A Couple Decades (And Change) of Working From Home

When the Covid-19 pandemic was declared in March of 2020 and most every high-tech business became ā€œall remote all the timeā€ literally overnight, my first thought was: Iā€™ve been training my whole life for this.

Because, really, Iā€™ve been mostly working from home since 1998 when I moved from Silicon Valley to Washington State, yet continued to work for companies with offices in Silicon Valley. First, I worked for a now non-existent Check Point reseller, then to what became the Security Appliance business at Nokia, then for Check Point.

Needless to say, Iā€™ve had a LOT of experience with Check Point Remote Access VPN over the years. Experience I put to good use when our customers started asking on CheckMates about the various remote access solutions.

Back in 1998, the applications I was accessing were fairly limited. Weā€™re talking email, maybe a case management system of some sort as I was doing support back in the day, and thatā€™s it. And Iā€™m doing it from one device. Now Iā€™m not only accessing stuff hosted on premise, Iā€™m accessing stuff hosted in the cloud. And Iā€™m doing it from multiple devices.

Iā€™m reminded of Daniel Burrusā€™ book Flash Foresight, something I wrote about in 2016. Specifically, Iā€™m reminded of his concept of Hard Trends, and three weā€™re all living with:

  • Ever Increasing Connectivity
  • Ever Increasing Processing Power
  • Ever Increasing Storage

This is both a challenge and an opportunity: both for us as consumers and for the malicious actors out there who exploit this. Is it any wonder we are seeing an ever-increasing amount of Cyber Attacks out there?

All of this has been a boon in the current circumstances. I can tell you that doing conference calls without video back in the 90s and early 2000s wasā€¦no fun. And while video adds a human element to talking to people remotely, you miss out on the spontaneous discussions that happen when youā€™re visiting the office and bump into someone that you might not have planned to have.

And, of course, these conferencing platforms have their security issues also. In addition to the application specific vulnernabilities, there are issues of data soverignty in terms of where the streams are routed through. This is something of concern with any cloud service, of course.

The one thing I think has been made clear from the last 18 months or so is: remote work is going to be ā€œthe new normalā€ for a lot of people. We now have a whole generation of kids whoā€™ve now done school remotely (for better or worse) and I suspect some percentage of them will demand remote work. Heck, even the current generations in the workforce are seeing the value of it.

All of that said, we canā€™t forget the human touch. Nothingā€™s going to replace getting together in person. While I canā€™t say thereā€™s been a huge improvement in remote interaction in the last 20+ years beyond the addition of video (and what amounts to chat apps on a multitude of devices), I feel like as the hard trends I highlight above keep moving forward, weā€™ll get more ā€œhumanā€ interactions over time.

Likewise, Cyber Security isnā€™t going anywhere. For those practioners, the job will continue to expand into new frontiers, creating new challengesā€¦and opportunities to achieve better cyber security than was possible before. But only if youā€™re up to the challenge.

Disclaimer: My employer Check Point Software Technologies is up to the challenge of cyber security in an ever-changing and expanding environment. That said, these thoughts are mine.

Some Things Never Change at Palo Alto Networks

Ages ago, I had written about this gem I had found in the End User License Agreement for Palo Alto Networks equipment. Itā€™s still there in more or less the same form it was back in 2014:

2.c. Use Restrictions: You shall not: [...] vi. Disclose, publish or otherwise make publicly available any benchmark, performance or comparison tests that you (or a third part contraqcted by you) run on the Products, in whole or in part;

And while NSS Labs is, sadly, no longer around to run afoul of thisā€“they ceased operations on 15 October 2020 due to Covid-19ā€“Palo Alto Networks is still around and still using the legal system to suppress published comparisons of their products to competitors. Their current target: Orca Security, who dared to compare their products against Palo Alto Networkā€™s equivalent offerings and post the result of their findings on the Internet.

As Orca Security Co-founder and CEO Avi Shua points out:

Itā€™s outrageous that the worldā€™s largest cybersecurity vendor (its products being used by over 65,000 organizations according to its website), believes that its users arenā€™t entitled to share any benchmark or performance comparison of its products. According to its boilerplate contract terms that prohibit ā€œdisclosing, publishing, or otherwise making publicly available any benchmark, performance, or comparison testsā€ of its products, youā€™re in violation even if you publish the results of an internal comparison of Palo Alto Networks against other products as part of your procurement process. The same goes for the hundreds of Palo Alto Networks reviews on various sites that include G2 Crowd, Capterra, and Gartner Peer Insights. It means that only benchmarks approved by Palo Alto Networks can be published.

Of course, this is from the same company that, on average, takes more than four months to fix reported security vulnerabilities against their product. Explains why pentesters donā€™t even know their firewalls are there.

Disclaimer: In the interest of transparency, which I believe is a good thing, I know several people at Orca Security as they used to be co-workers at my current employer, Check Point, who did not offer an opinion on this matter. These are just my own thoughts.

My Two Check Point Decades

February 1999 was the last time I willingly changed employers. Thatā€™sā€¦20 years, which, in this day and age, is an eternity to stick with the same employer.

Thatā€™s not entirely true. I did change employers in April of 2009 when Check Point Software Technologies completed the acquisition of the Nokia Security Appliance business that I worked in. Because of this, when you look at my official start date at Check Point, it reflects the day I started at Nokia, which was in February of 1999.

More than Two Decades, Actually

But really, my Check Point experience goes back farther than that. It even predates the Check Point Experience conferences currently going on right now, starting in 1996. I began working for a company that resold, among other things, Check Point FireWall-1.

Back then, Check Point didnā€™t have a support site and there wasnā€™t much information out there on the Check Point product. I ended up building and maintaining a public FAQ, which got a lot of attention.

That FAQ did lead to my job at Nokia in 1999, where I was hired under a telecommuting arrangement, which at that time was unusual. Most of my co-workers were in the San Francisco Bay Area. I had just recently moved to Washington State, and telecommuted with the occasional trip to the office.

Quite a lot has happened in the decade that followed. Nokia acquired many companies, changed strategies a few times, reorganized, but our business unit that produced appliances that ran primarily Check Pointā€™s software remained. The appliances were quite popular, as was our Technical Support, where I worked in various roles. Our business unit had many names over the years, including: IP Routing Group, Nokia Internet Communications, and Nokia Enterprise Solutions. Our revenues were effectively rounding error when compared to Nokiaā€™s Mobile Phone business at the time, was profitable.

The Winds of Change and a Recession

By the end of 2007, the winds of change were definitely blowing. The iPhone was announced at the beginning of 2007 and took the world by storm. This had a massive effect on the mobile phone market as a whole, and Nokia in particular. More specific to our business unit, I saw an organizational chart that showed our business unit isolated from the rest of Nokia. Which, in some ways, made sense since we operated pretty independently of the larger Nokia. However, it foretold what was to come.

Near the end of September of 2008, a Nokia executive had inadvertently made public they were in the advanced stages of selling the Nokia Security Appliance business to a private investment firm. This began a rather tumultuous 7 month period in my professional career.

While trying to do our jobs keeping customers happy and secure, we were developing plans to become a company independent of Nokia. This involved quite a lot of details that, working for an established company like Nokia, you just donā€™t think about.

All this planning activity suddenly stopped, or at least management stopped asking about it. Things got oddly quiet. Turns out, the recession that kicked in during October 2008 ā€œcooled offā€ the potential buyers.

Coming Home to Check Point

Just before Christmas 2008, it was announced that Check Point was buying the Nokia Security Appliances business. After three months of uncertainty, we were starting all over again with a whole different set of concerns. Who would be acquired? Who would end up staying at Nokia? Who would end up having to look for work? And was any of this a good thing?

Iā€™ll spare you the details of the three months that followed, but it involved interviews with people at Check Point, a CFIUS review (we were a US asset that was being purchased by a foreign-owned company), and a lot of unknowns. All, meanwhile, while we were continuing to serve our customers.

In April of 2009, the acquisition of Nokiaā€™s Security Appliance business by Check Point closed. Some ended up staying with Nokia, some came over to Check Point, others were given severance packages. And a whole new adventure began as this was not only a change in employer for me, I changed jobs. Which, as it turns out, was a great thing.

At first, my job wasnā€™t all that different. I was a sort of backline support for the sales organization, interfacing between sales, R&D, and Product Management. It wasnā€™t too different from what I was doing at Nokia, actually, just with a different focus (pre-sales).

Eventually, my role evolved into a Security Architect, where I went on customer sites, reviewing their security architecture, providing recommendations for addressing the identified issues along with what Check Point products would best address their needs. This got be a bit closer to the actual sales process.

Back to the Future

CheckMates

Then, at the end of 2016, I was offered an interesting proposal that leads me where Iā€™m at now at Check Point: as the front man for Check Pointā€™s user community: CheckMates. The funny thing is, Iā€™m doing a lot of what I was doing running the FireWall-1 FAQ back in the 1990s, except Check Point is now paying me to do it.

A lot has changed in the last 20 years. The old days were fun, but Iā€™m having the time of my life right now! Iā€™m not just doing some online thing from my basement, Iā€™m getting out there, meeting customers, spreading the good word. Given the significant increase in the velocity and impact of cyber threats, the work that Check Point is doing to prevent them is more important than ever!

And while Iā€™m not talented enough to develop solutions to cyber threats, I can certainly communicate, educate, build trust, and collaborate. I can occasionally develop solutions to some problems as the hundreds of posts on CheckMates and the hundreds of FAQs I published years ago will confirm.

Itā€™s what Iā€™ve always done in my career, and yet, Iā€™m just getting started.

An Updated Word About Competition in the Information Security Industry

A year ago, I had written a post about competition in the information security space, of which I work as a part of for a vendor that has been in it for nearly a quarter century: Check Point Software Technologies. A few things have changed since I wrote the post and I decided, rather than merely repost my previous post, create a new version of it and update with some relevant information. Iā€™ve removed the old post because it largely says the same thing.

Why Iā€™m In This Industry

The devices, networks, and social institutions we use today are only useful because, on the whole, most people largely trust them. If this trust erodes, people will not make use of them.

It took me many years of working at Nokia to realize that regardless of what I do in life, I am always going to be looking for where the flaws are in the systems and do what I can to improve these systems so they will remain trusted.

As a company, Check Point firmly believes customers deserve the best security for their digital information. That, plus my long-time history with Check Point was why I ultimately decided to go work for Check Point when they acquired Nokiaā€™s Security Appliance Business back in 2009. The talented, smart people I work with day-in and day-out working toward the same goal is why Iā€™m still here, even though some have left for what they see as greener pastures, or at the very least, a different pasture.

What About The Competition

One of the things Iā€™ve always tried to do online is to bring facts, understanding, and details to light. This is what I did with the FireWall-1 FAQ back and the day and what Iā€™m trying to do as part of my effort with Check Pointā€™s user community: CheckMates.

You may have noticed that I occasionally delve into the subject of Check Pointā€™s competition in my online discourse. The main reason I do this is because some of them are saying stuff that flat out isnā€™t true, a gross misrepesentation, or they advocate a poor approach.

To be clear, I think healthy competition is a good thing. It raises all boats, regardless of who you ultimately use. Despite our differences in approach, there is a common enemy: the malicious actors who attempt to penetrate and disrupt our customers networks. We would do better as an industry to remember that and work better together toward defeating that common enemy.

Despite that common goal, everyone who works for a security vendor, particularly in a sales or marketing capacity, wants to succeed over the competition. As part of that, each vendor puts outs information that puts their offering in the best light. Certainly Check Point has done this with some past marketing campaigns such as:

This is all part of normal, healthy competition that happens in any industry.

Palo Alto Networks is clearly a different competitor and seems to play by different rules, particularly with respect to Check Point.

Itā€™s Personal for Palo Alto Networks

Nir Zuk, the co-founder of Palo Alto Networks, drives a car with the license plate CHKPKLR. This was widely known since at least 2005 and a picture of said license plate was featured prominently at their 2016 Sales Kick Off:

CHKPKLR

The guy up on stage? Their CEO Mark McLaughlin, propagating the ā€œCheck Point Killerā€ message to the assembled masses.

Over the years, Iā€™ve heard countless stories of how Nir Zuk would come in to talk to a (potential) customer and spend a significant amount of time talking about Check Point, to the point where he was thrown out of at least one customer meeting! Given how some customers feel about Check Point, Iā€™m sure that tactic did help to drive some sales.

In the following picture, you can see Palo Alto Networks Chief Marketing Officer Rene Bonvanie with a slide behind him of Check Point CEO Gil Shwed:

Gil Shwed is not my friend

To take it one step further, it was recently discovered that Palo Alto Networks has a so-called ā€œCheck Point Kill Squad.ā€ This was disclosed by way of a screenshot of what appeared to be an internal portal from Palo Alto Networks. There was no real information in this screenshot, just partial bullet points of a few competitive talking points against Check Point SandBlast and the fact they also have a Competitive teamā€“nothing that wasnā€™t already widely known or easily to deduce.

Rather than simply ignore it, Palo Alto Networks saw fit to issue a DMCA takedown notice, causing Moti Sageyā€™s LinkedIn account to be temporarily suspended. Given their propensity to use EULAs as a way to prevent the truth from being disclosed about their products, using a DMCA takedown to needle someone at a competitor doesnā€™t seem too far fetched.

Conclusion

Itā€™s clear the hatred of Check Point is institutionalized at Palo Alto Networks and that it comes straight from the top. Given they still havenā€™t fixed potential bypasses in their product two years after they were reported, it makes me question what business they are truly in.

Disclaimer: My blog, my personal opinions. Iā€™m sure you knew that.

Taking CheckMates On The Road

After a couple months of mostly being at home (nice change of pace), Iā€™m now taking the Check Point CheckMates community on the road!

Aside from building the community site, where weā€™ve definitely seen an uptick in activity in recent weeks, part of my charter is to faciliate in-person Check Point meetups. We are starting these in a number of locations! Four in particular Iā€™d like to draw your attention to are ones I will be at!

Sadly, I didnā€™t get the bright idea to do this before last week, where I was in Cincinnati. However, itā€™s not too late to see me in the following places over the next few weeks:

Also, while I have your attention, Iā€™d be remiss if I didnā€™t point out the Ask Me Anything weā€™re doing with Dr. Dorit Dor and her management team on the 18th of September. Get your questions in now!