Enterprise Strategy Group | Getting to the bigger truth.TM

Posts Tagged ‘Crossbeam Systems’

The Smart-Fat and Smart-Thin Edge of the Network

Wednesday, November 17th, 2010

Take a look at ESG Research and you’ll see a number of simultaneous trends. Enterprises are consolidating data centers, packing them full of virtual servers, and hosting more and more web applications within them. This means massive traffic coming into and leaving data centers.

Yes, this traffic needs to be switched and routed, but this is actually the easiest task. What’s much harder is processing this traffic at the network for security, acceleration, application networking, etc. This processing usually takes place at the network edge, but additional layers are also migrating into the data center network itself for network segmentation of specific application services.

Think of it this way: There is a smart-fat network edge that feeds multiple smart-thin network segments.

The smart-fat network edge aggregates lots of network device functionality into a physical device, cluster of devices, or virtual control plane. This is the domain of vendors like Cisco, Crossbeam Systems, and Juniper Networks for security and companies like A10 Networks, Citrix (Netscaler), and F5 Networks for application delivery. These companies will continue to add functionality to their systems (for example,  XML processing, application authentication/authorization, business logic, etc.) to do more packet and content processing over time. It wouldn’t surprise me at all if security vendors added application delivery features and the app delivery crowd added more security.

Once the smart-fat network edge treats all traffic, packets and content will be processed further within the data center (i.e., smart-thin network edge). This will most likely be done using virtual appliances like the Citrix VPX. Why? Virtual appliances can be provisioned on the fly with canned policies or customized for specific workloads. They can also follow applications that migrate around internal data centers or move to public clouds.

A few other thoughts here:

  1. I’m sure we’ll see new startups focused on smart-thin virtual appliances but I don’t expect them to succeed. Existing vendors will simply deliver virtual appliance form factors and dominate this business.
  2. Legacy vendors have the best opportunity here as many users will want common command-and-control for the smart-fat edge and the smart-thin edge. Nevertheless, this further network segmentation does provide an opportunity for aggressive vendors to usurp customer accounts and marketshare.
  3. Smart-fat edge systems are delivered as physical devices today but this isn’t necessarily true for the future. I can see virtual appliances with horizontal scalability running on , HP, or IBM blade servers in the future.

The smart-fat, smart-thin architecture is already playing out in cloud computing and wireless carrier networks today and I expect it to become mainstream in the enterprise segment over the next 24 months. The technology is ready today but many users have no idea how to implement this type of architecture or capitalize on its benefits. Vendors who can guide users along with knowledge transfer, best practices, and reference architectures are most likely to reap the financial rewards.

Cisco Bolts Into High-End Network Security — Again!

Wednesday, October 6th, 2010

If you look at revenue numbers, Cisco is the clear leader in network security. That said, the company has been far less visible over the last few years–especially at the high-end of the market in consolidated data centers, wired and wireless carrier networks, and cloud computing infrastructure. This opened this lucrative market to Juniper’s SRX and the security duo of Crossbeam Systems/Check Point.

As the saying goes, “never wake the sleeping giant.” In an unprecedented series of announcements yesterday, Cisco announced its new high-end security system, the ASA 5585X. Cisco’s deepening data center chops are clearly evident here. The ASA 5585X is a 2 rack unit appliance, a small form factor that one-ups the competition in terms of power, space, and cooling but still delivers massive data center performance from 2Gb to 20Gb of throughput. Cisco also demonstrated that it is paying attention to the mobile Internet market by emphasizing that the 5585X can deliver up to 350,000 connections per second — a metric that will really appeal to wireless carriers.

The ASA 5585X announcement was one drop of a veritable waterfall of news coming out of Cisco yesterday. Whether you love Cisco or hate it, you have to give the company credit — all of the announcements were strong on their own, tied together with overall company initiatives, and supported one another. For example, the ASA 5585X announcement:

  1. Balanced security and performance. Beyond announcing a “hot box,” Cisco is also reminding the market of its security prowess. The 5585X combines traditional defenses like firewall and IDS/IPS but it also leverages IronPort services for content security, web security, and its security reputation database.
  2. Ties into the Secure Borderless Network Initiative. Here, Cisco is highlighting that the 5585X supports AnyConnect, Cisco’s “always-on” VPN client. AnyConnect is designed to created trusted client/server relationships, encrypt all traffic, and ease connectivity for mobile workers. By linking these two products, Cisco can compete for network security in the wireless carrier space AND push AnyConnect as a universal endpoint standard.
  3. Focuses on the new data center. Cisco can bundle the 5585X into huge deals that also feature UCS, Catalyst, Nexus, etc.

I don’t know how the ASA 5585X compares to the competition, but speeds-and-feeds are somewhat beside the point. The ASA 5585X gets Cisco back in the game. Combined with Cisco’s growing portfolio, data center experience, and un-matched marketing messages, it will most certainly sell a lot of high-end security boxes.

Network Security Renaissance

Friday, March 19th, 2010

ESG’s research indicates that network security spending will be a focus area for 2010. Nearly half (48%) of midsized (less than 1,000 employees) and enterprise (more than 1,000 employees) organizations will invest in network security technologies like firewalls, IDS/IPS, gateways, and threat management solutions.

Yes, all of these technologies are important components of a defense-in-depth security architecture, but they are also quite mature. Why the network security renaissance? Because of:

  1. Equipment consolidation. I see lots of organizations replacing individual firewall appliances with big network security gateway products running virtual firewall instances. This simplifies the network and cuts down on software licensing costs. Good news for Check Point, Crossbeam Systems, and Juniper Networks.
  2. Network upgrades. There is plenty of 10GbE activity in the data center and in network backbone upgrades. Fast network throughput demands new security equipment. Advantage IBM/ISS, McAfee, Sourcefire, and TippingPoint (HP).
  3. Integrated security. Most enterprises are replacing standalone security devices with more integrated threat management solutions.
  4. New threats. The bad guys are way more sophisticated than an IPS device circa 2007. Large organizations need better threat detection, prevention, and mitigation. Furthermore, network security must work as a team with desktop, server, messaging, and other security defenses.

With all of this activity, many networking vendors stand to benefit. Cisco and Juniper have great network security offerings that interoperate with their core networking products. HP will pick up TippingPoint with 3Com, but it needs to build an architecture story quickly. Brocade is working with partners and must continue to make this a core part of its value. Other networking vendors need to make similar moves.

Security gets more complex each day, so state-of-the-art devices may have a short shelf life. Expect continuous investment in network security moving forward. Networking vendors that recognize this will put themselves in the best position.

Cisco Quarterly Results Impress Wall St., but Not This Security Analyst

Thursday, February 4th, 2010

Cisco announced its financial results today, much to the delight of Wall Street. Cisco revenue beat estimates and posted 8% year-over-year growth. Net income rose 26% over last year. These stellar results prompted Cisco CEO John Chambers to declare, “we are hitting on all cylinders.”

No doubt, these are impressive results, but there is some hidden bad news in all of the confetti and champagne: year-over-year security revenue was flat.

Hmm, I guess one of those cylinders has a little carbon buildup after all. While Cisco security revenue flatlined, other security vendors prospered: Check Point grew revenue by 25% in Q4 2009, Juniper Networks revenue beat Wall Street estimates as did Symantec, and back in October, McAfee announced its biggest financial quarter ever with 8% revenue and 26% net income growth.

Okay, so if other security vendors are growing, why isn’t Cisco? Because:

  1. Cisco is taking its eye off the ball. Let’s face it: security just isn’t as important to Cisco as UCS or Telepresence. The old campaigns around “self-defending networks” are no match for big dollar cloud computing and virtualization schtick.
  2. Sales people chasing multi-million dollar deals have no time for  security sales. Why trip over the dollars to pick up the pennies?
  3. Cisco is walking away from many security battles. In 2009, Cisco canned its Cisco Security Agent (CSA) and put Cisco Monitoring Analysis and Response System (MARS) on maintenance. Cisco’s firewall business is a shell of what it was a few years ago and it really doesn’t have a high-end UTM product to compete with the likes of the Juniper SRX or Crossbeam. What’s going on? Beats me.

Cisco used to give away a lot of security stuff to win bigger dollar networking deals. This strategy, along with IronPort sales, seems to be the only things keeping the security ship afloat.

From a Wall Street perspective, who cares? If Cisco revenue and earnings shine, share prices go up and everyone gets rich. True, but Cisco seems to be willing to shed information security sales in favor of greener pastures. If this is the case, enterprise customers should plan accordingly by assessing their Cisco security portfolio and crafting a “plan B” replacement strategy as a hedge.

Approximately Half Of All Organizations Will Increase Security and Networking Spending in 2010

Wednesday, January 13th, 2010

Last week I blogged about ESG’s new data on IT spending. Here is a bit more detail with regard to networking and security.

Nearly half of all mid-market (i.e. 100 to 999 employees) and enterprise (i.e. 1,000 employees or more) companies will increase their spending on network hardware in 2010. Top priorities include WLAN, IP telephony, and WAN optimization.

Fifty-five percent of mid-market and enterprise organizations will increase their spending on information security technologies. In this case, there are differences between the sectors: 48% of mid-market organization will increase their spending on information security technologies while a whopping 61% of enterprises will increase their spending on information technologies. Top priorities are network security, endpoint security, and messaging/web security.

What does this mean for the tech industry?

  1. Cisco, Juniper, Check Point, and McAfee are sitting pretty. These companies have product portfolios that touch most if not all of the high priority spending areas. Cisco has a broad portfolio but its love/hate relationship with security may open the door for others. Check Point certainly has the opportunity to branch out from its firewall bunker. Juniper has the most upside — especially if it introduces its own JUNOS-based WLAN equipment as ESG anticipates. McAfee also has good coverage.
  2. Microsoft could flex its mid-market muscle. While Microsoft networking and security hasn’t had strong enterprise penetration, it certainly plays well in the mid-market. With Windows 7 and Windows Server 2008 R2 in tow, the data indicates that Microsoft has a great opportunity to bundle in products like ISA Server, Forefront, and even Office Communications Server.
  3. WLAN acquisitions continue. It looks like it will be a good year for 802.11n — likely at the expense of wired access switches. That being the case, Aruba’s market share can’t be ignored. Even though HP already made a technology play, an HP/Aruba marriage could really turn up the heat on Cisco. Meru has great technology and would likely be a value purchase for Brocade or Force 10.
  4. What’s old is new again. Note that two mature categories, network security and endpoint security are top priorities. Why? New threats, malicious code volume, regulatory compliance mandates, etc. This could mean vendor churn and opportunities for aggressive startups like Crossbeam Systems and Palo Alto Networks.
  5. Look for the return of big projects. Many organizations made tactical purchases in 2009 to fill holes. Look for them to move in another direction with more strategic projects. For example, data center networks may be consolidated with large access switches and integrated security devices, while Universities and Healthcare organizations rip and replace old WLAN gear. ESG anticipates WAN optimization consolidation as well as users settling on a single vendor and architecture. Vendors should think architecture and strategy, not sales transactions.

All in all, the data points to more positive momentum. A good year for vendors to re-engage with customers, build long-term partnerships, and help them move beyond the Status Quo.

Brocade Could Go On a Shopping Spree

Monday, November 23rd, 2009

I never really believed the rumors about HP buying Brocade. No disrespect to Brocade, I just thought that HP’s interest was really in Ethernet and IP networking and not Fibre Channel.

Will another company acquire Brocade? I can’t think of any obvious takers. The financial analyst rumors that Juniper would buy Brocade were ridiculous and obviously spread by someone who doesn’t know Juniper. IBM and Dell? I don’t think either company is gung-ho to get back into the networking game. Besides, both companies already have a Brocade OEM relationship in place.

Since Brocade is likely to remain independent, my advice would be to prepare for the long-haul by filling in product gaps with innovative startups and doubling down on its direct sales and distribution channel resources.

If I were in charge of M&A at Brocade, here are a few areas that would top my Christmas shopping list.

1. WLAN. Yes, I know Foundry has a wireless offering but I can’t imagine that it is selling a lot of equipment. If Brocade’s board can stomach another big deal, Aruba Networks would give the company an immediate WLAN leadership position where it could upsell other switches and routers. If Aruba is too rich for Brocade’s taste, Meru Networks has great technology and would probably sell for a song.

2. Network security. The pickings are slim here but one interesting play might be Crossbeam Systems. Crossbeam is one of a few high-end “Network Security Super Gateways” (NSSG) and has been very successful in the service provider and ISP markets. This could help Brocade in both areas and also bring an instant relationship with Crossbeam OEMs like Check Point and ISS (now IBM). This would also complement Brocade’s data center strength.

3. Security management. Like Aruba, Brocade could reach for the stars and pick up market leader ArcSight but this would cost over $1 billion. Again, if this price is a bit too scary, Brocade could choose networking-savvy Nitro Security or feisty LogRhythm. Any of these choices could give Brocade a Cisco MARS alternative.

4. WAN optimization/Application Delivery. Brocade has a pretty good portfolio of Application Delivery Controllers but it could become a market upstart by grabbing A10 Networks. A10′s economic value proposition could be extremely attractive for companies with large and growing web applications and A10′s founder has roots at Foundry. This could also leverage Brocade’s data center prowess. On the WAN optimization side, SilverPeak has some strength in data center-to-data center networking and is likely available.

5. Network management. Lots of niche players here, too many to name. My advice would be to work closely with CA.

Brocade could stand firm as it has the Fibre Channel market pretty much locked up but Cisco, Dell, and even HP have internal agendas that probably favor FCoE over time. Nevertheless, FC isn’t going away any time soon. This gives Brocade a data center beachhead to build from. In this regard, Crossbeam and A10 Networks would definitely be a short-term fit while the others mentioned above would provide instant diversification.

In my humble opinion a creative M&A or aggressive partnering strategy would be extremely useful for Brocade in 2010 and beyond.

Search
© 2011 Enterprise Strategy Group, Milford, MA 01757 Main: Fax:

Switch to our mobile site