Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

Juniper Networks Vs. Palo Alto Networks

U.S. Patent No. 7,107,612 - Describes approaches for dynamically generating rules based on data received by a network instead of using a fixed set of rules. The key term at issue in this patent is "rule." While Juniper offers no construction, Palo Alto proposes to construe the term as "a policy for filtering packets across multiple sessions, as distinct from a lookup table." This is not surprising since such a definition would narrow the claim and specifically exclude a lookup table from the claim's scope. Juniper counters with Palo Alto's own expert's admission that rules are just another general data structure and can be stored in a hash table. U.S. Patent No. 6,772,347 - Describes efficient packet filtering in a firewall by initially denying or allowing packets using access control list engine and sorting them accordingly by either allowing to pass or finally denying . The key term in dispute in the '347 patent is "sorting packets into initially denied packets." Juniper believes no construction is necessary, while Palo Alto proposes the term to mean: "applying rules to make a first determination that identifies packets to be dropped." Palo Alto bases its argument on the patent specification which discloses the initial denial by the ACL engine as the identification of packets to be initially denied. However, no packets are dropped during that phase, but in fact proceed to a dynamic filter which allows some of the initially denied packets to pass through the firewall. Packets are "dropped" only after they've been sorted during the second phase.
For the original version including any supplementary images or video, visit http://seekingalpha.com/article/1819652-juniper-networks-vs-palo-alto-networks

Juniper vs. Palo Alto Networks: Firewall court battle set to begin

Juniper is seeking an injunction to bar firewall sales by Palo Alto and possibly reap monetary damages as well. Palo Alto declined to talk about the lawsuit, and sources at Juniper spoke only on background. But the Juniper lawsuit, which commenced as legal filings two years ago and is now expected to go to a jury trial in Wilmington, Del., speaks for itself. Already an Insider? Sign in Network World - Call it the fist fight over firewalls for 2014. Juniper Networks is going for a knock-out against rival Palo Alto Networks in a patent-dispute lawsuit related to next-generation firewalls that's set to go to trial in Delaware in February. And Palo Alto wants to Unified Communications take out Juniper in its own separate patent lawsuit. Juniper alleges that Palo Altos firewalls are based on intellectual property that Juniper gained in its $4 billion acquisition of NetScreen in 2004, and that this technology was developed by Nir Zuk, the former CTO at NetScreen, and Yuming Mao, a former engineering architect there. Later, Zuk and Mao went off to found Palo Alto, a maker of application-aware, or next-generation, firewalls.
For the original version including any supplementary images or video, visit http://www.networkworld.com/news/2013/121913-juniper-palo-alto-277090.html

Network Innovation Award: Palo Alto Networks next-generation firewalls

On the networking side you expect firewalls to take modern networking protocols; for example, dynamic routing protocols. When you are part of the network you have to speak the language of the network and communicate with routers and switches. This is unique for a firewall from all of the other security devices. Palo Alto recently expanded its virtualization firewall offering. How do virtual and physical firewalls differ -- and where must they be the same? Zuk:The main reason you need a virtualization firewall is that you can't see inside [a virtual environment] with a physical device. So if you have a SaaS provider that doesn't allow you to deploy physical devices on the network, you would deploy a virtual firewall there. The way virtualized data centers are built, traffic only goes from one rack to another. The [virtualization] firewall monitors traffic running between virtual machines.
For the original version including any supplementary images or video, visit http://searchnetworking.techtarget.com/news/2240179694/Network-Innovation-Award-Palo-Alto-next-generation-firewalls

Don't be the product, buy the product!