Fact-checked by Grok 2 weeks ago

Check Point


Software Technologies Ltd. is an specializing in cybersecurity software, hardware, and services for enterprises and governments.
Founded in 1993 in , , by , , and Marius Nacht, the company pioneered the first stateful inspection firewall technology with its FireWall-1 product, revolutionizing by inspecting packets in rather than individually.
Headquartered in , operates globally, serving over 100,000 organizations across more than 80 countries with solutions encompassing , endpoint protection, cloud , and threat powered by .
The company reported total revenues of $2.565 billion for 2024, reflecting a 6% year-over-year increase, driven by demand for its Infinity architecture integrating prevention-first across hybrid environments.
maintains a leadership position in the industry, consistently earning top rankings in independent tests for and prevention efficacy, such as blocking 99.9% of in benchmarks, while its research arm contributes to global threat .

Overview

Founding and Core Mission

Check Point Software Technologies Ltd. was founded in July 1993 in , , by , Marius Nacht, and . Shwed, who became the company's first CEO, conceived the core technology of stateful packet inspection while working on early challenges, addressing the limitations of existing packet filtering methods that lacked context awareness for network traffic. The trio's venture capitalized on 's burgeoning tech ecosystem, with initial funding limited to approximately $150,000 from personal resources and early investors, reflecting a bootstrapped start amid rising demand for enterprise-grade network protection as internet adoption surged globally. The company's inception stemmed from a recognition of vulnerabilities in nascent , where traditional perimeter defenses failed against sophisticated ; Shwed's enabled to track states, improving and detection without excessive overhead. This led to the launch of FireWall-1, the first commercially viable stateful inspection-based , which set industry standards by integrating security into network gateways rather than relying on host-level measures alone. Check Point's core mission, articulated consistently since founding, centers on securing digital operations by delivering prevention-focused cybersecurity architectures that protect organizations' internet-enabled business activities at the highest efficacy levels. This entails pioneering unified platforms that consolidate threat intelligence, policy enforcement, and adaptive defenses against evolving cyber risks, prioritizing architectural simplicity to reduce complexity in multi-vector environments. Over three decades, this purpose has driven innovations from firewalls to AI-enhanced prevention, emphasizing empirical threat data over reactive patching to enable secure scalability for enterprises worldwide.

Leadership and Corporate Governance

Check Point Software Technologies Ltd. was founded in 1993 by Gil Shwed, Shlomo Kramer, and Marius Nacht, with Shwed serving as the initial CEO and credited as the inventor of the modern computer firewall. Shwed led the company for over three decades until December 16, 2024, when he transitioned to the role of Executive Chairman of the Board of Directors to focus on long-term strategy and innovation. On the same date, Nadav Zafrir was appointed Chief Executive Officer and added to the Board, bringing expertise from co-founding the cybersecurity venture firm Team8 and prior service as a Brigadier General commanding Israel's Unit 8200 signals intelligence unit. The executive team under Zafrir includes key roles such as Itai Greenberg, who joined in 2010 and oversees global sales; Roei Golan, appointed in 2021 with prior experience at ; and Jonathan Zanger, formerly CTO at Trigo and a alumnus. Other senior leaders encompass and Head of R&D Nataly Kremer, Sharon Schusheim, and Brett Theiss, reflecting a blend of internal long-termers and external hires with backgrounds in , , and . The comprises Shwed as Executive Chairman, Zafrir as a director, and independent members including Ray Rothrock (chair of the ) and Jerry Ungerman. As an -incorporated company listed on , Check Point qualifies as a foreign private issuer, which permits flexibility in such as not requiring a majority of independent directors but mandates compliance with NASDAQ listing standards and Israeli Companies Law. Corporate governance is guided by Board-adopted principles emphasizing ethical conduct, director independence in oversight, and , with dedicated committees including the (focused on financial reporting and internal controls), Nominating and Sustainability Committee, and others addressing compensation and . These structures support , with the Board reviewing executive performance annually and maintaining policies against conflicts of interest.

Global Operations and Market Leadership

Check Point Software Technologies maintains its primary headquarters in , , at 5 Shlomo Kaplan Street, and a key U.S. office in , at 100 Oracle Parkway, Suite 800. The company owns its Tel Aviv facility and leases office spaces in various global locations. It operates subsidiaries including Check Point Software Technologies (Canada) Inc. and Check Point Software Technologies GmbH in , supporting its presence across the , , the , , and . As of December 31, 2024, Check Point employed 6,669 people worldwide. Revenue distribution reflects its international footprint, with approximately 50% generated from , the , and Africa, 40% from the , and 10% from . The firm serves over 100,000 businesses and millions of users globally, delivering cybersecurity solutions to enterprises, service providers, and governments. Check Point holds market leadership in , particularly , as evidenced by its designation as a Leader in the 2025 IDC MarketScape for Worldwide Enterprise Firewalls, amid a $12.3 billion firewall market in 2024. It was also positioned as a Leader in Gartner's 2025 for Hybrid Mesh Firewalls and recognized as the sole Outperformer in GigaOm's enterprise evaluation. The company's Infinity Platform achieves a reported 99.8% prevention , underpinning its competitive edge.

Historical Development

Inception and Early Innovations (1993–1996)

Check Point Software Technologies was founded in in , , by , Marius Nacht, and . Shwed, aged 25 at the time, conceived the company's core technology—stateful inspection—addressing limitations in existing packet-filtering approaches by tracking the context and state of network connections rather than inspecting packets in isolation. This innovation emerged amid the rapid growth of internet connectivity, where traditional security methods proved inadequate against evolving threats. In 1994, Check Point released FireWall-1 version 1.0, the industry's first commercial stateful inspection firewall, which integrated inspection at the while maintaining high performance through kernel-level processing. The technology enabled granular control over traffic by maintaining a state table of active connections, allowing legitimate packets to pass efficiently while blocking unauthorized ones based on session history, a significant advancement over stateless filters that treated each packet independently. FireWall-1 version 2.0 followed in 1995, introducing enhancements such as improved management interfaces and support for additional protocols, further solidifying its position as a for . By 1996, Check Point had refined stateful inspection into a patented framework that became the for efficacy, emphasizing without compromising network speed. These early developments positioned the company to capitalize on the burgeoning demand for robust perimeter defenses as corporate networks expanded.

Initial Public Offering and Expansion (1996–2000)

In June 1996, Check Point Software Technologies Ltd. conducted its (IPO) on the stock exchange under the CHKP, raising $67 million at an initial share price of $14. This capital infusion enabled accelerated , product diversification, and international following its recognition as the global firewall market leader with 40% share by earlier that year. Post-IPO, Check Point expanded its product portfolio beyond core solutions, introducing software in 1997 to facilitate centralized security administration for customers. The company also launched VPN-1 that year, providing secure remote access capabilities via virtual private networks, which addressed growing demand for encrypted connectivity amid proliferation. Geographically, Check Point established a U.S. in , and opened additional offices in to support sales and operations in North American and European markets. Financial performance reflected robust expansion, with revenues growing from approximately $38.7 million in net income implications of early scaling to $141.9 million in total revenues by , $219.6 million in , and $425.3 million in , driven by increased adoption of its stateful technology and OEM partnerships. A pivotal partnership with integrated Check Point's software into Nokia's appliances, enhancing hardware-software bundling and distribution reach. These developments solidified Check Point's position in the burgeoning cybersecurity sector during the late 1990s dot-com boom.

Acquisition-Driven Growth (2000–2010)

During the first decade of the , Check Point Software Technologies shifted from in technology to an acquisition-led expansion strategy, aiming to broaden its capabilities in , data protection, intrusion detection, and hardware appliances. This approach addressed emerging threats like mobile data leakage and vulnerabilities, while integrating complementary technologies into its unified security architecture. By 2010, these moves had diversified Check Point's offerings, positioning it as a provider of comprehensive threat solutions rather than a firewall specialist alone. In December 2003, Check Point acquired MetaInfo, though details on its integration into core products remain limited; subsequent deals built on this momentum. The pivotal 2004 acquisition of Zone Labs Inc., developer of the popular personal firewall, for approximately $114 million in cash plus 5.3 million shares, strengthened for consumer and enterprise markets, adding behavioral analysis and personal VPN features to Check Point's portfolio. Key expansions in data and followed in 2006 with the acquisition of Protect Data Mobile, a firm specializing in and secure data deletion for PDAs and laptops, valued at around €425 million (approximately $540 million at the time), which enhanced Check Point's offerings for protecting sensitive information on portable devices amid rising workforce risks. In , Check Point completed the $20 million purchase of NFR Security, a U.S.-based provider of network intrusion prevention systems using pattern-matching and , bolstering defenses against sophisticated network attacks and integrating into Check Point's intrusion prevention software () blades. By 2009, amid economic recovery, Check Point acquired Nokia's security appliance business for $161 million, gaining hardware platforms and a customer base exceeding 10,000 deployments, which allowed seamless migration to Check Point software while expanding into integrated security gateways. That year also saw the purchase of Communications' application control database, incorporating visibility and controls for over 50,000 widgets and 4,500+ internet applications to combat evolving and threats. The decade closed with the June 2010 acquisition of Liquid Machines, a prevention (DLP) specialist, for an undisclosed sum, adding policy-based and content-aware protection for endpoints and networks, further unifying Check Point's stack. These acquisitions, totaling over a in the period, drove product innovation through technology assimilation rather than greenfield development, with integrated "software blades" enabling modular deployments that appealed to enterprises seeking scalable, single-vendor solutions. Despite challenges and market competition, this strategy correlated with sustained revenue growth, from $506 million in 2000 to $1.043 billion by 2010, reflecting broader adoption of layered security paradigms.

Contemporary Advances and AI Focus (2010–2025)

In 2010, Check Point introduced ThreatCloud, a collaborative, cloud-based intelligence network designed to aggregate global threat data for real-time updates and enhanced prevention capabilities across its security gateways. This marked an early pivot toward scalable, intelligence-driven defenses amid rising cloud adoption and sophisticated attacks. By 2015, the acquisition of Hyperwise bolstered CPU-level threat prevention through advanced behavioral analytics and , enabling proactive detection of zero-day exploits without performance degradation. The launch of the architecture in 2017 consolidated Check Point's portfolio into a unified platform spanning networks, cloud, mobile, and endpoints, emphasizing prevention-first strategies with integrated threat intelligence sharing. This evolution addressed fragmented by incorporating modular Software Blades for , while laying groundwork for enhancements in subsequent years. Acquisitions like Avanan in 2021 extended cloud email and protections via API-based scanning and . From 2023 onward, Check Point intensified AI integration, debuting Harmony in March 2024 as an AI-powered solution for preventing threats in environments through continuous and automated policy enforcement. The Infinity Platform evolved to include AI-driven features like contextual threat prevention and autonomous zero-trust capabilities, recognized by Miercom in April 2025 as the top-ranked AI-powered cybersecurity platform for superior efficacy in blocking advanced attacks. In 2025, acquisitions such as Veriti for AI and Lakera for adversarial AI defenses further embedded into external threat hunting and application protection, while new appliances delivered 4x faster AI-accelerated prevention at network edges. These advances prioritized empirical over reactive signatures, yielding measurable reductions in breach windows as validated by independent benchmarks.

Products and Technologies

Network and Firewall Solutions

Check Point's foundational contribution to lies in pioneering stateful inspection technology with the 1993 release of FireWall-1, the industry's first to track active connection states for context-aware filtering, surpassing stateless packet inspection by analyzing packet sequences and session data at the network layer. This approach maintains state tables to validate traffic legitimacy, enabling enforcement of security policies based on full communication history rather than isolated packets. The company's modern network and solutions center on the Quantum series of AI-powered next-generation (NGFWs), which provide scalable protection up to 1 Tbps throughput with 99.999% resiliency via intelligent clustering for data centers, branches, and hyperscale environments. These gateways integrate over 50 AI engines for real-time threat prevention, achieving a 99.9% block rate against zero-day attacks, alongside defenses for vulnerabilities, DDoS floods, and sophisticated exploits through cloud-delivered intelligence. Quantum NGFWs support comprehensive connectivity features including remote access VPN, (SASE), and (SD-WAN), all managed via a unified console that enforces consistent policies across users, applications, and hybrid cloud infrastructures. Performance metrics include up to 800 Gbps firewalling, sub-3μs latency, and 75 Gbps Layer 1-7 threat prevention, distinguishing them from traditional firewalls by emphasizing proactive AI-driven hyperscalability over reactive signature-based detection. Core capabilities encompass multilayered threat prevention with intrusion prevention systems (IPS), sandboxing, anti-malware, and encrypted traffic inspection, complemented by identity-based controls using (IAM) and (RBAC) to align with zero trust principles. Centralized security management offers unified visibility and across on-premises, , and remote deployments, reducing operational complexity while independent benchmarks confirm superior efficacy, such as a 99.7% overall block rate compared to competitors' 72.7%. For small to medium-sized businesses, the Quantum Spark appliances deliver simplified NGFW functionality with automatic updates, unified access policies covering rules, application control, and filtering, ensuring accessible yet robust perimeter defense without extensive expertise.

Endpoint and Mobile Security

Check Point's endpoint security solutions center on Endpoint, a unified platform that integrates endpoint (EPP), endpoint detection and response (EDR), and extended detection and response (XDR) capabilities into a single agent to safeguard devices against advanced s. This solution supports diverse environments including Windows, macOS, , servers, virtual desktop infrastructure (VDI), browsers, and mobile devices, leveraging Check Point's ThreatCloud network with over 60 engines for zero-day prevention. Key protections encompass and blocking, zero-phishing defenses, , advanced data loss prevention (DLP) with full , and automated vulnerability assessment paired with patch management, as enhanced in updates announced on May 11, 2023. Endpoint also monitors generative tool usage for compliance risks and facilitates rapid incident resolution through automated responses, addressing a reported 38% year-over-year increase in cyberattacks targeting remote workforces. For mobile-specific security, Check Point offers Harmony Mobile, a mobile threat defense (MTD) solution that secures corporate data on employee devices by defending against threats across applications, files, networks, and operating systems without compromising or . It blocks malicious app and file downloads, prevents man-in-the-middle network attacks via on-device controls, detects OS vulnerabilities (including CVEs), jailbreaking or rooting attempts, and via SMS or other vectors, with version 4.0 released on May 19, 2022, introducing industry-leading malicious file protection capabilities. Harmony Mobile integrates seamlessly with Harmony Endpoint and broader Harmony SASE for unified management, enabling scalable oversight of mobile workforces amid rising threats like and advanced persistent threats. These offerings evolved from earlier products like SmartEndpoint, which reaches end-of-support on December 31, 2025, with migration paths to 's web management console for continued functionality. Both and mobile solutions emphasize prevention over detection, incorporating Check Point's Infinity Architecture for consolidated policy enforcement and reduced complexity in work environments. Independent evaluations, such as those highlighting its automated EDR for minimization, underscore its effectiveness against exploits and sophisticated .

Cloud and Data Center Protections

Check Point Software Technologies delivers cloud security through its CloudGuard platform, a comprehensive solution designed to prevent threats and manage risks across multi-cloud, hybrid, and environments. CloudGuard functions as a prevention-first Cloud Native Application Protection Platform (CNAPP), incorporating AI-powered threat detection to secure applications from code to cloud deployment, while addressing misconfigurations, known threats, and zero-day attacks. It supports unified management of cloud network security, including firewalls that achieved a 99.7% block rate in Miercom benchmarks and a 99.8% catch rate in CyberRatings evaluations. The platform protects over 821 million cloud assets daily and is utilized by 50% of the top 50 companies, yielding an 84% reduction in risks and a 169% according to Forrester analysis. For protections, Check Point employs Quantum Security Gateways, such as the Quantum 26000, 28000, and the 28600 model, which is the fastest 1U gateway available. These gateways integrate SandBlast for advanced prevention against fifth-generation attacks, delivering up to 1.5 Tbps in hyperscale and 30 Gbps of prevention per unit. Features include telco-grade reliability, 100% SSD , high density with modular expansion to 16 x 100 GbE interfaces, and 2.5 times greater power efficiency compared to competitors. They enable zero-touch provisioning and unified policy management across hybrid cloud setups, ensuring consistent enforcement for workloads transitioning to or integrated with public clouds. CloudGuard and Quantum solutions interoperate within Check Point's Infinity architecture to bridge cloud and data center defenses, with recent enhancements including a 100% block rate for cloud firewalls in the Q1 2025 CyberRatings test and recognition in the 2025 Market Guide for Cloud Web Application and API Protection. This integration facilitates automated , monitoring, and risk prioritization in environments combining on-premises data centers with AWS, , and Cloud infrastructures.

AI-Integrated Management Platforms

Check Point's Infinity Platform serves as the core AI-integrated management framework, providing unified security operations across network, endpoint, cloud, and mobile environments through cloud-delivered architecture. Launched as an evolution of earlier management systems like SmartConsole, it incorporates for real-time threat intelligence and , enabling centralized policy enforcement and visibility for hybrid infrastructures. The platform's AI capabilities aim to simplify operations by reducing manual configurations and integrating to anticipate vulnerabilities. In February 2024, Check Point introduced AI Copilot, a generative AI tool embedded within the to automate administrative tasks such as policy optimization and via queries. This copilot functions as both an analytical assistant, generating proactive recommendations based on data, and an engine for complex workflows, thereby enhancing without requiring deep expertise in rule syntax. Independent evaluations, including a Miercom benchmark in April 2025, rated as the top AI-powered cybersecurity for its superior prevention efficacy and unified management integration compared to competitors. Further advancements occurred in February 2025 with the release of two management bundles tailored for environments, focusing on enhanced visibility, automated checks, and risk prioritization through -driven . These bundles leverage Infinity's to vast datasets from gateways, correlating events across silos to reduce mean time to resolution for incidents. Additionally, the platform's -enabled handles repetitive tasks like log analysis and , scaling prevention mechanisms while minimizing false positives via models. The Platform also integrates with external tools via features like the MCP Server, introduced in July 2025, which facilitates secure data exchange between generative models and Check Point's infrastructure for customized exposure . This modular approach allows enterprises to extend capabilities without compromising core , though it requires careful configuration to mitigate risks from third-party integrations. Overall, these elements position Infinity as a consolidated layer that prioritizes prevention over , supported by Check Point's proprietary feeds.

Research and Innovation

Check Point Research Division

The Check Point Research Division, also known as Check Point Research (CPR), serves as the cybersecurity intelligence arm of Check Point Software Technologies, delivering threat intelligence derived from analysis of global cyber attack data collected through the company's ThreatCloud network. Comprising over 200 analysts, malware reverse engineers, and researchers, the division employs advanced techniques including machine learning modules for anomaly detection, reverse engineering of malicious code, and proactive campaign hunting to identify emerging threats. This team collaborates with external security vendors, law enforcement agencies, and computer emergency response teams (CERTs) to share findings and enhance collective defenses. The division's primary mission focuses on dissecting cybercriminal operations, vulnerabilities, and to inform product updates and protect Check Point's customer base, which spans over organizations worldwide. It leverages data from billions of daily security events processed by ThreatCloud to produce actionable intelligence, including monthly threat bulletins, quarterly cyber attack trend reports, and annual security reports that quantify attack volumes—such as documenting a 75% surge in global cyber attacks in Q3 , with manufacturing sectors facing elevated risks. CPR's outputs emphasize empirical metrics, like average weekly attacks per organization (e.g., 3,828 in the / sector during Q3 ), to highlight causal patterns in threat evolution rather than unsubstantiated narratives. Key contributions include pioneering disclosures of sophisticated threats, such as the infrastructure supporting the Cerber ransomware in 2016 and the Nuclear Exploit Kit, which targeted vulnerabilities in browsers and plugins. More recently, CPR uncovered the YouTube Ghost Network in October 2025, a coordinated malware distribution scheme using hijacked YouTube accounts to propagate infostealers and remote access trojans. The division has also exposed ransomware operations like LockBit variants affecting dozens of organizations and vulnerabilities in systems such as IIS servers via exposed ASP.NET machine keys, enabling unauthorized access. These findings have driven mitigations, including patches and indicators of compromise shared publicly, contributing to the broader cybersecurity ecosystem without reliance on centralized academic or media interpretations prone to institutional biases. Through regular publications and podcasts, CPR fosters industry-wide awareness of causal threat dynamics, such as the role of open-source malware in lowering barriers for novice actors (e.g., Yurei group) and the intensification of AI-related risks amid a 46% surge in 2025. Its work prioritizes verifiable, data-driven insights over speculative trends, enabling organizations to address root causes like exploited supply chains and unpatched endpoints.

Threat Intelligence Outputs

Check Point's threat intelligence outputs encompass a range of publications and feeds derived from its global sensor network and research efforts, aimed at disseminating insights on emerging cyber threats. These include weekly Threat Intelligence Bulletins that summarize recent discoveries, such as the October 20, 2025, edition covering global cyber attack trends and top attacks. Annual reports provide broader analyses, exemplified by the 2025 Cyber Report, which details prevalent threats like , infostealers, and vulnerabilities based on from over 1 billion daily security events. The company's AI Security Report, released in April 2025, highlights AI-driven cyber threats, including AI-assisted detection evasion and generative AI for , drawing from empirical observations of attack patterns to recommend defensive strategies. Specific intelligence reports address targeted campaigns, such as the October 2025 disclosure of a large-scale malware distribution network involving stealthy operations across multiple regions. These outputs prioritize actionable data over narrative framing, leveraging Check Point's proprietary rather than unverified third-party claims. Central to these outputs is the ThreatCloud service, a collaborative aggregating data from thousands of sensors worldwide to deliver feeds, including indicators of compromise (IOCs) and behavioral signatures updated dynamically. Infinity ThreatCloud extends this by integrating over 50 technologies for novel detection, feeding prevention engines with insights from on evasion tactics. Outputs are disseminated via customer portals, , and public research portals, enabling organizations to prioritize feeds through customizable collections that filter and aggregate IOCs for integration into security operations. Check Point Research also publishes ad-hoc alerts on high-impact threats, such as September 2025 identifications of ransomware variants affecting multiple victims, supported by forensic analysis of attack artifacts. This output model emphasizes empirical validation through sensor-derived evidence, contrasting with less rigorous industry reports that may amplify unconfirmed incidents for visibility. While Check Point's data reflects its product ecosystem, cross-verification with independent scans underscores the reliability of shared IOCs in disrupting campaigns.

Benchmarks and Industry Contributions

Check Point's products have demonstrated superior performance in independent benchmarks evaluating threat prevention efficacy. In Miercom's 2025 Next-Generation Firewall Benchmark, Check Point achieved the highest scores across all categories, blocking 99.9% of and 99.7% of attacks, securing top ratings for the third consecutive year. Similarly, in the 2024 Evaluations for enterprise , Check Point's Infinity Platform recorded a 100% detection rate against tested threats without alerts. For gateways, independent testing reported 100% prevention and 99.8% block rate for new variants. Analyst evaluations position Check Point as a leader in key categories. Gartner named it a Leader in the 2025 Magic Quadrant for Hybrid Mesh Firewalls, citing strengths in AI-powered prevention and unified management. In the Q3 2025 Evaluation for Zero Trust Platforms by an independent firm, Check Point was recognized for comprehensive platform capabilities. Peer reviews on Gartner Peer Insights average 4.5 out of 5 stars from over 2,100 users for network firewalls, highlighting reliability and feature depth. Check Point has contributed to cybersecurity standards through foundational innovations and shared intelligence. The company developed stateful packet inspection in 1993, a core technology enabling context-aware firewalling that underpins modern architectures. Its division produces annual threat reports, such as the 2025 Cyber Security Report, analyzing global attack trends including surges and cloud exploits, which inform industry defenses and policy. Recent advancements include engines for zero-day threat detection, achieving 99.8% prevention rates in controlled tests, advancing proactive paradigms. These outputs, disseminated via public reports and partnerships, enhance collective threat visibility without reliance on proprietary data silos.

Business Strategy

Strategic Acquisitions

Check Point has executed a series of strategic acquisitions to bolster its cybersecurity portfolio, focusing on areas such as cloud security, email and SaaS protection, (SASE), threat intelligence, and AI-driven defenses. These moves aim to integrate innovative technologies into its architecture, addressing evolving threats like vulnerabilities, cloud migrations, and generative AI risks. By acquiring specialized firms, often startups, Check Point has expanded beyond traditional firewalls into unified platforms for hybrid environments. In 2009, Check Point acquired Nokia's security appliance business, enhancing its hardware capabilities for gateways, and FaceTime Communications' application database, which added controls for over 4,500 internet applications and 50,000 widgets. These early deals strengthened application-layer visibility and prevention. In October 2018, the company purchased Dome9 for cloud security, enabling safer management of cloud deployments during transitions. Subsequent acquisitions targeted and threats. In August 2021, Check Point acquired Avanan, a email security firm specializing in API-based scanning for Office 365 and other platforms, reported at around $300 million; this integrated post-delivery protection against and into Check Point's offerings. In February 2022, it bought Spectral Cyber Technologies, focusing on developer-centric secrets detection to secure code from insider leaks. April 2017's acquisition of ForceNock added and protection using and behavioral . To address SASE and zero-trust needs, Check Point announced the $490 million acquisition of in August 2023, completing it in September, which provided secure network access for remote users, sites, and clouds, accelerating unified SASE deployment. In August 2024, it acquired Cyberint Technologies for enhanced threat intelligence and external management, integrating automated capabilities. These deals supported Check Point's shift toward comprehensive, prevention-first platforms amid rising hybrid work threats. Recent acquisitions emphasize AI and exposure management. In May 2025, Check Point acquired Veriti Security for $100 million, an AI-driven platform for vulnerability assessment and remediation, reducing cyber attack surfaces through continuous exploitability scoring. In September 2025, it purchased Lakera for $300 million, establishing an AI-native security platform to protect AI model lifecycles from prompt injection and data poisoning, with Lakera's Zurich team forming Check Point's global AI R&D center. These moves position Check Point to counter AI-specific risks in enterprise environments.

Partnerships and Ecosystem Building

Check Point maintains an extensive partner ecosystem to enhance its cybersecurity offerings through integrations and collaborative solutions. The company's Program, revamped in January 2024, simplifies tiering from six levels to four—based on annualized bookings and partner training completion—to foster growth and specialization. This structure provides transparent pricing, cumulative discounts, incentives, and free certifications, resulting in a reported 100% increase in deal registrations and protections for renewals via an incumbent partner initiative. The program extends to managed service providers (MSPs) and MSSPs, with a dedicated MSSP launched on September 3, 2024, streamlining delivery, billing, and without deployment risks. In June 2025, Check Point expanded its portfolio availability on the marketplace, enabling global MSP to access AI-powered, cloud-delivered suites for broader deployment. Partner momentum has accelerated, with significant growth in engagements following the program's introduction, as evidenced by increased bookings and ecosystem participation by March 2025. Technology alliances form a core of ecosystem building, uniting Check Point with leading vendors for cohesive security architectures. CloudGuard solutions integrate natively with (AWS) for infrastructure-as-a-service protections, while partnerships with Google Cloud and enable unified across hybrid environments. A deepened with Wiz, announced September 29, 2025, combines Check Point's cloud with Wiz's cloud-native application protection platform (CNAPP) for integrated threat prevention. These collaborations, part of the broader Technology Partner Alliance, allow third-party developers to build on Check Point's Infinity platform via open APIs and joint go-to-market strategies, expanding solution interoperability.

Financial Metrics and Performance

Check Point Software Technologies reported total revenues of $2.565 billion for fiscal year 2024, marking a 6% increase from $2.414 billion in 2023. For the second quarter of 2025, revenues reached $665 million, reflecting a 6% year-over-year rise, with security subscriptions contributing $533 million (up 4%) and products and licenses at $132 million (up 12%). Trailing twelve-month revenues as of June 30, 2025, stood at $2.642 billion, a 6.27% increase from the prior period. The company maintained strong profitability, with a gross margin of 88.01% on a trailing twelve-month basis, an operating margin of 33%, and a net margin of 32.48%. In Q2 2025, net income was $202.8 million, up 2.7% year-over-year, though the profit margin dipped slightly to 31% from 32%. Earnings per share for fiscal 2024 was $7.65, an improvement from $7.19 in 2023. Check Point's return on assets stood at 9.67% over the trailing twelve months.
MetricFiscal 2024 ValueYear-over-Year Change
Total Revenues$2.565B+6%
Calculated Billings$2.658B+9%
$7.65+6.4%
(TTM)88.01%N/A
Guidance for fiscal 2025 projects between $9.60 and $10.20, with Q3 2025 anticipated at $2.40 to $2.50; third-quarter results were scheduled for release on , 2025. metrics as of late October 2025 included a P/E ratio of 64 and price-to-book of 19.75, indicating a relative to and . The shares reached a 52-week high of $234.35 earlier in the period.

Controversies and Challenges

In 1997, Checkpoint Systems, , a provider of physical and loss prevention solutions, demanded that Check Point Software Technologies, cease using its name, alleging potential consumer in the broader "" . Following Check Point's refusal, Checkpoint Systems filed suit in the U.S. District Court for the District of in 1999, claiming under Section 32 of the (15 U.S.C. § 1114) and unfair competition under Section 43(a) (15 U.S.C. § 1125(a)). The plaintiff argued that both companies operated in security-related fields, with similar marks likely to cause among potential customers. After a non-jury trial in 2000, the district court ruled in favor of Check Point Software, finding no likelihood of confusion despite phonetic similarity in the marks. The court applied the multi-factor test from Interpace Corp. v. Lapp, Inc., weighing the weakness of Checkpoint Systems' mark (descriptive and commonly used in security contexts), stark differences in products (physical RFID tags versus network cybersecurity software), distinct sales channels (retail merchandise protection versus enterprise IT procurement), and lack of compelling evidence of actual confusion, such as isolated employee testimonies deemed biased. Sophisticated buyers in Check Point's market further reduced confusion risk. Checkpoint Systems appealed, but the Third Circuit affirmed the decision on October 5, 2001, upholding that the district court properly balanced factors without requiring point-of-sale confusion evidence and rejecting claims of "initial interest" confusion as insufficiently supported. Check Point Software retained its name and continued operations without modification. Beyond trademarks, Check Point Software has defended against numerous suits, often from non-practicing entities asserting broad claims on networking or technologies. Notable cases include Finjan Holdings, v. Check Point Software Technologies, (N.D. Cal., filed 2018), which alleged infringement of behavioral analysis patents and settled confidentially in May 2020 with dismissal with prejudice. In Winterspring Digital LLC v. Check Point Software Technologies Ltd. (W.D. Tex., filed May 2023), the claimed infringement of a related to methods used in Check Point's products, with the case ongoing as of 2024. Similarly, Taasera Licensing LLC filed suit in 2022 (E.D. Tex.) over patents on network threat detection, reflecting patterns of litigation common to cybersecurity firms where defendants frequently prevail or settle to avoid protracted costs. These disputes highlight Check Point's exposure to assertions, though outcomes typically favor non-infringement findings or low-value resolutions due to claim invalidity challenges under Alice Corp. v. CLS Bank.

Regulatory Scrutiny and Breach Allegations

In December 2020, Check Point Software Technologies detected unauthorized access to its systems linked to the compromise attributed to state-sponsored actors. The company's internal investigation identified activity between July and December 2020 but found no evidence of access to , , or other sensitive information. Despite this knowledge, Check Point's subsequent filings, including 2021 and 2022 Forms 20-F, retained generic cybersecurity risk disclosures without specifying the intrusion's details, which the U.S. Securities and Exchange Commission () later deemed materially misleading. On October 22, 2024, the charged Check Point with violating antifraud and disclosure provisions under the and Exchange Act of 1934, resulting in a $995,000 settlement without admitting or denying the findings. Check Point cooperated fully with the inquiry, which stemmed from broader scrutiny of disclosures following the incident affecting multiple firms. This action aligned with the 's heightened enforcement on cybersecurity reporting, emphasizing specific rather than boilerplate risk descriptions to avoid misleading investors. In March 2025, "CoreInjection" claimed on BreachForum to have breached Check Point, offering alleged internal —including access credentials and configuration files—for five bitcoins (approximately $410,000 at the time). Check Point acknowledged a related security incident on March 31, 2025, but described it as an "old, known, and pinpointed event" with limited scope, no of customer environments, and no of production or . The company stated it had remediated the issue prior to the claims and found no evidence supporting the hacker's assertions of ongoing access or significant theft, attributing the post to attempted . As of October 2025, no regulatory investigations or confirmed breaches from this allegation have been publicly reported.

Geopolitical and Competitive Criticisms

Check Point Software Technologies, an Israel-based cybersecurity firm, has faced geopolitical criticisms primarily stemming from its close historical ties to the Israeli military and intelligence community. Several key executives and founders, including CEO Gil Shwed, emerged from elite Israeli Defense Forces units such as Unit 8200, which specializes in signals intelligence and cyber operations. This connection has led to accusations that the company's technologies derive from military-developed tools repurposed for commercial use, intertwining its operations with Israeli state security interests. Critics, including activist organizations, argue this facilitates the export of surveillance and offensive cyber capabilities originally honed in conflict zones, though Check Point maintains its products are defensive and compliant with international export regulations. The (BDS) movement has targeted Check Point since at least 2019, citing its origins and perceived complicity in policies toward as grounds for and boycotts. In its 2018 , the company acknowledged BDS as a , noting instances of increased scrutiny and calls for exclusion from tenders in regions hostile to . BDS-aligned groups, such as the , highlight Check Point's military linkages and global client base—including governments—as enabling objectives through cyber infrastructure. These campaigns have gained traction in activist circles and some academic settings, though their impact on Check Point's revenue remains limited, with the firm reporting sustained growth in international markets. Sources promoting BDS views often reflect ideological opposition to , potentially exaggerating corporate-military ties without of direct policy influence. Geopolitical tensions have manifested in specific regional backlash, such as in following the October 2023 Hamas- conflict. Turkish media and political figures portrayed Check Point as a symbol of Israeli aggression, leading to public calls for boycotts and scrutiny of its operations amid broader anti-Western sentiment under the Erdogan government. This episode underscores how -linked firms like Check Point become proxies in proxy conflicts, with local media amplifying narratives of complicity despite the company's apolitical stance on product deployment. Founder expressed reservations in July 2023 about establishing the firm in Israel today, citing regulatory hurdles and geopolitical instability as deterrents for startups, reflecting internal acknowledgment of location-based risks. Competitive criticisms of Check Point are less prominent and often anecdotal, focusing on perceived stagnation in relative to U.S.-based rivals like or . Industry analysts have noted Check Point's reliance on legacy technologies amid a shift toward cloud-native and AI-driven , contributing to market share erosion in segments like endpoint detection. However, these views lack formal antitrust actions specific to Check Point; broader cybersecurity sector concerns about consolidation and , raised by U.S. senators in , do not single out the firm. Trademark disputes, such as the 2001-2003 litigation with Checkpoint Systems over naming similarities, centered on unfair competition claims under the but were resolved without findings of predatory practices. Check Point's defenders attribute competitive challenges to execution rather than misconduct, with the company maintaining leadership in unified threat management per evaluations.

References

  1. [1]
    About Us - Check Point Software Technologies
    Check Point Software Technologies is a global leader in cyber security solutions, dedicated to protecting corporate enterprises and governments worldwide.Contact Us · Check Point History · Check Point in the Media · Leadership
  2. [2]
    Check Point Software Technologies
    Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally.About Us · Contact Us · Products AZ · Check Point History
  3. [3]
    Check Point History
    Established by CEO Gil Shwed in 1993, Check Point introduced FireWall-1, the IT industry's first stateful inspection firewall technology.
  4. [4]
  5. [5]
    Who Owns Check Point Software Company? - Matrix BCG
    Sep 2, 2025 · Check Point Software Technologies was established in 1993 by Gil Shwed, Marius Nacht, and Shlomo Kramer in Israel. Gil Shwed is credited as the ...
  6. [6]
    Check Point for Government - Carahsoft
    Check Point, founded in 1993, and named as the #1 Cyber Security Vendor in the 2022 Forbes World Best Employer. More than 100,000 companies in over 88 ...
  7. [7]
    CHECK POINT SOFTWARE TECHNOLOGIES LTD - 1015922 - 2025
    As of December 31, 2024, we own our headquarters located in Tel Aviv, Israel ... revenues in 2024 and 31% of revenues in 2023. The net increase of $116 ...<|control11|><|separator|>
  8. [8]
    Check Point Software Reports Fourth Quarter and 2024 Full Year ...
    Jan 30, 2025 · Calculated Billings* reached $2,658 million, a 9 percent increase year over year · Total Revenues: $2,565 million, a 6 percent increase year over ...
  9. [9]
    Check Point Software Technologies Revenue 2011-2025 | CHKP
    Check Point Software Technologies annual revenue for 2024 was $2.565B, a 6.22% increase from 2023. Check Point Software Technologies annual revenue for 2023 ...
  10. [10]
  11. [11]
    AV-Comparatives Awards 2023 for Check Point
    Mar 1, 2024 · Check Point achieved great success in AV-Comparatives' 2023 Enterprise EPR Test, which checks a product's ability to detect, analyse and prevent ...
  12. [12]
    Check Point Software Technologies
    Check Point continues to top analyst reports and market share lists, including Gartner, IDC and NSS Labs, where the company has been recognized for security ...
  13. [13]
    Check Point Software - Companies History
    Jan 21, 2024 · The company was founded by Gil Shwed, Marius Nacht, and Shlomo Kramer in July 1993 and is headquartered in Tel Aviv, Israel.“ “Check Point ...Missing: founders | Show results with:founders
  14. [14]
    What is Brief History of Check Point Software Company ... - Matrix BCG
    Founded in 1993 by Gil Shwed, Marius Nacht, and Shlomo Kramer. Gil Shwed conceived stateful inspection technology. Initial capital was approximately ...
  15. [15]
    20-F - SEC.gov
    The Check Point Software mission is to provide any organization with the ability to conduct their business on the internet with the highest level of security.<|separator|>
  16. [16]
    [PDF] REPORT 2023 - Check Point Software Technologies
    Since our company was founded over 30 years ago, the Check Point mission has been to secure the digital world for everyone, everywhere. From pioneering ...
  17. [17]
    Gil Shwed - Forbes
    Gil Shwed, considered the inventor of the modern computer firewall, cofounded Check Point Software Technologies in 1993 with Shlomo Kramer and Marius Nacht.
  18. [18]
    Gil Shwed Takes on the Role of Executive Chairman of the Board of ...
    Dec 16, 2024 · Gil Shwed Takes on the Role of Executive Chairman of the Board of Directors, Nadav Zafrir Becomes CEO at Check Point Software Technologies. ...
  19. [19]
    Leadership - Executive Management & Board Of Directors
    Nadav Zafrir joined Check Point as Chief Executive Officer and Board Member in December 2024. Previously, Mr. Zafrir was co-founder and managing partner at ...Check Point SoftwareFührungsteamLeadership
  20. [20]
    Check Point Software Technologies Management - Simply Wall St
    Leadership Team ; Gil ShwedFounder & Executive Chairman ; Sharon SchusheimChief Services Officer ; Itai GreenbergChief Revenue Officer ; Nadav ZafrirCEO & Director.
  21. [21]
    [PDF] CHECK POINT SOFTWARE TECHNOLOGIES LTD. - Annual Reports
    ... corporate governance practices. Under the rules applicable to us as a foreign private issuer, we are required to have a majority of independent directors ...
  22. [22]
    Corporate Governance - Check Point Software Technologies
    Understand our guiding principles for the honest and ethical conduct we demand from our directors, officers and employees. Corporate Governance Audit Committee.
  23. [23]
    Check Point Software Technologies Ltd. - SEC.gov
    Ray Rothrock (Chair), Yoav Chelouche, Dafna Gruber (new member) and Tzipi Ozer-Armon. Nominating, Sustainability and Corporate Governance Committee: -. Shai ...
  24. [24]
    [PDF] Corporate Governance Guidelines
    Mar 31, 2021 · The Board of Directors of Check Point Software Technologies Ltd. (“Check Point”) has adopted the following. Corporate Governance Guidelines to ...
  25. [25]
    Check Point Software Technologies Ltd Locations - GlobalData
    www.checkpoint.com. Other Locations & Subsidiaries. Check Point Software Technologies (Canada) Inc. Canada. Check Point Software Technologies GmbH. Germany.
  26. [26]
    Check Point Software Employees - CHKP - Stock Analysis
    Check Point Software Technologies had 6,669 employees as of December 31, 2024. The number of employees increased by 219 or 3.40% compared to the previous year.Missing: international presence
  27. [27]
    Check Point Software Technologies 2025 Company Profile
    Check Point Software Technologies is a pure-play cybersecurity vendor. The company offers solutions for network, endpoint, cloud, and mobile security.
  28. [28]
    Check Point Named a Leader in the 2025 IDC MarketScape Report ...
    Sep 15, 2025 · This report offers critical insights into the firewall market, which totaled $12.3 billion in 2024 according to IDC's latest tracker data.
  29. [29]
    Check Point Software Technologies Named Leader in Gartner ...
    Aug 27, 2025 · Check Point Software has been named a Leader in Gartner's 2025 Magic Quadrant for Hybrid Mesh Firewalls.$chkp Hedge Fund Activity · $chkp Analyst Ratings · $chkp Price Targets
  30. [30]
    Check Point Software Technologies Named Leader and Sole ...
    Apr 21, 2025 · Check Point's 2025 Security Report found a 44% increase in cyber-attacks affecting organizations globally. How does Check Point support ...
  31. [31]
    Frequently Asked Questions (FAQ) - Check Point Software
    Gil Shwed, Marius Nacht and Shlomo Kramer founded Check Point Software in 1993. Nadav Zafrir currently serves as CEO; Gil Shwed our Founder currently serves as ...
  32. [32]
    Gil Shwed - Jewish Virtual Library
    Gil Shwed is an Israeli entrepreneur and founder, chairman and CEO of Check Point Software Technologies. Shwed (born 1968) was born in Jerusalem shortly ...Missing: background | Show results with:background
  33. [33]
    Checking in with Check Point's Gil Shwed - ISRAEL21c
    Jun 15, 2003 · Shwed launched Check Point in 1993, when he was not yet 25. In those days, few people even knew what the Internet was, let alone that it posed a ...Missing: history | Show results with:history
  34. [34]
    Brief History of Check Point Firewalls
    Jun 10, 2020 · Check Point presented FireWall-1 version 1.0, the very first commercial stateful firewall, in 1994. Version 2.0 followed in 1995. FireWall-1 ...Missing: 1993-1996 | Show results with:1993-1996
  35. [35]
    What Is a Stateful Inspection Firewall? Ultimate Guide
    Mar 6, 2023 · A stateful inspection technique was developed to address the limitations of the stateless inspection, and Check Point's product Firewall-1 was ...
  36. [36]
    [PDF] Stateful Inspection Technology - Check Point CheckMates
    Stateful Inspection, invented by Check Point. Software Technologies, has emerged as the industry standard for enterprise-class network security solutions.
  37. [37]
    Check Point Software Technologies History - Zippia
    The company was founded by Gil Shwed, Marius Nacht, and Shlomo Kramer in July 1993 and is headquartered in Tel Aviv, Israel.“ 1996. In June 1996 Check Point ...<|separator|>
  38. [38]
    Checkpoint Systems, Inc., Appellant v. Check Point Software ...
    In 1997, it expanded its product line beyond network security products to include "network management products." This software enables customers to design their ...
  39. [39]
    [PDF] FORM 20-F - Check Point
    Dec 31, 2024 · The Company's revenues totaled $141.9 million, $219.6 million and $425.3 million in the years. 1998, 1999 and 2000, respectively, substantially ...
  40. [40]
  41. [41]
    Check Point Software to buy NFR Security for $20 mln | Reuters
    Aug 9, 2007 · Israeli-based Check Point said the move was part of its strategy to expand into protecting data security. Get a look at the day ahead in U.S. ...
  42. [42]
    Check Point Completes Acquisition of Nokia Security Appliance ...
    Apr 14, 2009 · Check Point Completes Acquisition of Nokia Security Appliance Business ... Check Point former Nokia IP hardware running Check Point ...
  43. [43]
    Check Point Acquires Liquid Machines | Copyright and Technology
    Jun 13, 2010 · Four years later, the answer has finally come: the Israeli IT security company Check Point Technologies completed an acquisition of Liquid ...Missing: 2000-2010 | Show results with:2000-2010<|separator|>
  44. [44]
    Check Point Infinity – The Security Architecture of the Future - Today
    Apr 20, 2017 · Check Point Infinity is the first ever consolidated, security architecture across networks, cloud and mobile providing the highest level of threat prevention.Missing: evolution 2010s
  45. [45]
    Introducing Check Point Harmony SaaS: The Cutting-Edge
    Mar 6, 2024 · “By seamlessly integrating AI-powered threat prevention and continuous attack surface reduction, Harmony SaaS empowers organizations to stay ...
  46. [46]
    Check Point Recognized for #1 AI-Powered Cyber Security Platform ...
    Apr 10, 2025 · Check Point® Software Technologies Ltd. announced that its Infinity Platform has been named the top-ranked AI-powered cyber security ...Missing: advances 2010-2025
  47. [47]
    List of 21 Acquisitions by Check Point Software (Jul 2025) - Tracxn
    Jul 16, 2025 · Discover Check Point Software's complete list of acquisitions with year-wise trends, sector-wise breakdowns, geographic insights, ...Missing: 2000-2010 | Show results with:2000-2010
  48. [48]
    Check Point - Overview - WWT
    Lakera, founded in 2021, enhances AI security by detecting anomalies and adversarial attacks. Acquired by Check Point, its technology strengthens AI-driven ...<|control11|><|separator|>
  49. [49]
    Check Point Launches New Branch Office Security Gateways with ...
    May 28, 2025 · AI-Powered Defense at the Edge: Check Point Launches New Branch Office Security Gateways with 4x Faster Threat Prevention Performance. Optimized ...
  50. [50]
    What Is a Stateful Packet Inspection Firewall? - Check Point Software
    A stateful packet inspection (SPI) firewall internally tracks the state of current network connections. This enables it to identify anomalous traffic.
  51. [51]
    What is stateful inspection in networking? - TechTarget
    Aug 26, 2021 · Stateful inspection is a network firewall technology used to filter data packets based on state and context. Check Point Software Technologies ...
  52. [52]
    AI-Powered Next Generation Firewalls- Check Point Software
    Quantum firewalls deliver the full range of network security, including remote access VPN, SASE, SD-WAN, and defend against IoT, DDoS, and Zero Day attacks.
  53. [53]
    Next-Generation Firewall (NGFW) Features - Check Point Software
    NGFW Capabilities · Security Management · Threat Prevention · Inspection and Granular Control · Identity-Based Inspection and Control · Hybrid Cloud Support.
  54. [54]
    Endpoint Protection Platform - Harmony Endpoint
    Harmony Endpoint is a complete and consolidated endpoint security solution with advanced EPP, EDR and XDR capabilities, built to protect the remote workforce.
  55. [55]
    Check Point Enhances Endpoint Security to Combat Exploits - Ivanti
    May 11, 2023 · Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities.
  56. [56]
    Mobile Security Services - Harmony Mobile | Check Point Software
    Harmony Mobile keeps your corporate data safe by securing employees' mobile devices across all attack vectors: apps, files, network and OS.
  57. [57]
    Check Point (CHKP) Releases Harmony Mobile Version 4.0 - Nasdaq
    May 19, 2022 · With the Harmony Mobile Release 4.0 version, Check Point intends to enhance complete mobile security by offering additional security ...
  58. [58]
    Check Point Software Introduces Malicious File Protection for Mobile ...
    May 18, 2022 · The new version of Check Point Harmony Mobile, the industry's leading mobile threat solution, can now block the download of malicious files to mobile devices.
  59. [59]
    sk117536 - Endpoint Security Homepage - Check Point Support
    SmartEndpoint will reach its End of Support on December 31, 2025. Users can access SmartEndpoint functionality in the Harmony Endpoint Web Management Console.
  60. [60]
    Check Point Endpoint Security: Quick Solution Overview - Cynet
    Check Point Endpoint Security includes data security, network security, advanced threat protection, forensics, endpoint detection and response (EDR), and ...
  61. [61]
    Cloud Security Services - CloudGuard - Check Point Software
    Check Point CloudGuard is a comprehensive cloud security platform that allows you to prevent threats and prioritize risks in the cloud across your applications ...
  62. [62]
    Data Center Firewall Security - Check Point Software Technologies
    Check Point Quantum Security Gateways provides data center firewall security and scalability for hybrid cloud environments. Click to learn how to prevent ...
  63. [63]
    AI-Powered Cyber Security Platform - Infinity - Check Point Software
    The Infinity Platform is an AI-powered cloud-delivered security management platform that reduces complexity, lowers TCO and tightens your compliance and risk ...
  64. [64]
    Check Point debuts AI copilot to streamline and automate ...
    Check Point unveiled its generative artificial intelligence (genAI) powered security copilot tool, dubbed Infinity AI Copilot.
  65. [65]
    Check Point Announces New AI-Powered Innovations to Bolster
    Feb 4, 2025 · Six new capabilities reduce complexity, enhance threat prevention, and set the stage for autonomous zero trust across the Infinity Platform.Missing: timeline | Show results with:timeline
  66. [66]
    AI Security Management - Check Point Software
    Simplify security operations with AI-driven solutions. Protect hybrid environments, enhance visibility, and reduce complexity with Check Point's Infinity ...
  67. [67]
    AI-Enabled Security Management - Check Point Software
    AI-enabled security management uses AI to enhance security by handling repetitive tasks, improving efficiency and scalability, and improving prevention and ...
  68. [68]
    Bridging AI and Cybersecurity: What Check Point MCP Servers ...
    Jul 1, 2025 · Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure.
  69. [69]
    AI Security Services - Infinity AI - Check Point Software
    Infinity AI security services combines the power of AI Powered Threat Intelligence with Generative AI for the industry's best solution.
  70. [70]
    About Us - Check Point Research
    Check Point Research was also the first to reveal the infrastructure and operations behind the Cerber ransomware and the Nuclear Exploit Kit.Missing: Division history achievements
  71. [71]
    A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide
    Oct 18, 2024 · Industry-wise Breakdown. The Education/Research sector emerged as the most targeted industry, averaging 3,828 weekly attacks per organization.
  72. [72]
  73. [73]
  74. [74]
  75. [75]
    Check Point Research: CPR
    Check Point Research Publications; PODCAST. December 7, 2023. Iran's Most Advanced Cyber Attack Yet. Check Point Research Publications; PODCAST. October 22, ...About Us · Research publications · SpeakUp: A New Undetected... · Contact UsMissing: Division history achievements
  76. [76]
  77. [77]
    Research Archives - Check Point Blog
    Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware Surges 46%. In September 2025, the global cyber ...
  78. [78]
    The State of AI in Cyber Security - Check Point Research
    Apr 30, 2025 · A comprehensive look at where AI has been, where it stands today, and where it's heading in the world of cyber security. Here's what we found.Missing: 2010-2025 | Show results with:2010-2025
  79. [79]
  80. [80]
    Cyber Security Report 2025 - Check Point Software Technologies
    Explore the top cyber threats of 2025, including ransomware, infostealers, and cloud vulnerabilities. Download Check Point's report for expert insights and ...
  81. [81]
    Check Point Research AI Security Report 2025
    Explore the top cyber threats of 2025, including ransomware, infostealers, and cloud vulnerabilities. Download Check Point's report for expert insights and ...
  82. [82]
    Intelligence Reports - Check Point Research
    For the latest discoveries in cyber research for the week of 20th October, please download our Threat Intelligence Bulletin . TOP ATTACKS .Global cyber attack reportsGlobal Cyber Attack Reports ...
  83. [83]
    The Check Point ThreatCloud
    Check Point ThreatCloud is a dynamically updated service that is based on an innovative global network of threat sensors and organizations that share threat ...
  84. [84]
    Infinity ThreatCloud AI - Check Point Software Technologies
    ThreatCloud AI employs advanced AI with over 50 technologies to detect and neutralize novel threats, using big data to update its defenses with the latest ...IA de ThreatCloudThreatCloud GraphFeatured Threat Prevention ...Privacy Data SheetVideo
  85. [85]
    Outputs - Check Point
    In the Collections tab, you can create and manage collections - customized, prioritized lists of threat intelligence feeds. The aggregator automatically removes ...
  86. [86]
    Check Point Ranks #1 in Miercom Firewall Benchmark 2025
    Check Point ranks #1 again in threat prevention with 99.9% block rate · For the third consecutive year, Check Point received the highest scores across all ...
  87. [87]
    Continuing to Pioneer Cyber Security Excellence and Shaping the ...
    Jan 30, 2025 · Besides receiving high praise from analysts, Check Point achieved a perfect 100% detection rate in the 2024 MITRE ATT&CK® Evaluations for its ...
  88. [88]
    Check Point Software hailed as leader in email security report
    Sep 23, 2024 · The platform recorded a 100% phishing prevention rate and a 99.8% new malware block rate, underscoring its effectiveness in mitigating email- ...
  89. [89]
    Check Point Named a Leader in the 2025 Gartner® Magic Quadrant ...
    Aug 27, 2025 · Check Point Named a Leader in the 2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall · AI-Powered Threat Prevention: · Unified Management: ...
  90. [90]
    Check Point Software Technologies Named A Leader In Zero Trust ...
    Jul 11, 2025 · Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation · $27M in Early Demand. $20 Trillion in Untapped ...
  91. [91]
    Check Point Reviews, Ratings & Features 2025 | Gartner Peer Insights
    Rating 4.5 (2,136) Read the latest, in-depth Check Point Software Technologies reviews from real users verified by Gartner Peer Insights, and choose your business software ...
  92. [92]
    Cyber Security Report, 2025 - Check Point Software Technologies
    Explore the top cyber threats of 2025, including ransomware, infostealers, and cloud vulnerabilities. Download Check Point's report for expert insights and ...
  93. [93]
    Check Point Unveils New AI-Powered Network Security Innovations ...
    Nov 20, 2024 · Industry Leading AI-Powered Threat Prevention to block 99.8% of zero-day threats. It introduces four new AI engines to find hidden relationships ...<|separator|>
  94. [94]
    Check Point Software Technologies Acquires Avanan, the fastest ...
    Aug 30, 2021 · Check Point Software entered into a definitive agreement to acquire Avanan and the transaction is expected to close imminently. Check Point ...
  95. [95]
    Check Point to Acquire Perimeter 81 - to Deliver the Fastest and ...
    Aug 10, 2023 · Under the terms of the agreement, Check Point will acquire Perimeter 81 for approximately $490 million, on a cash free, debt free basis. Hybrid ...
  96. [96]
    Check Point Software Completes Acquisition of Perimeter 81
    Sep 13, 2023 · Check Point Software Completes Acquisition of Perimeter 81. San ... timeline for the consummation of the acquisition. Our expectations ...
  97. [97]
    Check Point Acquiring Cyberint Technologies - Channel Futures
    Aug 27, 2024 · Check Point Software Technologies is acquiring Cyberint Technologies to fortify its security operations center (SOC) capabilities and managed threat ...
  98. [98]
    Check Point Software Technologies Financials - Startup Nation Finder
    Mergers and Acquisitions ; $300M · Sep 2025 · Lakera logo. Lakera ; $100M · May 2025 · Veriti Security logo. Veriti Security ; $200M · Aug 2024 · CyberInt logo. CyberInt.Missing: 2000-2010 | Show results with:2000-2010<|separator|>
  99. [99]
    Check Point to Acquire Veriti to Transform Threat Exposure ...
    May 27, 2025 · Veriti is an AI-driven exposure assessment and remediation platform that continuously identifies vulnerabilities, misconfigurations, and exploitability.
  100. [100]
    Check Point Acquires Lakera to Deliver End-to-End AI Security for ...
    Sep 16, 2025 · Together, Check Point and Lakera deliver one of the industry's most advanced AI-native security platforms, built to protect the full lifecycle ...
  101. [101]
    Check Point Software Unveils New Partner Program to
    Jan 29, 2024 · Check Point launches new Channel Partner Program streamlining tiering structure, transparent pricing, cumulative discounts, and incentives ...
  102. [102]
    Check Point Debuts New Partner Program With Simplified Tiers ...
    Jan 29, 2024 · Key components of the new partner program include a simplified structure, with the program moving from its prior six-tier system down to four ...
  103. [103]
    Check Point Software Unveils New MSSP Portal for Partners
    Sep 3, 2024 · We are deeply committed to our partner ecosystem, and this Portal stands as a testament to our dedication, serving as a powerful ally in the ...
  104. [104]
    Check Point Software Technologies Expands Comprehensive ...
    Jun 9, 2025 · This expansion provides Pax8's global partner ecosystem with access to Check Point's suite of AI-powered, cloud-delivered cybersecurity ...
  105. [105]
    Check Point Partners Chart Massive Growth - Channel Futures
    Mar 3, 2025 · Check Point Software Technologies has seen an increase in partner momentum since it launched a new, simplified partner program last year.
  106. [106]
    Technology Partners - Check Point Software
    Customers can use our joint solutions to create a cohesive, tightly integrated, secure ecosystem. Apply to Join · Featured Partners.
  107. [107]
    CloudGuard Network Security for Public Clouds
    Key features and capabilities of Check Point CloudGuard Network Security and its native integration with Amazon Web Services (AWS). Learn more · Thumbnail for ...
  108. [108]
    Check Point Software Technologies - Google Cloud
    Check Point Software Technologies is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from ...
  109. [109]
    Check Point Enters Next Level of Strategic Partnership with Wiz to ...
    Sep 29, 2025 · Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution. Check Point ...
  110. [110]
    Check Point Software Reports 2025 Second Quarter Financial Results
    Jul 30, 2025 · Total Revenues: $665 million, a 6 percent increase year over year · Products & Licenses Revenues: $132 million, a 12 percent increase year over ...
  111. [111]
    Check Point Software | CHKP Stock Price, Company Overview & News
    Check Point Software Technologies Ltd. engages in the development and market of software and hardware solutions for information technology security.
  112. [112]
    Check Point Software Technologies Second Quarter 2025 Earnings
    Aug 4, 2025 · Revenue: US$665.2m (up 6.0% from 2Q 2024). Net income: US$202.8m (up 2.7% from 2Q 2024). Profit margin: 31% (down from 32% in 2Q 2024). The ...<|separator|>
  113. [113]
    CHKP Check Point Software Technologies Earnings and EPS analysis
    Check Point Software Technologies's earnings per share in 2024 was reported at $7.65, marking a rise from $7.19 in 2023. Check Point Software Technologies's EPS ...
  114. [114]
  115. [115]
  116. [116]
    Check Point Software Technologies - 29 Year Stock Price History
    An investor who bought $1,000 worth of Check Point Software Technologies stock at the IPO in 1996 would have $47,000 today, roughly 47 times their original ...
  117. [117]
    CHECKPOINT SYSTEMS INC v. CHECK POINT SOFTWARE ...
    After its request to discontinue use was rebuffed, Checkpoint Systems filed suit alleging trademark infringement and unfair competition under the Lanham Act. In ...
  118. [118]
    Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc ...
    In this action alleging trademark infringement and unfair competition in violation of the Lanham Act, 15 U.S.C. §§ 1114 & 1125(a), plaintiff Checkpoint Systems ...
  119. [119]
    Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc.
    "the District Court properly took into account the potential bias of the Checkpoint System's employees who testified [regarding actual confusion]." October 28th ...
  120. [120]
    Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc.
    Checkpoint Systems, Inc. sued Check Point Software Technologies, Inc. in the U.S. District Court for the District of New Jersey for trademark infringement and ...
  121. [121]
    Checkpoint Systems v. Check Point Software - vLex Case Law
    In this action alleging trademark infringement and unfair competition in violation of the Lanham Act,15 U.S.C. §§ 1114 & 1125(a), plaintiffCheckpoint Systems, ...
  122. [122]
    Finjan Discloses Settlement with Checkpoint as Pandemic Causes ...
    May 31, 2020 · The Northern District of California has dismissed Finjan Holdings, Inc.'s case against Check Point Software Technologies with prejudice, ...Missing: defended | Show results with:defended
  123. [123]
    Check Point Sued by Winterspring Over Patent Infringement (1)
    May 30, 2023 · Winterspring Digital LLC, a Texas-based technology company, has sued Check Point Software Technologies LTD for making, using and selling ...Missing: disputes | Show results with:disputes
  124. [124]
    SEC Charges Four Companies With Misleading Cyber Disclosures
    Oct 22, 2024 · The SEC's order against Check Point finds that it knew of the intrusion but described cyber intrusions and risks from them in generic terms. The ...<|separator|>
  125. [125]
    [PDF] SECURITIES ACT OF 1933 Release No. 11321 / October 22, 2024
    Oct 22, 2024 · Throughout December 2020, Check Point learned that the threat actor behind the compromise of the SolarWinds Orion software was a hacking group ...
  126. [126]
    SEC Settlements Signal Increased Scrutiny of Cybersecurity ...
    Nov 25, 2024 · The SEC alleged that Check Point made materially misleading statements in its 2021 and 2022 Forms 20-F cybersecurity risk-factor disclosures.
  127. [127]
    SEC hits four companies with fines for misleading disclosures ...
    Oct 22, 2024 · Unisys, Avaya, Check Point and Mimecast will pay fines to settle charges that they downplayed in SEC filings the extent of the compromise.<|separator|>
  128. [128]
    Check Point Software in SEC settlement talks in connection with ...
    Dec 13, 2023 · Check Point Software in SEC settlement talks in connection with SolarWinds probe. The cybersecurity firm provided documents and other ...Missing: patent lawsuits defended
  129. [129]
    SEC Announces Settlements with Four Issuers regarding ...
    Oct 31, 2024 · The settlements concern the issuers' disclosures relating to cybersecurity risks and intrusions following the December 2020 SUNBURST cybersecurity incident.<|control11|><|separator|>
  130. [130]
    Alleged Check Point Breach: What Happened and What You Need ...
    Apr 2, 2025 · On March 31, 2025, a threat actor known as CoreInjection claimed responsibility for a breach at Check Point Software Technologies.
  131. [131]
    Alleged Sale of Check Point Software Technologies Network Access
    Mar 31, 2025 · The threat actor, operating under the alias "CoreInjection," has listed the stolen dataset for five bitcoins (approximately $410000),
  132. [132]
    Check Point Software confirms security incident but pushes back on ...
    Apr 2, 2025 · Check Point Software confirmed it was targeted in a recent hacking attempt after a threat actor offered to sell sensitive customer information on a dark web ...
  133. [133]
    Check Point response to the BreachForum post on 30 March 2025
    Mar 31, 2025 · On March 30th, 2025, a BreachForum post offered to sell alleged hacked Check Point data. This relates to an old, known, and pinpointed event ...
  134. [134]
    Check Point Responds to Hacking Claims - SecurityWeek
    Apr 1, 2025 · Check Point has responded to a hacker's claims of sensitive data theft, confirming an incident but saying that it had limited impact.
  135. [135]
    Check Point Disputes Hacker's Breach Claims - Dark Reading
    Apr 1, 2025 · Check Point is offering reassurances to customers that it did not experience a leak, despite a hacker's claims they stole information from the security vendor.
  136. [136]
    Hacker Claims Breach of Check Point Cybersecurity Firm, Sells ...
    Apr 1, 2025 · A hacker operating under the alias “CoreInjection” is claiming responsibility for the breach of Israeli cybersecurity company Check Point.
  137. [137]
    Check Point Software: Ex-Israeli military spooks profiting from the ...
    Nov 25, 2019 · Israel's fourth largest company, it is closely intertwined with the Israeli military and security services. Several of Check Point's directors ...<|separator|>
  138. [138]
    Check Point Software Tech - Palestine Solidarity Campaign
    Feb 13, 2020 · Check Point Software Tech is a large Israeli internet security and software company. As reported by Corporate Watch, it is closely intertwined with the Israeli ...
  139. [139]
    Cybersecurity company Check Point becomes a political target in ...
    Mar 13, 2025 · Israel-based multinational cybersecurity company Check Point Software Technologies Ltd. has become a focal point of controversy in Turkey.
  140. [140]
    Check Point founder says would not base company in Israel today
    Jul 26, 2023 · Gil Shwed, CEO and founder of Check Point Software Technologies says he does not know if he would have established the cybersecurity giant in Israel today.
  141. [141]
    Cybersecurity Market Consolidation and the Case for Antitrust ...
    Jul 31, 2025 · Analysts and even U.S. senators are warning that some cybersecurity vendors have become "too big to fail" and that aggressive antitrust ...