Juniper in the red as product biz bleeds sales in 'challenging' Q4

CEO Rahim: 'we are moving with urgency'

Troubled tech plumber Juniper Networks ended 2014 on a low as it swung into loss, and reported declining product sales, with the security portfolio looking particularly unloved by customers.

The New York-listed maker of switches and routers last night reported sinking revenues of $1.1bn for calendar Q4, down 13.4 per cent year-on-year; hardware sales fell 17 per cent to $749m but services grew eight per cent to $308m.

Broken down by segment, routing fell 15 per cent to $523.1m, switching was down 12 per cent to $174.4m and security dropped a whopping 39 per cent to $96.5m.

Routing and security were hit by “weakness” in the large US carriers sector, with lower-than-expected enterprise demand dampening switching sales.

Operating expenses were reined in, down 14 per cent with less spent on R&D, sales and marketing, and admin, but it was an impairment of goodwill charge that reduced the profits to rubble, resulting in a net loss of $769.6m compared with a profit of $151.8m in the prior year’s period.

This is the first full quarter since CEO Rami Rahim came on board, replacing a predecessor who left under a cloud, and he talked up the “major strides” he believes the company made under his guidance.

He said on a conference call with analysts the company pushed through “initiatives” to “streamline” the business, and “reduced” cost structure in what proved to a “challenging revenue environment”.

“Rest assured we are moving with urgency,” Rahim added.

The recovery plan has also included naming Jonathan Davidson as head of Juniper’s development and innovation team and Rahim commented that he “oversaw a comprehensive review of the security components of our business”.

As The Channel revealed last December, Juniper has dumped a bunch of security gear, including the FireFly Host, WebApp Secure and DDoS Secure products, though customers will continue to receive support.

“In security, I acknowledge that it has under performed,” said the CEO, and “2015 will be a year of stabilising our security revenue. To win in security we are pivoting our strategy to build integrated solutions that focus our network resiliency and business continuity across cloud, data centre, branch, campus and service provider mobile infrastructure”.

For the year, Juniper tuned over $4.62bn versus $4.66bn in 2013, and reported a net loss of $343.3m versus a net profit of $439.8m. ®

Similar topics

Other stories you might like

  • Cisco warns of security holes in its security appliances
    Bugs potentially useful for rogue insiders, admin account hijackers

    Cisco has alerted customers to another four vulnerabilities in its products, including a high-severity flaw in its email and web security appliances. 

    The networking giant has issued a patch for that bug, tracked as CVE-2022-20664. The flaw is present in the web management interface of Cisco's Secure Email and Web Manager and Email Security Appliance in both the virtual and hardware appliances. Some earlier versions of both products, we note, have reached end of life, and so the manufacturer won't release fixes; it instead told customers to migrate to a newer version and dump the old.

    This bug received a 7.7 out of 10 CVSS severity score, and Cisco noted that its security team is not aware of any in-the-wild exploitation, so far. That said, given the speed of reverse engineering, that day is likely to come. 

    Continue reading
  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • Azure issues not adequately fixed for months, complain bug hunters
    Redmond kicks off Patch Tuesday with a months-old flaw fix

    Updated Two security vendors – Orca Security and Tenable – have accused Microsoft of unnecessarily putting customers' data and cloud environments at risk by taking far too long to fix critical vulnerabilities in Azure.

    In a blog published today, Orca Security researcher Tzah Pahima claimed it took Microsoft several months to fully resolve a security flaw in Azure's Synapse Analytics that he discovered in January. 

    And in a separate blog published on Monday, Tenable CEO Amit Yoran called out Redmond for its lack of response to – and transparency around – two other vulnerabilities that could be exploited by anyone using Azure Synapse. 

    Continue reading

Biting the hand that feeds IT © 1998–2022