About Juniper

Corporate Responsibility

Government Affairs

We support public policies that promote network investment, stimulate economic growth, and enable us to deliver high-performance networking solutions and connectivity to our customers and partners worldwide.

At the foundation of our business is an adept workforce that continually develops innovative solutions. Among our priorities are policies that make it easier to hire and retain highly skilled employees and help us protect their ideas and innovations.

Workforce and Immigration

STEM and Diversity

It is well-known that diverse groups, compared to homogeneous ones, are better able to think outside-the-box and generate new ideas, solutions and processes. Diversity is just as important for teams of science, technology, engineering and math (STEM) employees. Groups of technologists and engineers tend to develop better ideas if those groups consist of members with different backgrounds and experiences.

This is why Juniper Networks supports programs and policies geared toward attracting individuals with diverse backgrounds to STEM fields. For example, the Juniper Foundation has given over $10 million in grants over the past ten years to nonprofit organizations designed to bring future generations to STEM careers, including underrepresented and underprivileged students.


Juniper Networks believes that streamlining the legal immigration system and making it easier for innovative companies to hire skilled workers is of paramount importance, not only to maintaining the competitiveness of U.S. businesses, but also to the overall strength and vitality of the U.S. economy.

The United States is no longer the world’s only incubator of technology and innovation. Just as companies in Silicon Valley compete for employees with other technology hubs in the country, the United States competes with other countries for highly trained innovators. A skilled foreign national who does not receive a visa or green card to work in the United States most likely will find employment in their homeland or a third country where they will compete against our business, American employees and the U.S. economy.


Juniper Networks supports Deferred Action for Childhood Arrivals (DACA), a quintessentially American program that allows certain individuals brought here as children, known as Dreamers, to seek relief from deportation and obtain permission to work.

Dreamers are our colleagues, neighbors and friends. They are students and employees; many serve this country in the Armed Forces. The United States likely is the only home they remember. It is where they went to school, where they grew up,and where their friends and family live. They are as American as any person who was born here.

Deporting them to countries they do not know not only would be harmful to them, but could also cause tears in the fabric of American society. Deportation could harm families, communities, neighborhoods, businesses and our national security.

While a vast majority of Americans support DACA, Dreamers are suffering due to the political stalemate over their status. Juniper Networks urges Congress and the President to give Dreamers legal status and set them on the path to citizenship.

Intellectual Property

Standard Essential Patents

Juniper Networks believes in the immense value that technical standardization can provide to industry and to consumers. Standards enable critical interoperability and performance capabilities that would not otherwise be possible.

When standard-setting organizations (SSOs) develop technical standards, it is well-recognized that some patented technologies may be contributed to and used by the standard. Such patents are known as standard-essential patents (SEPs). To ensure that SEPs cannot be used to block use of the standard or make use of the standard unreasonably expensive, SSOs commonly encourage SEP owners to agree to license their patents on fair, reasonable,and non-discriminatory (FRAND) terms. These promises to license on FRAND terms – when followed – can enable widespread use and promulgation of the technical standard in a pro-competitive fashion to the benefit of the entire market. SEP owners that seek compensation for their patents can do so while the market has assurances that such claims will not seek to exploit the patent’s status as an SEP to obtain additional compensation beyond the technical value of the patented technology.

Juniper Networks believes that owners of intellectual property should be compensated fairly and reasonably for the patents they contribute to standards development. But patent owners should never be permitted to abuse the standardization process by demanding compensation exceeding the value of their contributions. Unfortunately, some patent owners agree to license their patents on FRAND terms as part of the standard-setting process but then seek higher royalties from companies that want to incorporate the standards (and the underlying SEP) into their products. This patent holdup is an abuse of the licensor’s bargaining position; now that the patent is part of an accepted standard, the licensor is leveraging that standard against other innovative companies. Such patent “hold up” strategies harm the industry, harm innovation,and ultimately harm consumers.

Courts, policymakers and federal antitrust enforcers should be vigilant in addressing anti-competitive conduct in violation of the FRAND royalty commitment. Without effective enforcement, the risk of anti-competitive behaviors involving SEPs is particularly heightened.

More information on SEP issues and on policy approaches and principles that can support a balanced approach to incentivizing innovation and promulgation of standardized technologies is available from the industry alliance known as the Fair Standards Alliance at https://fair-standards.org.

Patent Litigation Reform

As a corporation built on technological innovation, Juniper Networks believes in a robust patent system. Unfortunately, patent speculators obtain patents of questionable value and, instead of commercializing the alleged innovations, send demand letters threatening to sue large corporations and small businesses alike for infringement unless onerous royalties are paid.

These speculators, also known as non-practicing entities (NPEs) or “patent trolls,” often end up with monetary settlements because the defendants do not have the time or resources to challenge them in court.

When NPEs file infringement lawsuits, they subject defendants to extensive discovery. It can be expensive for defendants to comply with discovery, so the NPEs are increasing the defendants’ costs and driving them to settle. Juniper Networks supports common sense reforms that will encourage innovation by requiring that the patent system:

Define patent claims early: Courts hearing infringement cases should conduct Markman (claim construction) hearings early so the scope of relevant patents can be decided before expensive discovery occurs.

Limit abusive discovery: Discovery should be limited to those documents that are central to the infringement case.

Require detailed infringement pleadings: NPEs should have to identify with specificity how a defendant’s product infringes their patent.

Open Source

We support government policies that recognize the value and encourage the responsible use of open-source software in a wide range of technology applications used in both routine business operations and critical infrastructure.

By their nature, open-source solutions are transparent and collaboratively developed, which—for actively managed projects—can substantially increase the speed of innovation, reduce the cost of development and in many cases enhance the security of software. Because many eyes are on the code, development accelerates with the cross-fertilization of ideas from developers with diverse perspectives and experiences. As a result, performance issues, security vulnerabilities and other bugs can be identified, analyzed and addressed quickly with fixes made available to everyone at the same time. As such, open-source communities thrive in a flexible, self-regulating environment that is in many ways the opposite of the traditional highly-controlled model of closed-source software development.

As a networking and security company, Juniper Networks understands the desire and need for technology customers to have confidence in the security of what they are buying. In fact, Juniper is a technology developer and a technology customer. Our experience as a customer tells us that government-imposed mandates on what, how and when vendors use open-source software are not likely to achieve the desired security assurances.

Even efforts to mandate the disclosure of every open-source program and software version used in a vendor’s product, while well intended, would create an overwhelming compliance burden on vendors without providing real, consistent benefits to their customers. Requiring vendors to provide a detailed software “bill of materials” for each product will result in voluminous disclosures that are immediately out of date and very difficult for customers to meaningfully interpret while doing little to enhance overall software security.

When it comes to software, the best approach is to screen vendors for secure development practices. Juniper Networks has a Secure Development Lifecycle (SDL) methodology consisting of a sequence of six product security activities designed to provide assurance that Juniper Networks’ products are sufficiently secure and resilient. While each practice individually addresses aspects of secure software development, together these practices create a layered and holistic security model that works in conjunction with Juniper Networks’ product development processes. The six aspects of Juniper Networks’ SDL are:

1. Secure coding training
2. Security consideration in design
3. Threat modeling
4. Penetration testing
5. Release security review
6. Incident response plan

To increase software security, customers of open-source software (including governments) should ensure that their vendors adhere to software development best practices, including a well-documented Secure Development Lifecycle.


Vulnerability Disclosure

Juniper Networks believes strongly in coordinated cybersecurity efforts. One area where this is particularly important is product vulnerabilities. Because criminal enterprises and nation states search for and attempt to exploit any vulnerabilities in networking products in order to infiltrate networks and/or access data, our security teams work closely with security researchers and customers to ensure that relevant vulnerabilities in our products are disclosed and fixed.

Juniper practices coordinated disclosure and notifies all of our customers about product vulnerabilities at the same time through our Juniper Security Advisory process outlined at https://kb.juniper.net/KB16613.

At the same time, there are pivotal security considerations in any such remediation effort. Product manufacturers should have the opportunity to analyze, validate and develop a fix for any potential vulnerability prior to disclosure to potentially impacted customers. This has several purposes. This allows the manufacturer to fully understand the vulnerability, prepare mitigations for affected versions and test the fixes. It also provides time for impacted customers to install the fix on their devices before bad actors can exploit the vulnerability.

Disclosing a vulnerability before it is fixed – or providing early notification to one customer ahead of other potentially impacted customers – generally serves the interests of those who seek to exploit it, not those who are subject to it. This is why we work with researchers and our customers to address vulnerabilities responsibly, protect networks and data and further the overall goal of cybersecurity.

To contact our Security Incident Response team about a potential vulnerability, please visit https://www.juniper.net/us/en/security/report-vulnerability/.

Supply Chain Risk Management

Our longstanding experience as a network infrastructure provider has given us significant insight into supply chain risk management (SCRM). An in-depth and reliable SCRM process should have three general elements: (1) an understanding of the supplier, (2) an understanding of potential points of entry for vulnerabilities and (3) supplier review and validation of the assessment.

Supplier Background: A mature manufacturer with robust supply chain review processes (including re-audits of existing vendors) and an understanding of the global cyber threat environment is more likely to have appropriate security controls relative to a newer supplier with limited resources and less awareness of the threat environment.

Introduction of Vulnerabilities: A supplier should consider where in the development or manufacturing process vulnerabilities could be introduced, by whom and by what means. This is unique for each supplier because suppliers will have different development and manufacturing processes along with varying levels of security for those processes.

Some mature companies, such as Juniper Networks, have highly automated manufacturing processes that are highly resistant to tampering, even from insiders. In such a situation, human intervention cannot override code installation and manufacturing steps that a limited number of trusted employees have pre-programmed. This significantly reduces the chances that an insider or external actor could tamper with product manufacturing and software installation.

Finally, any SCRM program must evaluate the potential for a third party to influence a supplier’s decision-making, product development or manufacturing processes. An audit should consider the extent of foreign ownership, control or other influence (FOCI) over these processes. FOCI is a well-known evaluation factor for supply chain risk that several governments use.

Assessment Validation: Supply chain risk management assessments carry more weight and legitimacy if they are validated and subject to supplier scrutiny. For that reason, third-party assessors not only should provide suppliers with a draft of their reports in advance, but also should allow them to comment on it.

Thanks to these efforts, Juniper Networks has never had a report of or evidence of counterfeit Juniper systems in the marketplace.

Federal Acquisition


Juniper Networks believes that government agencies, and especially the taxpayers, deserve to benefit from competition and innovation in the marketplace. Competition means more choice, rapid innovation and lower costs.

The government can realize these benefits only if it develops and follows policies that require tactical and strategic learning about all of today’s technologies. Agencies that simply buy what they know, such as what they have been using for years, deprive themselves of innovative solutions.

One way to turn the tide is for agencies to take full advantage of the existing opportunities for vendor communication and engagement. Let IT providers know what your mission requirements are and enable providers to compete against each other to meet or even exceed your requirements at the lowest cost.

Of course, to be successful at market research, agencies should be willing to engage with the industry and be open to overcoming the belief that they require certain brand-name solutions. Today’s technologies can operate on open-standard protocols, so even solutions from multiple manufacturers can interoperate seamlessly.

Agencies that take advantage of competition and conduct market research that is open, transparent and brand neutral will better position themselves to build the most innovative and secure networks.


Juniper Networks delivers solutions that allow our customers to take advantage of multi-vendor cloud (multicloud) strengths and capabilities. Single vendor clouds subject network users to a single point of failure; if one node or device is compromised, the entire cloud can be compromised. Multicloud provides users with better availability, flexibility and cost effectiveness.

High Availability: Multicloud provides redundancy and protection for an organization’s services and data storage against security threats and outages. If one cloud is unavailable, other clouds remain online to run applications and service users.

Flexibility: Multicloud offers organizations the choice and flexibility of selecting the best of each cloud type to suit their needs, economics, locations and timing. Typically, organizations use several different clouds to manage their data, infrastructure and applications. Organizations can avoid vendor lock-in if they use multicloud wisely to maintain application and data portability.

Cost-Effectiveness: Multicloud enables organizations to control their economics and take advantage of public cloud and infrastructure vendors competing on price. By using a public cloud service, organizations can deliver additional functionality to their customers without having to hire personnel or spend their own time managing the service and all of its dependencies. Additionally, by planning service capacity allocation through multicloud, organizations can optimize costs for specific service-level requirements and elastic scale.

With their high number of mission critical applications and related data, governments can particularly benefit from multicloud.

To take advantage of cloud and multicloud solutions, however, government end users must streamline their acquisition processes, update IT security policies, maintain up-to-date inventories of applications and avoid data localization requirements.

Open Standards

Juniper Networks agrees with our customers and other networking experts that networking solutions based on open standards provide greater product choice and lower cost, superior interoperability and enhanced security.

Greater Product Choice and Lower Cost: Because any manufacturer can develop its products based on open-standard protocols (and all of the major manufacturers do), IT customers that use open-standard compliance as one of their criteria have more product options than customers relying on proprietary standards.

It is also important to remember that with increased competition and choice comes lower costs for customers. IT end users can spend less on their networks and spend more on their own employees and product research.

Superior Interoperability: Key to an effective operation, an enterprise’s network infrastructure must be seamlessly interoperable with that of any potential customer or partner. Network infrastructures based on proprietary protocols require complex (and time consuming to implement) gateways for interoperability.

This is particularly concerning where enterprises are involved in public safety or national security. Interoperability issues can result in severe operational impact and the loss of life.

Enhanced Security: Protocols based on open standards can improve a network’s security posture. This is because open standards enable the integration of solutions from multiple sources, so end users can choose the best-of-breed products for each of their specific networking needs.

In addition, an enterprise can avoid the situation where a vulnerability in one product will affect the entire organization. If all of the devices deploy the same software implementation, the network is subject to a ‘single point of failure’ that can cause significant negative consequences, including network outages and data compromises. To make the matter worse, the final result often is diminished business reputation and loss of customers.



The United States and Chinese governments each have imposed tariffs on certain products originating from the other country. In 2018, the United States, for example, imposed tariffs on a large variety of products of China origin. As a result, a large portion of Juniper products manufactured in China became subject to a tariff on importation into the United States.

Juniper Networks has a global footprint that we will continue to sustain with a global supply chain. We implemented measures to minimize the impact that the tariffs have on our customers and partners in order to uphold our competitive pricing and value and to deliver quality solutions and innovative technology. We will also work with our industry partners and relevant government officials to resolve the tariff impasse and reduce barriers to trade.

Net Neutrality

Juniper Networks believes that the internet should remain open, competitive and free. To that end, we support engaging with stakeholders to promote continued investment and innovation in networking and internet technology and we oppose government policies that limit the ability of businesses to adapt to new climate and models.


Juniper Networks is committed to protecting the environment by offering hardware, software and service solutions that enable our customers to meet sustainability goals and support a circular economy. Our eco-design initiative focuses on improving the environmental performance of products through design. Priorities for the initiative include:

Materials Innovation: Targeting a reduction in the amount of materials used in our products, combined with using materials that have less environmental impact and/or more value at their end of life.

Design for Recyclability: With a focus on developing products that are easier for our customers to upgrade, reuse and recycle.

Energy Efficiency: Highlighting a reduction in the amount of energy needed to manufacture and use our products.

We also see a critical need to help our customers expand the useful life of their Juniper products as a means toward environmental sustainability. We design and build our products for interoperability, modularity, repair and refurbishment.

We monitor our compliance with relevant laws in all of our locations worldwide. Working with governments, industry partners and consortia and customers, we also focus on the development and implementation of standards and metrics.