LAS VEGAS—Juniper Networks Inc. Chairman and CEO Scott Kriens in his Wednesday keynote address at the annual Interop networking and infrastructure show here tried to help attendees sift through the vendor hype to help them solve real business problems.
In helping enterprises go after new business opportunities or reduce costs using technology, Kriens employed the three-sided triangle with each side representing good, fast and cheap attributes.
He reminded attendees that in tackling any project, only two out of those three attributes can be achieved.
The theme—making real progress—reminded the audience of market realities: “Cell phones are getting cheaper, and it makes things happen fast, but its not very good. [Wireless] hot spots are really fast and cheap, but step 5 feet beyond the zone and its not good,” he said.
“If we pretend this isnt real, then we dont know which tradeoff to take. The message is to optimize reality and gain control over those choices, so we make those tradeoffs consciously,” he said.
Businesses today are faced with a unique challenge in that business cycles are compressing.
The peaks and valleys happen much faster, and their “severity is getting much worse—from boom to bust and back again,” he said.
In that scenario, whats key, he said, is to be able to quickly align costs and revenues.
“How to get assets off the balance sheet and onto the P&L as variable expenses anywhere and any way we can,” he said.
“If we network the world together and arbitrage the market, then we can move much faster to respond to these changing demands. The notion of going virtual is really about virtualizing the assets.
“Networks make that possible. Sharing assets is a great idea, but its a subordinate point when it comes to the ability of technology to do that. Control usually means ownership, and then you lose the economic value of sharing the asset. And you lose the ability to turn it up and down easily because its more bulky,” he said.
“We have to be able to deliver on a combination of making shared assets and resources available for good reasons. But we must retain control of those as if we owned them and as if they were dedicated to us,” he added.
In looking at networking market realities, Kriens examined whether the market is consolidating.
For vendors, opportunities are increasing, he believes, for those who focus properly—not too narrowly or not too broadly. Such focus, he says, takes into account natural boundaries.
“For devices produced in huge volumes, success hinges on [a good] user interface and the fact that they are cheap. This is a boundary. But every one of those devices if they have value will be networked.
“That traffic is processed for priority, security, billing, and transmission on its way to the application, the database, the application servers and the storage, which remains its own element industry,” he said.
The boundaries in that scenario include the user devices, traffic processing, application processing and transmission.
“We have a laser focus on traffic processing. Whoever wins will look like this,” he said.
Next Page: Enterprises face a perfect storm.
Enterprises Face a Perfect
Storm”>
A perfect storm of regulatory compliance with Sarbanes-Oxley and other regulations, combined with a fast-growing applications user base and an increase in the number and sophistication of attacks is forming; enterprises will have to address it.
Kriens says he believes the answer is in what his company calls the Enterprise infranet.
It requires not only perimeter security but control of resource usage inside the firewall and good response times.
Junipers answer is a dynamic security perimeter, provided not only by its products but partnerships and standards, he said.
But the silo approach to IT organization and problem solving makes it difficult to solve problems quickly.
“The infrastructure side of the house sees routers, switches, firewalls. When the application department says, Whats the problem? they get a detailed view of the Web and application server environment.
“The chief security officer believes it doesnt matter if its secure. This is a comment on all of us in the industry. We participate in the silos. The CIO has to do better than that. We have to build collaboration across these arenas—on the vendor side and within the design and implementation of these projects, and think about it the way the business problem is being thought about,” he concluded.