Juniper; Palo Alto settle long-running firewall patent lawsuits

Juniper Networks and Palo Alto Networks today agreed to settle their long-running firewall-related patent infringement lawsuits

Juniper Networks and Palo Alto Networks today agreed to settle their long-running firewall-related patent infringement lawsuits against each other, with Juniper saying Palo Alto Networks has agreed to pay US$175 million in cash and equity as part of the settlement.

"Juniper Networks initiated this litigation in order to protect our intellectual property and investment in innovation that is reflected in our leading security products," said Mitchell Gaynor, executive vice president and general counsel, Juniper Networks. "This settlement fully achieves those objectives, and we are very pleased with this resolution."

Under the agreement, Palo Alto Networks will make a one-time payment of $75 million in cash and $100 million in shares of common stock and warrants to purchase common stock. Under the settlement, both sides agree to dismiss all patent litigation in Delaware and California. Both companies agreed to cross-license the disputed patents to each other and not attempt further litigation for eight years.

The long-running disputes between the two focused on application-firewall patents. In March, Juniper's case against Palo Alto went to court in Delaware, but ended in a mistrial. Juniper vowed to battle on, even as Palo Alto had counter-sued with its own patent claims against Juniper.

Palo Alto Networks downplayed the significance of the settlement in which it has agreed  to pay $175 million in cash and equity.

"We have reached a settlement with Juniper and are pleased to put this behind us," said Mark McLaughlin, president and CEO of Palo Alto. "While we are confident of our position in the case, we believe this outcome is in the best long-term interest of our shareholders and customers as it allows us to further focus our efforts on what we do best: innovating, growing the business, and solving the toughest cybersecurity problems for our customers."

Join the CSO newsletter!

Error: Please check your email address.

Tags palo alto networksFirewall & UTMsecurityWide Area Networkjuniper networks

More about JuniperJuniperPalo Alto Networks

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ellen Messmer

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts