Palo Alto Networks, Zuk was CTO at NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to NetScreen, Zuk was ...
  56. [56]
    “Unauthorized code” in Juniper firewalls decrypts encrypted VPN traffic
    Dec 17, 2015 · "During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain ...Missing: incident | Show results with:incident
  57. [57]
    Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA
    Dec 22, 2015 · Security researchers believe they have finally solved the mystery around how a sophisticated backdoor embedded in Juniper firewalls works.
  58. [58]
    'Unauthorized code' that decrypts VPNs found in Juniper's ScreenOS
    Dec 17, 2015 · The code “could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections.”
  59. [59]
    CVE-2015-7755 Detail - NVD
    allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
  60. [60]
    CVE-2015-7755: Juniper ScreenOS Authentication Backdoor - Rapid7
    Dec 20, 2015 · On December 18th, 2015 Juniper issued an advisory indicating that they had discovered unauthorized code in the ScreenOS software that powers their Netscreen ...