We Secure the Future
Check Point headquarters, Tel Aviv, Israel
|Traded as||NASDAQ: CHKP|
|Founded||Ramat Gan, Israel
|Headquarters||Tel Aviv, Israel and San Carlos, California|
|Gil Shwed, (Chairman & CEO)|
|Products||FireWall-1, VPN-1, UTM-1,
Check Point Integrity,
Intrusion prevention systems,
Web Application Security
|Revenue||US$ $1,629.84 million (2015)|
|US$ $685.87 million (2015)|
Number of employees
|Subsidiaries||ZoneAlarm, SofaWare, Easy2comply|
Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network security, endpoint security, data security and security management.
As of 2014[update] the company had approximately 2,900 employees worldwide. Headquartered in Tel Aviv, Israel, the company has development centers in Israel, California (ZoneAlarm), Sweden (Former Protect Data development centre), and Belarus. The company has offices in the United States, in San Carlos, California, in Dallas, Texas, in Ottawa, Ontario, Canada, and Sydney Australia.
Check Point was established in Ramat-Gan, Israel in 1993, by Gil Shwed (CEO as of 2015[update]), Marius Nacht (Chairman as of 2015[update]) and Shlomo Kramer (who left Check Point in 2003). Shwed had the initial idea for the company’s core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1; soon afterwards they also developed one of the world’s first VPN products, VPN-1. Shwed developed the idea while serving in the Unit 8200 of the Israel Defense Forces, where he worked on securing classified networks.
In 1994 Check Point signed an OEM agreement with Sun Microsystems, followed by a distribution agreement with HP in 1995. The same year, the U.S. head office was established in Redwood City, California.
By February 1996 the company was named worldwide firewall market leader by IDC, with a market share of 40 percent.[dead link] In June 1996 Check Point raised $67 million from its initial public offering on NASDAQ.
Over the years many employees who worked at Check Point have left to start their own software companies. These include Shlomo Kremer who started Imperva, Nir Zuk who founded Palo Alto Networks, Ruvi Kitov and Reuven Harrison of Tufin and Yonadav Leitersdorf.
Check Point offers the following primary products:
- Network Security – Check Point's core business has historically focused on network security components including Firewall, IPsec VPN, Mobile Access, Intrusion Prevention, Antivirus, Anti-spam and Email security, URL filtering, Data Loss Prevention, Anti-Bot and Application Control. Check Point provides these components as individual products called Software Blades or combined in one of their bundle offerings: Next Generation Firewall (NGFW), Next Generation Threat Prevention (NGTP), Next Generation Data Protection (NGDP) and Next Generation Secure Web Gateway (NGSWG). These products are deployed as software on x86-based hardware made by third parties including BlueCoat (formerly Crossbeam), Hewlett-Packard, IBM, Fujitsu, or by Check Point.
- Software Defined Protection – Software-defined protection enables organizations to design and deploy a modern security infrastructure that is modular, flexible, secure, and is applicable across networks, hosts, and mobile and cloud environments. Software-defined protection describes enterprise security architecture in the context of three inter-connected layers, the Enforcement Layer, the Control Layer, and the Management Layer.
- Public and Private Cloud Security – Check Point Virtual Appliance for Amazon Web Services protects Amazon public cloud with Check Point software blade protections.  The Security Gateway Virtual Edition product protects private clouds and virtual environments. It runs on VMware ESXi servers and inspects traffic between virtual machines and hosts by integrating with the hypervisor using VMWare NetX API. Check Point also integrates with OpenStack to defend the emerging cloud infrastructure against threats.
- Data Security – VPNs, access controls, and the DLP security gateway secure data-in-motion and data-in-use. Check Point Document Security protects data-in-use. Full Disk Encryption, Media Encryption and Port Control secure data-at-rest on endpoints.
- ThreatCloud – Released April 2012, ThreatCloud® is a collaborative network to share security intelligence between organizations all over the world. ThreatCloud collects its data from a global network of security enforcement points, research, community feeds and other industry feeds. By sharing information between organizations globally, ThreatCloud provides immediate protection to all organizations as soon as a new attack gets detected. To date, ThreatCloud has 250 million+ addresses analyzed for bot discovery, created 11million malware signatures, and detected 3 million+ malware-infested sites. Data collected and analyzed by ThreatCloud is automatically distributed as security protections on subscribed customers’ security gateways.
- ThreatCloud IntelliStore – Released May 2014, ThreatCloud® IntelliStore is a marketplace that provides access to a wide variety of threat intelligence data that can be selected according to an organizations’ needs. Some of the vendors that provide threat intelligence to ThreatCloud IntelliStore today include, iSIGHT, CrowdStrike, IID, NetClean, PhishLabs, SenseCy and ThreatGRID. Using the ThreatCloud infrastructure, threat data from the intelligence store gets passed on the security gateways in real-time as well.
- Virtual Systems – Check Point’s Virtual Systems technology enables consolidation of up to 250 security gateways into one single hardware platform. Virtual Systems can be deployed on any gateway or can be pre-configured and packaged on Check Point Virtual System Appliances.
- Endpoint Security – a single security agent that combines firewall, antivirus, anti-spyware, full disk encryption, removable media encryption, protection of I/O ports such as USB, network access control, and a VPN client. The security policies for networked endpoints can be centrally managed from a single location via the Endpoint Policy Management Software Blade product.
- Mobile Security – Check Point Mobile Access software provides secure access to corporate resources via a SSL VPN portal for devices such as laptops, mobile phones, and tablet PCs.
- Security Management – Allows administrators to manage events, set policy and apply protections across the entire security infrastructure from a single interface. Based on the Software Blade architecture, with 11 management software blades including event analysis, correlation, multi-domain security management, and device provisioning. a good access point
- SofaWare Technologies, in January 2002 (partial acquisition).
- Zone Labs, makers of the ZoneAlarm personal firewall software, in 2003, for $205 million in cash and shares.
- Protect Data, the holding company for PointSec Mobile Technologies, in a cash deal valued at $586m in late 2006. Prior to their acquisition by Check Point, Protect Data acquired Reflex Software.
- NFR security, an intrusion prevention system developer, for $20 million in late 2006, following its failed plan to acquire the larger IPS vendor Sourcefire.
- Nokia Security Appliances division was acquired in April 2009.
- Liquid Machines, a data security startup company based in Boston, was acquired in June 2010.
- Dynasec, a provider of enterprise governance, risk management, and compliance products, was acquired in November 2011. Dynasec offers a Web-based enterprise application, branded as Easy2comply, for Sarbanes-Oxley compliance, Basel II compliance, operational risk management, information security management, HIPAA compliance, and internal audit management.
- Hyperwise, an early-stage startup, focused on CPU Level Threat Prevention was acquired Feb 2015. 
- Lacoon Mobile Security was acquired in April 2015. 
In 2005, Check Point tried to acquire intrusion prevention system developers Sourcefire for $225 million, but later withdrew its offer after it became clear US authorities (C.F.I.U.S) would try to block the acquisition.
SofaWare legal battle
SofaWare Technologies was founded in 1999, as a cooperation between Check Point and SofaWare's founders, Adi Ruppin and Etay Bogner, with the purpose of extending Check Point from the enterprise market to the small business, consumer and branch office market. SofaWare's co-founder Adi Ruppin said that his company wanted to make the technology simple to use and affordable, and to lift the burden of security management from end users while adding some features. In 2001 SofaWare began selling firewall appliances under the SofaWare S-Box brand; in 2002 the company started selling the Safe@Office and Safe@Home line of security appliances, under the Check Point brand. By the fourth quarter of 2002 sales of SofaWare's Safe@Office firewall/VPN appliances had increased greatly, and SofaWare held the #1 revenue position in the worldwide firewall/VPN sub-$490 appliance market, with a 38% revenue market share.
Relations between Check Point and the SofaWare founders went sour after the company acquisition in 2002. In 2004 Etay Bogner, co-founder of SofaWare, sought court approval to file a shareholder derivative suit, claiming Check Point was not transferring funds to SofaWare as required for its use of SofaWare's products and technology. His derivative suit was ultimately successful, and Check Point was ordered to pay SofaWare 13 million shekels for breach of contract. In 2006 the Tel Aviv District Court Judge ruled that Bogner SofaWare could sue Check Point by proxy for $5.1 million in alleged damage to SofaWare. Bogner claimed that Check Point, which owned 60% of Sofaware, had behaved belligerently, and withheld monies due for use of SofaWare technology and products Check Point appealed the ruling, but lost.
In 2009 the Israeli Supreme Court ruled that a group of founders of SofaWare, which includes Bogner, had veto power over any decision of SofaWare. The court ruled that the three founders could exercise their veto power only as a group and by majority rule.
In 2011 Check Point settled all litigation relating to SofaWare. As part of the settlement it acquired the SofaWare shares held by Bogner and Ruppin, and began a process of acquiring the remaining shares, resulting in SofaWare becoming a wholly owned subsidiary.
- "Check Point Software Facts @ A Glance". Retrieved 2014-06-24.
- "Bloomberg Profile: Checkpoint Software Technologies Ltd.", Bloomberg
- Mayor, Tracy, "CIO 20/20 Honorees--Innovator's Profile: Gil Schwed of Check Point Software Technologies Ltd", CIO Magazine — October 1, 2002
- Savage, Marcia. Gil Shwed, Chairman & CEO, Check Point Software Tech. CRN, Nov. 07, 2001.
- , Oct 1, 2002
- Wallace, David, "MOVERS & SHAKERS: Eli Barkat: Making Push More Polite -- and Ready for Prime Time", Business Week — December 1, 1999, retrieved 2009-11-09
- Company Press Release, "CheckPoint Software and HP sign distribution agreement; market-leading FireWall-1 solution now available through HP and its reseller channel.", Business Wire — September 25, 1995
- Press Release, "CheckPoint Software Named Firewall Market Share Leader by IDC; Worldwide Market Share of 40 Percent Represents Significant Lead in Providing Enterprise Network Security Solutions.", Business Wire — February 5, 1996
- Breznitz, Dan, "Industrial R&D as a national policy: Horizontal technology policies and industry-state co-evolution in the growth of the Israeli software industry", Research Policy 36 (9): Research Policy, doi:10.1016/j.respol.2007.06.006
- Press Release , "Check Point Software & Nokia Expand Partnership", Business Wire — October 19, 1999
- "Notice of Filing of Class Action Lawsuit Against Check Point Software Technologies Ltd., Gil Shwed, Jerry Ungerman, Eyal Desheh, Irwin Federman and Alex Vieux -- CHKP". October 13, 2003. Retrieved Jul 25, 2013.
- "Check Point Completes Acquisition of Nokia Security Appliance Business". 2009-04-13. Retrieved 2009-04-13.
- "Software Defined Protection - The Enterprise Security Blueprint".
- "Amazon Web Services - Check Point Virtual Appliance for AWS".
- "OpenStack Foundation".
- "Checkpoint Offers ThreatCloud System for Sharing Security Alerts".
- "Network World - ThreatCloud IntelliStore".
- "Check Point Press Release".
- Roth, Nurit (26-11-09), "Etay Bogner bests Check Point in court once again", Haaretz.com Check date values in:
- "Check Point Software Technologies to Acquire Zone Labs". 2003-12-15. Retrieved 2008-10-12.
- "Check Point Announces a Cash Tender Offer to Acquire Protect Data". 2006-11-20. Retrieved 2008-10-12.
- "Protect Data acquires Reflex Software Limited to extend product portfolio". 2006-11-02. Retrieved 2008-10-12.
- "Check Point to Acquire NFR Security; Expands Intrusion Prevention Capabilities to Fortify Enterprise Networks". 2006-12-19. Retrieved 2008-10-12.
- Check Point Acquires Data Security Startup Liquid Machines
- "Check Point acquires Israel's Dynasec to boost GRC offerings". Infosecurity. 1 November 2011.
- Check Point Acquires Hyperwise to Deliver Industry's First CPU Level Threat Prevention Capabilities
- Check Point to Acquire Lacoon Mobile Security for Industry's Most Advanced Mobile Threat Prevention
- "Check Point and Sourcefire to Explore Alternative Business Relationship". 2006-03-23. Retrieved 2008-10-12.
- "Check Point calls off Sourcefire buy". 2006-03-24. Retrieved 2008-10-13.
- Interview with Adi Ruppin, Founder and Managing Director of SofaWare, by Berislav Kucan — Tuesday, 21 January 2003.
- Check Point bolsters new firewall appliance. Network World Dec 17, 2001. p. 15, 18
- Check Point Software Stakes Claim in Small Business Internet Security Space Company Duplicates Market-leading Enterprise Success in Sub-$490 Appliance Segment 
- Arbel, Oded (April 25, 2006). "Sofaware founder cleared to sue Check Point for $5.1 million". Ha'aretz. Retrieved 14 June 2010.
- Israeli Supreme Court, עא 2850/08 CHECK POINT SOFTWARE TECHNOLOGIES LTD נ' איתי בוגנר (עליון, א' רובינשטיין, ח' מלצר, נ' הנדל)
- Check Point 20-F SEC filing. 2011