Switch to:
Also traded in: Germany

GuruFocus Financial Strength Rank measures how strong a company’s financial situation is. It is based on these factors

1. The debt burden that the company has as measured by its Interest coverage (current year).
2. Debt to revenue ratio. The lower, the better
3. Altman Z-score.

A company ranks high with financial strength is likely to withstand any business slowdowns and recessions.

Financial Strength : 10/10

vs
industry
vs
history
Cash-to-Debt No Debt
CHKP's Cash-to-Debt is ranked higher than
100% of the 1921 Companies
in the Global Software - Application industry.

( Industry Median: 10.13 vs. CHKP: No Debt )
Ranked among companies with meaningful Cash-to-Debt only.
CHKP' s Cash-to-Debt Range Over the Past 10 Years
Min: 27  Med: No Debt Max: No Debt
Current: No Debt
Equity-to-Asset 0.67
CHKP's Equity-to-Asset is ranked higher than
61% of the 1830 Companies
in the Global Software - Application industry.

( Industry Median: 0.60 vs. CHKP: 0.67 )
Ranked among companies with meaningful Equity-to-Asset only.
CHKP' s Equity-to-Asset Range Over the Past 10 Years
Min: 0.67  Med: 0.78 Max: 0.88
Current: 0.67
0.67
0.88
Interest Coverage No Debt
CHKP's Interest Coverage is ranked higher than
99% of the 1467 Companies
in the Global Software - Application industry.

( Industry Median: 173.79 vs. CHKP: No Debt )
Ranked among companies with meaningful Interest Coverage only.
CHKP' s Interest Coverage Range Over the Past 10 Years
Min: 21.03  Med: No Debt Max: No Debt
Current: No Debt
Piotroski F-Score: 7
Altman Z-Score: 9.27
Beneish M-Score: -2.54
WACC vs ROIC
6.61%
31.66%
WACC
ROIC
GuruFocus Profitability Rank ranks how profitable a company is and how likely the company’s business will stay that way. It is based on these factors:

1. Operating Margin
2. Trend of the Operating Margin (5-year average). The company with an uptrend profit margin has a higher rank.
••3. Consistency of the profitability
4. Piotroski F-Score
5. Predictability Rank•

The maximum rank is 10. A rank of 7 or higher means a higher profitability and may stay that way. A rank of 3 or lower indicates that the company has had trouble to make a profit.

Profitability Rank is not directly related to the Financial Strength Rank. But if a company is consistently profitable, its financial strength will be stronger.

Profitability & Growth : 9/10

vs
industry
vs
history
Operating Margin % 48.94
CHKP's Operating Margin % is ranked higher than
98% of the 1862 Companies
in the Global Software - Application industry.

( Industry Median: 4.84 vs. CHKP: 48.94 )
Ranked among companies with meaningful Operating Margin % only.
CHKP' s Operating Margin % Range Over the Past 10 Years
Min: 38.25  Med: 50.22 Max: 55.6
Current: 48.94
38.25
55.6
Net Margin % 41.63
CHKP's Net Margin % is ranked higher than
97% of the 1863 Companies
in the Global Software - Application industry.

( Industry Median: 3.19 vs. CHKP: 41.63 )
Ranked among companies with meaningful Net Margin % only.
CHKP' s Net Margin % Range Over the Past 10 Years
Min: 38.46  Med: 41.86 Max: 46.83
Current: 41.63
38.46
46.83
ROE % 20.76
CHKP's ROE % is ranked higher than
83% of the 1803 Companies
in the Global Software - Application industry.

( Industry Median: 6.16 vs. CHKP: 20.76 )
Ranked among companies with meaningful ROE % only.
CHKP' s ROE % Range Over the Past 10 Years
Min: 15.75  Med: 18.5 Max: 20.76
Current: 20.76
15.75
20.76
ROA % 14.31
CHKP's ROA % is ranked higher than
87% of the 1927 Companies
in the Global Software - Application industry.

( Industry Median: 2.92 vs. CHKP: 14.31 )
Ranked among companies with meaningful ROA % only.
CHKP' s ROA % Range Over the Past 10 Years
Min: 12.63  Med: 13.63 Max: 14.31
Current: 14.31
12.63
14.31
ROC (Joel Greenblatt) % 1559.66
CHKP's ROC (Joel Greenblatt) % is ranked higher than
98% of the 1883 Companies
in the Global Software - Application industry.

( Industry Median: 23.13 vs. CHKP: 1559.66 )
Ranked among companies with meaningful ROC (Joel Greenblatt) % only.
CHKP' s ROC (Joel Greenblatt) % Range Over the Past 10 Years
Min: 536.93  Med: 1642.22 Max: 2030.05
Current: 1559.66
536.93
2030.05
3-Year Revenue Growth Rate 12.90
CHKP's 3-Year Revenue Growth Rate is ranked higher than
72% of the 1454 Companies
in the Global Software - Application industry.

( Industry Median: 5.30 vs. CHKP: 12.90 )
Ranked among companies with meaningful 3-Year Revenue Growth Rate only.
CHKP' s 3-Year Revenue Growth Rate Range Over the Past 10 Years
Min: -2.7  Med: 14.9 Max: 77.2
Current: 12.9
-2.7
77.2
3-Year EBITDA Growth Rate 8.90
CHKP's 3-Year EBITDA Growth Rate is ranked higher than
51% of the 1210 Companies
in the Global Software - Application industry.

( Industry Median: 8.40 vs. CHKP: 8.90 )
Ranked among companies with meaningful 3-Year EBITDA Growth Rate only.
CHKP' s 3-Year EBITDA Growth Rate Range Over the Past 10 Years
Min: -11.6  Med: 10.7 Max: 91.7
Current: 8.9
-11.6
91.7
3-Year EPS without NRI Growth Rate 8.50
CHKP's 3-Year EPS without NRI Growth Rate is ranked higher than
51% of the 1098 Companies
in the Global Software - Application industry.

( Industry Median: 7.70 vs. CHKP: 8.50 )
Ranked among companies with meaningful 3-Year EPS without NRI Growth Rate only.
CHKP' s 3-Year EPS without NRI Growth Rate Range Over the Past 10 Years
Min: -8.7  Med: 11.65 Max: 84.2
Current: 8.5
-8.7
84.2
GuruFocus has detected 5 Warning Signs with Check Point Software Technologies Ltd $CHKP.
More than 500,000 people have already joined GuruFocus to track the stocks they follow and exchange investment ideas.
» CHKP's 10-Y Financials

Financials


Revenue & Net Income
Cash & Debt
Operating Cash Flow & Free Cash Flow
Operating Cash Flow & Net Income

» Details

Guru Trades

Q2 2016

CHKP Guru Trades in Q2 2016

Jim Simons 17,108 sh (New)
Lee Ainslie 4,200 sh (+37.70%)
Jeremy Grantham 1,441,000 sh (+30.61%)
Ron Baron 29,464 sh (unchged)
Mario Gabelli 4,000 sh (unchged)
Westport Asset Management 365,000 sh (unchged)
Ken Fisher 43,600 sh (-0.68%)
Pioneer Investments 816,455 sh (-7.70%)
Scott Black 24,979 sh (-11.32%)
RS Investment Management 200,211 sh (-24.01%)
Jim Chanos 48,231 sh (-30.72%)
David Herro 439,000 sh (-40.19%)
» More
Q3 2016

CHKP Guru Trades in Q3 2016

Jim Simons 479,108 sh (+2700.49%)
Jeremy Grantham 1,919,900 sh (+33.23%)
Lee Ainslie 4,610 sh (+9.76%)
David Herro 439,000 sh (unchged)
Jim Chanos Sold Out
Scott Black 24,927 sh (-0.21%)
Ken Fisher 42,300 sh (-2.98%)
Mario Gabelli 3,000 sh (-25.00%)
Ron Baron 17,416 sh (-40.89%)
Pioneer Investments 470,520 sh (-42.37%)
» More
Q4 2016

CHKP Guru Trades in Q4 2016

Ken Fisher 42,300 sh (unchged)
Mario Gabelli 3,000 sh (unchged)
Jim Simons Sold Out
Scott Black Sold Out
Ron Baron 17,217 sh (-1.14%)
Lee Ainslie 4,080 sh (-11.50%)
Jeremy Grantham 1,622,325 sh (-15.50%)
Pioneer Investments 283,000 sh (-39.85%)
David Herro 217,000 sh (-50.57%)
» More
Q1 2017

CHKP Guru Trades in Q1 2017

Ken Fisher 42,300 sh (unchged)
» More
» Details

Insider Trades

Latest Guru Trades with CHKP

(List those with share number changes of more than 20%, or impact to portfolio more than 0.1%)

No Entry found in the selected group of Gurus. You can
  • 1. Modify your Personalized List of Gurus, or
  • 2. Click on Premium Premium Tools above to check out all the Gurus, or
  • 3. Click on Premium Plus Premium Plus above for the stocks picks of all the institutional investment advisors (>4000)
» Interactive Charts

Peter Lynch Chart ( What is Peter Lynch Charts )

Business Description

Industry: Application Software » Software - Application    NAICS: 511210    SIC: 7372
Compare:NAS:SYMC, NAS:ADSK, NYSE:WDAY, NYSE:RHT, NYSE:NOW, OTCPK:DASTF, NYSE:MBLY, OTCPK:CNSWF, NYSE:PANW, NAS:AKAM, NAS:CDK, NAS:ANSS, NAS:OTEX, NAS:CDNS, OTCPK:SGGEF, NAS:SPLK, OTCPK:LNNFF, NYSE:N, NAS:FTNT, NAS:TEAM » details
Traded in other countries:CPW.Germany,
Headquarter Location:Israel
Check Point Software Technologies Ltd develops, and markets software and combined hardware and software products and services for information technology security.

Check Point is an Israeli-based pure-play network security company that sells hardware and software for the cybersecurity needs of business users around the world. The company reports revenue in three segments: products and licenses; software blade subscriptions; and updates, maintenance, and subscription. In fiscal 2015, maintenance revenue made up 46% of total revenue, software blades made up 20%, and product revenue made up the remainder.

Guru Investment Theses on Check Point Software Technologies Ltd

Baron Funds Comments on Check Point Software Technologies Ltd. - May 19, 2016

Check Point Software Technologies Ltd. (NASDAQ:CHKP) is a leading cyber security vendor. Fears of slowing cyber security spending abated when Check Point reported a solid close to its year and showed early signs of strength in its next generation software products with subscription revenue growth acceleration. As a leader in the cyber security market, with a large cash balance and strong cash generation, we see continued opportunity for profitable growth.



From the Baron Global Advantage Fund first quarter 2016 commentary.



Check out Ron Baron latest stock trades

Baron Funds Comments on Check Point Software Technologies Ltd. - May 19, 2016

Check Point Software Technologies Ltd. (NASDAQ:CHKP) is a leading cyber security vendor. Fears of slowing cyber security spending abated when Check Point reported a solid close to its year and showed early signs of strength in its next generation software products with subscription revenue growth acceleration. As a leader in the cyber security market, with a large cash balance and strong cash generation, we see continued opportunity for profitable growth.





From the Baron Global Advantage Fund first quarter 2016 commentary.



Check out Ron Baron latest stock trades

Top Ranked Articles about Check Point Software Technologies Ltd

Check Point Introduces the Cyber Security Architecture of the Future: Check Point Infinity
Exploit Kits Surge Worldwide as Rig EK Climbs to Second Place in Check Point’s ‘Most Wanted’ Malware
Check Point Software to Announce 2017 First Quarter Financial Results on April 27, 2017
Check Point Earns U.S. Department of Defense Certifications for Cyber Security Appliances

Check Point Appliance Series 4000, 5000, 15000 and 23000 pass DISA and UCCO tests, paving the way for stronger cyber security in defense

SAN CARLOS, Calif., March 30, 2017 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ:CHKP), today announced the U.S. Department of Defense (DoD) has added four lines of Check Point security appliances to their Unified Capabilities Approved Products List (UC APL). UC APL certification qualifies designated Check Point alliances for sale to DoD agencies, based on stringent Security Technical Implementation Guide (STIG) testing - a standardized methodology for the secure installation and maintenance of computer software and hardware. Now approved for use on U.S. DoD networks, these security appliances have fulfilled interoperability (IO) and information assurance (IA) certification requirements.
Check Point’s 4000 Series, 5000 Series, 15000 Series and 23000 Series appliances with software version R77.30 are certified for the following capabilities: Data Firewall (DFW)
Intrusion Protection System and Intrusion Detection System (IPS/IDS)
Virtual Private Network Concentrator (VPN)
These certifications, as well as a recent a certification by the NSA under the Commercial Solutions for Classified Program (CSfC), pave the way for greater utilization of  Check Point products by U.S. defense and intelligence communities. As an established leader in cyber security technology, Check Point consistently innovates and builds products to meet and exceed the most stringent requirements set by the U.S. Government, the U.S. Department of Defense and internationally recognized organizations. Check Point’s innovative cyber security solutions prevent the most sophisticated cyber-attacks against critical I.T. infrastructure and sensitive data requiring the highest security and confidentiality. “Government defense entities face cyber threats that are rapidly becoming more severe and frequent,” said Marianne Meagher, head of federal, Check Point. “Putting our products through rigorous DISA and UCCO certification testing demonstrates our firm commitment to providing the U.S. Department of Defense with cyber security that is unsurpassed for effectiveness against these mounting threats.” Check Point provides true preventative security through the industry’s leading unified security architecture and management platform. These Check Point innovations streamline deploying and managing security controls across all networks and environments including data centers, cloud, mobile and endpoints. For more information on Check Point’s other certification efforts and capabilities, visit:
http://www.checkpoint.com/products/certifications/. Follow Check Point via: Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks and cloud deployments to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
1.650.628.2040
[email protected]

MEDIA CONTACT:
Manjul Gupta
Check Point Software Technologies
1.650.628.2424
[email protected]

Read more...
Check Point Discloses How Hackers Can Take over Hundreds of Millions of WhatsApp & Telegram Accounts in Seconds

New Vulnerability revealed in popular messaging services, WhatsApp and Telegram, allowed hackers to gain complete control over accounts, including chats, images, video and audio files, and contacts

SAN CARLOS, Calif., March 15, 2017 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ:CHKP) researchers today revealed a new vulnerability on WhatsApp & Telegram’s online platforms – WhatsApp Web & Telegram Web – two of the world’s most popular messaging services. By exploiting this vulnerability, attackers could completely take over user accounts, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more.
“This new vulnerability put hundreds of millions of WhatsApp Web and Telegram Web users at risk of complete account take over,” says Oded Vanunu, head of product vulnerability research at Check Point. “By simply sending an innocent looking photo, an attacker could gain control over the account, access message history, all photos that were ever shared, and send messages on behalf of the user.” The vulnerability allows an attacker to send the victim malicious code, hidden within an innocent looking image. As soon as the user clicks on the image, the attacker can gain full access to the victim’s WhatsApp or Telegram storage data, thus giving full access to the victim’s account. The attacker can then send the malicious file to all the victim’s contacts, potentially enabling a widespread attack. Check Point disclosed this information to the WhatsApp and Telegram security teams on March 8, 2017. WhatsApp and Telegram acknowledged the security issue and developed fixes for worldwide web clients. “Thankfully, WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients,” said Oded Vanunu. WhatsApp and Telegram web users wishing to ensure that they are using the latest version are advised to restart their browser. WhatsApp and Telegram use end-to-end message encryption as a data security measure, to ensure that only the people communicating can read the messages, and nobody in between. Yet, the same end-to-end encryption was also the source of this vulnerability. Since messages were encrypted on the side of the sender, WhatsApp and Telegram were blind to the content, and were therefore unable to prevent malicious content from being sent. After fixing this vulnerability, content will now be validated before the encryption, allowing malicious files to be blocked. Both web versions mirror all messages sent and received by the user on the mobile app, and are fully synced with users’ devices WhatsApp has over 1 billion users worldwide, making it the most prevalent instant messaging service available today. The company’s web version is available on all browsers and WhatsApp supported platforms, including Android, iPhone (iOS), Windows Phone 8.x, BlackBerry, BB10 and Nokia smartphones. Telegram is a cloud-based mobile and desktop messaging app that has over 100 million monthly active users, delivering over 15 billion messages daily. For technical details you can check the Check Point blog: http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/ Demo videos can be found here: WhatsApp: https://youtu.be/UR_i5XSAKrgTelegram: https://youtu.be/26Ih4xTcP-E Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
1.650.628.2040
[email protected]

MEDIA CONTACT:
Ali Donzanti
Check Point Software Technologies
Tel: 1.650.628.2030
[email protected]

Read more...
Hancitor Makes First Appearance in Top Five "Most Wanted" Malware in Check Point’s February Global Threat Impact Index

The downloader, also known as Chanitor, climbed 22 places after more than tripling its global impact last month
SAN CARLOS, Calif., March 13, 2017 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ:CHKP) has revealed that the Hancitor downloader has surged into the top five "most wanted" malware families worldwide for the first time, according to the company’s February Global Threat Impact Index.
The downloader, that installs malicious payloads such as banking trojans and ransomware on infected devices, climbed 22 places after more than tripling its global impact in the past month. Hancitor, also known as Chanitor, is usually delivered as a macro-enabled Office document in phishing emails with "important" messages such as voicemails, faxes or invoices.The index ranked Kelihos, a botnet used in bitcoin theft, as the most prevalent malware family overall, with 12% of organizations globally impacted by it. Having been active since 2010, the resilient Kelihos has evolved from a "pump and dump" spam campaign into a botnet-for-hire, sending spam for anyone willing to pay. Despite being taken down in 2011 and again a year later, it has continued to resurface, culminating in the botnet and growing by more than three times in just two days last August. Today, Kelihos continues to grow as one of the most prominent distributors of spam in the world, with over 300,000 infected machines, each capable of sending more than 200,000 emails a day.Overall, the top 3 malware families revealed that hackers were using a wide range of attack vectors and tactics to target businesses. These threats impact all steps of the infection chain, including spam emails which are spread by botnets, and contain downloaders that eventually place ransomware or a Trojan on the victim’s machine.The top three most common malware in February were Kelihos in first, impacting 12% of organizations, followed by HackerDefender, impacting 5% and Cryptowall which affected 4.5% of businesses globally.February 2017’s Top 3 "Most Wanted" Malware:Kelihos - Botnet mainly involved in bitcoin theft and spamming. It utilizes peer-to-peer communications, enabling each individual node to act as a Command & Control server.HackerDefender - User-mode rootkit for Windows, can be used to hide files, processes and registry keys, and also implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means.Cryptowall - Ransomware that started as a Cryptolocker doppelgänger, but eventually surpassed it. After the takedown of Cryptolocker, Cryptowall became one of the most prominent ransomwares to date. Cryptowall is known for its use of AES encryption and for conducting its C&C communications over the Tor anonymous network. It is widely distributed via exploit kits, malvertising and phishing campaigns.  In mobile malware, Hiddad moved up from third in January to become the most active variant, followed by Hummingbad and last month’s leader Triada in second and third place, respectively.* The complete list of the top 10 malware families in February can be found on the Check Point Blog: http://blog.checkpoint.com/2017/03/13/check-point-february-top-malware/Top 3 "Most Wanted" mobile malware:Hiddad - Android malware that repackages legitimate apps and then releases them to a third-party store. Its main function is displaying ads, however it is also able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.Hummingbad - Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and with slight modifications could enable additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.Triada - Modular backdoor for Android, which grants super-user privileges to download malware and helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.Nathan Shuchami, VP of Emerging Products at Check Point commented: “The rapid growth in the use of some malware variants grew during February, highlighting the challenges faced by IT departments worldwide. It is imperative organizations are sufficiently equipped to deal with the ever-increasing number of threats by adopting advanced security systems across their entire business network such as Check Point’s SandBlast™ Zero-Day Protection and Mobile Threat Prevention.”The ThreatCloud Map is powered by Check Point’s ThreatCloudTM intelligence, the largest collaborative network to fight cybercrime, which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily. Check Point’s Threat Prevention Resources are available at:  http://www.checkpoint.com/threat-prevention-resources/index.htmlFollow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologiesAbout Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
1.650.628.2040
[email protected]

MEDIA CONTACT:
Emilie Beneitez Lefebvre
Check Point Software Technologies
Tel: 44 (0) 7785 381 302
[email protected]

Read more...
Check Point Delivers Advanced Cloud Security to Google Cloud Platform

Check Point vSEC offers industry’s broadest support for cloud environments delivering scalable threat prevention security for any cloud – public, private and hybrid 

SAN CARLOS, Calif., March 07, 2017 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ:CHKP) today introduced Check Point vSEC for Google Cloud Platform, delivering advanced security integrated with Google Cloud Platform. With this release, Check Point joins the Google Cloud Technology Partner Program and continues its industry leadership protecting workloads in physical, virtual and cloud environments across any cloud platform. vSEC for Google Cloud Platform delivers advanced security that is built for agile and scalable cloud environments.
“As we currently utilize a variety of Google services, it was a natural fit for us to build our new cloud environment around Google Cloud Platform,” said Günther Oberhofer, Head of Networks and Communications, Conrad Electronic SE. “Enabling strong security was also a key part of that strategy. Check Point vSEC lets us securely leverage the cloud to its fullest capabilities, extending our on-premise data center while protecting critical assets from external and internal threats, all while achieving speed, agility and cost-savings offered by Google Cloud Platform.” Check Point vSEC for Google Cloud Platform extends advanced, multi-layered security to protect workloads in the cloud from external attacks while enabling secured connectivity from on-premise enterprise networks to Google Cloud Platform. Additionally, it prevents the lateral movement of threats between servers hosted inside the cloud. Designed for the dynamic security requirements of cloud deployments, vSEC automatically scales as needed and enhances visibility by integrating Google Cloud Platform objects into security policy and logs. Key highlights include: Advanced Threat Prevention protects cloud assets against external and internal threats. vSEC complements Google Cloud Platform’s native controls by securing traffic with comprehensive multi-layer security.
 Automated and agile security at the speed of DevOps dynamically scales and grows with business needs improving operational efficiency and enabling business elasticity. vSEC is rapidly deployed and provisioned using Single-click provisioning from the Google Cloud Marketplace. On-demand deployment and usage-based (Pay-as-you-Grow model) licensing lowers TCO of cloud deployments.
 Single Pane of Glass Security Management for public and private cloud as well as on-premise physical networks ensures consistent policy management and visibility across cloud infrastructures. Security policy, logging and reporting leverages Google Cloud Platform defined objects enhancing visibility.
 Any Cloud, Any Service – Always Secure – The industry’s broadest cloud platform support and the only Advanced Threat Prevention security solution for any cloud environment – public, private or hybrid – AWS, Microsoft Azure, VMware, Cisco,  OpenStack, Nuage Networks and now Google Cloud Platform “We are excited to offer vSEC cloud security for Google Cloud Platform,” said Erez Berkner, director of product management, Check Point. “vSEC cloud security provides powerful threat prevention which scales automatically as your business grows. Security automatically adapts to dynamic changes in the cloud environment enabling DevOps and security teams to place security on auto-pilot and to uniformly extend security controls across all clouds.” "Check Point vSEC for Google Cloud Platform extends to the cloud the same, multi-layered security that customers are running in their own data centers,” said Adam Massey, Director of Technology Partnerships at Google Cloud. "We are excited to have Check Point back our commitment to help customers build highly secure, scalable and high-performance applications." Check Point is a sponsor at Google Cloud Next 2017 Conference, running March 8 – 10 in San Francisco, which brings together executives, customers, partners, developers, IT decision makers and Google engineers to build the future of the cloud. Learn how joint customers can harness Check Point vSEC’s unique threat prevention capabilities within the Google Cloud Platform by meeting our experts and viewing a demonstration at our booth – Moscone West, booth#B9. vSEC for Google Cloud Platform is available immediately in PAYG (Pay-as-you-Grow) or BYOL (Bring-your-own-License) options through the Google marketplace. To learn more about vSEC for Google Cloud Platform, visit: https://www.checkpoint.com/products/vsec-google-cloud-platform/#overview Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
1.650.628.2040
[email protected]

MEDIA CONTACT:
Manjul Gupta
Check Point Software Technologies
1.650.628.2424
[email protected]

Read more...
Check Point Software to Announce 2016 Second Quarter Financial Results on July 26, 2016

SAN CARLOS, CA--(Marketwired - Jul 5, 2016) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today announced that it will release its second quarter financial results for the quarter ending June 30, 2016, on Tuesday, July 26, 2016, before the U.S. financial markets open. Management will host a conference call with the investment community at 8:30 AM ET/5:30 AM PT on July 26. A live webcast of the call will be hosted on the company's website at http://www.checkpoint.com. To follow this and other Check Point news visit:

Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices -- in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.







Read more...
Check Point Research Shows Malware Families Targeting Corporate Networks Continue to Grow

Threat Research for May 2016 Shows a Continuing Rise in the Number of Active Malware Families Attacking Business Networks; Banking Malware Increases

SAN CARLOS, CA--(Marketwired - Jun 21, 2016) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today published its latest Threat Index, revealing the number of active global malware families increased by 15 percent in May 2016. Check Point detected 2,300 unique and active malware families attacking business networks in May. It was the second month running Check Point has observed an increase in the number of unique malware families, having previously reported a 50 percent increase from March to April. The continued rise in the number of active malware variants highlights the wide range of threats and scale of challenges security teams face in preventing an attack on their business critical information. Most notably:

While Conficker remained the most commonly used malware in the period, banking malware Trojan Tinba became the second most prevalent form of infection last month, allowing hackers to steal victim's credentials using web-injects, activated as users try to log-in to their banking website.



Attacks against mobile devices also remained constant as Android malware HummingBad remained in the overall top 10 of malware attacks across all platforms globally during the period. Despite only being discovered by Check Point researchers in February, it has rapidly become commonly used; indicating hackers view Android mobile devices as weak spots in enterprise security and as potentially high reward targets.





"We continue to see a significant increase in the number of unique and active malware families targeting business networks, which speaks to the effort hackers are putting into creating new zero-day attacks and the scale of the challenge businesses face in securing their network against cyber criminals," said Nathan Shuchami, head of threat prevention, Check Point. "Organizations need to consider using advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage to ensure they are effectively secured against the latest threats." In May, Conficker was the most prominent family accounting for 14 percent of recognized attacks; while second and third placed Tinba and Sality were responsible for 9 percent each. The top ten families were responsible for 60 percent of all recognized attacks. 1. Conficker - Worm that allows remote operations, malware downloads, and credential theft by disabling Microsoft Windows systems security services. Infected machines are controlled by a botnet, which contacts its Command & Control server to receive instructions. 2. Tinba - Also referred to as Tiny Banker or Zusy, Tinba is a banking trojan that steals the victim's credentials using web injections. It becomes activated when users try to login to their banking website. 3. Sality - Virus that infects Microsoft Windows systems to allow remote operations and downloads of additional malware. Due to its complexity and ability to adapt, Sality is widely considered to be one of the most formidable malware to date. Mobile malware families continued to pose a significant threat to businesses mobile devices during May with six entries into the top 100 overall families. Most of these targeted Android, but in a continuation of the trend seen in April several targeted iOS. The top three mobile families were: 1. HummingBad - Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and with slight modifications could enable additional malicious activity such as installing a keylogger, stealing credentials and bypassing encrypted email containers used by enterprises. 2. Iop - Android malware that installs applications and displays excessive advertising by using root access on the mobile device. The amount of ads and installed apps makes it difficult for the user to continue using the device as usual. 3. XcodeGhost - A compromised version of the iOS developer platform Xcode. This unofficial version of Xcode was altered so that it injects malicious code into any app that was developed and compiled using it. The injected code sends app info to a Command & Control server, allowing the infected app to read the device clipboard. About the Check Point Threat Index Check Point's Threat Index is based on threat intelligence drawn from its ThreatCloud World Cyber Threat Map, which tracks how and where cyberattacks are taking place worldwide in real time. The Threat Map is powered by Check Point's ThreatCloud™ intelligence, the largest collaborative network to fight cybercrime, which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily. Check Point's Threat Prevention Resources are available at: http://www.checkpoint.com/threat-prevention-resources/index.html. Follow Check Point via: Twitter: http://www.twitter.com/checkpointsw

Facebook: https://www.facebook.com/checkpointsoftware

Blog: http://blog.checkpoint.com

YouTube: http://www.youtube.com/user/CPGlobal

LinkedIn: https://www.linkedin.com/company/check-point-software-technologies About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices -- in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.







Read more...
Acea Distribuzione Deploys Check Point SCADA Security Solution to Protect Critical Infrastructure Against Cyber Threats

Large Italian Utility Provider Uses 1200R Security Appliance to Enhance Visibility and Control of SCADA Networks

MILAN, ITALY--(Marketwired - Jun 13, 2016) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today announced Acea Distribuzione, part of Acea Group, one of the largest Italian public utility companies for power and water supply, has deployed Check Point's 1200R security gateway appliances to secure its critical infrastructure, SCADA network and control systems. Following the findings of the Panoptesec project, Acea selected the Check Point solution following a competitive tender for a customizable, rugged solution that would work in harsh operating environments, including primary and secondary energy switching and distribution sites, while meeting specific technical requirements. The 1200R appliance was the only proven solution to meet these requirements, and Acea worked with systems integrator DGS Group to deploy it within the company's existing network infrastructure. Additionally, the 1200R will integrate with the Panoptesec cyber defence decision support infrastructure. This EU-funded initiative addresses the challenges of detecting vulnerabilities and possible attacks on sensitive information and essential networks and services by enabling individuals, companies and organisations to handle security incidents. Panoptesec delivers a continuous cyber security monitoring and response capability in real-time. It proactively and reactively evaluates system weaknesses to identify potential attacks, provide a list of prioritised response actions to automatically manage cyber incidents. "We wanted to protect our internal and external SCADA assets as well as all the relevant Command & Control centers," says Andrea Guarino, ICT Security, Privacy and Compliance manager at Acea. "The 'pain point' was being able to detect and block all 'normal' attacks against our networks and those attacks specifically targeting SCADA networks and devices. We also needed to ensure we had full visibility of the SCADA command sequences, both sent and received, on the controlled networks and that we were able to record them for forensic and analysis purposes. The Check Point solution was the only one to meet all of our criteria." The Check Point 1200R has also improved overall performance on Acea's SCADA networks thanks to the traffic filtering done on the appliance: this could potentially enable more peripheral devices to be deployed on existing servers and communication lines. "The Check Point solution provides us with enhanced security and has improved our ability to identify and respond to potential vulnerabilities," added Andrea Guarino at Acea. "We now also have a better understanding of the command flows and information used by our SCADA systems and industrial control systems. Furthermore, we can now monitor and analyze network traffic, enabling us to improve our overall security posture." Acea was the first company to utilise the Panoptesec service to centralise data and resources from its commercial partners and suppliers, collating information provided by various cyber security defence systems and probes, including firewall, IPS / IDS, Silent Defense and Syslog. This centralised information simplifies analysis and monitoring, driving further efficiencies. Amnon Bar-Lev, President at Check Point says: "Our 1200R appliance is optimized for deployment in the harshest of industrial environments and remote locations, to support SCADA networks and control systems. It delivers unrivaled security for critical infrastructure, designed to prevent access and the disruption of vital processes." The Check Point 1200R is a purpose-built, ruggedized security gateway appliance for harsh industrial environments and remote deployments. It enables full visibility and granular control of SCADA traffic to prevent network, devices and logical process attacks. With over 780 SCADA commands and parameters within the Check Point Firewall and Application Control Software Blades, and over 280 SCADA-specific IPS signatures, Check Point offers the most extensive SCADA security support. Specialized threat reports in Check Point Next Generation SmartEvent provide full reports on SCADA traffic to grant quick and detailed forensics for incident investigations. This overall security solution also has regulation compliance monitoring with the Check Point Compliance Blade. Follow Check Point via:

Check Point Blog: http://blog.checkpoint.com/

Twitter: http://www.twitter.com/checkpointsw

Facebook: http://www.facebook.com/checkpointsoftware

YouTube: http://www.youtube.com/user/CPGlobal

LinkedIn: https://www.linkedin.com/company/check-point-software-technologies About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices - in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.







Read more...

Ratios

vs
industry
vs
history
PE Ratio 24.80
CHKP's PE Ratio is ranked higher than
53% of the 1245 Companies
in the Global Software - Application industry.

( Industry Median: 25.80 vs. CHKP: 24.80 )
Ranked among companies with meaningful PE Ratio only.
CHKP' s PE Ratio Range Over the Past 10 Years
Min: 11.96  Med: 19.72 Max: 25.46
Current: 24.8
11.96
25.46
Forward PE Ratio 20.45
CHKP's Forward PE Ratio is ranked higher than
53% of the 535 Companies
in the Global Software - Application industry.

( Industry Median: 20.20 vs. CHKP: 20.45 )
Ranked among companies with meaningful Forward PE Ratio only.
N/A
PE Ratio without NRI 24.80
CHKP's PE Ratio without NRI is ranked higher than
54% of the 1229 Companies
in the Global Software - Application industry.

( Industry Median: 26.21 vs. CHKP: 24.80 )
Ranked among companies with meaningful PE Ratio without NRI only.
CHKP' s PE Ratio without NRI Range Over the Past 10 Years
Min: 11.96  Med: 19.72 Max: 25.46
Current: 24.8
11.96
25.46
Price-to-Owner-Earnings 20.84
CHKP's Price-to-Owner-Earnings is ranked higher than
55% of the 724 Companies
in the Global Software - Application industry.

( Industry Median: 22.94 vs. CHKP: 20.84 )
Ranked among companies with meaningful Price-to-Owner-Earnings only.
CHKP' s Price-to-Owner-Earnings Range Over the Past 10 Years
Min: 9.54  Med: 15.5 Max: 26.12
Current: 20.84
9.54
26.12
PB Ratio 5.05
CHKP's PB Ratio is ranked lower than
68% of the 1789 Companies
in the Global Software - Application industry.

( Industry Median: 2.97 vs. CHKP: 5.05 )
Ranked among companies with meaningful PB Ratio only.
CHKP' s PB Ratio Range Over the Past 10 Years
Min: 1.93  Med: 3.21 Max: 5.13
Current: 5.05
1.93
5.13
PS Ratio 10.37
CHKP's PS Ratio is ranked lower than
88% of the 1780 Companies
in the Global Software - Application industry.

( Industry Median: 2.34 vs. CHKP: 10.37 )
Ranked among companies with meaningful PS Ratio only.
CHKP' s PS Ratio Range Over the Past 10 Years
Min: 4.91  Med: 8.56 Max: 10.96
Current: 10.37
4.91
10.96
Price-to-Free-Cash-Flow 20.14
CHKP's Price-to-Free-Cash-Flow is ranked higher than
61% of the 677 Companies
in the Global Software - Application industry.

( Industry Median: 24.32 vs. CHKP: 20.14 )
Ranked among companies with meaningful Price-to-Free-Cash-Flow only.
CHKP' s Price-to-Free-Cash-Flow Range Over the Past 10 Years
Min: 9.48  Med: 14.65 Max: 25.37
Current: 20.14
9.48
25.37
Price-to-Operating-Cash-Flow 19.62
CHKP's Price-to-Operating-Cash-Flow is ranked lower than
54% of the 856 Companies
in the Global Software - Application industry.

( Industry Median: 17.68 vs. CHKP: 19.62 )
Ranked among companies with meaningful Price-to-Operating-Cash-Flow only.
CHKP' s Price-to-Operating-Cash-Flow Range Over the Past 10 Years
Min: 9.3  Med: 14.07 Max: 24.94
Current: 19.62
9.3
24.94
EV-to-EBIT 19.62
CHKP's EV-to-EBIT is ranked lower than
54% of the 1770 Companies
in the Global Software - Application industry.

( Industry Median: 17.68 vs. CHKP: 19.62 )
Ranked among companies with meaningful EV-to-EBIT only.
CHKP' s EV-to-EBIT Range Over the Past 10 Years
Min: 8.7  Med: 15 Max: 19.9
Current: 19.62
8.7
19.9
EV-to-EBITDA 19.29
CHKP's EV-to-EBITDA is ranked lower than
64% of the 1910 Companies
in the Global Software - Application industry.

( Industry Median: 13.76 vs. CHKP: 19.29 )
Ranked among companies with meaningful EV-to-EBITDA only.
CHKP' s EV-to-EBITDA Range Over the Past 10 Years
Min: 7.7  Med: 14.3 Max: 19.58
Current: 19.29
7.7
19.58
PEG Ratio 2.76
CHKP's PEG Ratio is ranked lower than
62% of the 567 Companies
in the Global Software - Application industry.

( Industry Median: 1.98 vs. CHKP: 2.76 )
Ranked among companies with meaningful PEG Ratio only.
CHKP' s PEG Ratio Range Over the Past 10 Years
Min: 0.69  Med: 1.5 Max: 51.57
Current: 2.76
0.69
51.57
Shiller PE Ratio 36.67
CHKP's Shiller PE Ratio is ranked higher than
54% of the 291 Companies
in the Global Software - Application industry.

( Industry Median: 38.24 vs. CHKP: 36.67 )
Ranked among companies with meaningful Shiller PE Ratio only.
CHKP' s Shiller PE Ratio Range Over the Past 10 Years
Min: 15.36  Med: 28.65 Max: 39.36
Current: 36.67
15.36
39.36
Current Ratio 1.62
CHKP's Current Ratio is ranked lower than
60% of the 1750 Companies
in the Global Software - Application industry.

( Industry Median: 1.94 vs. CHKP: 1.62 )
Ranked among companies with meaningful Current Ratio only.
CHKP' s Current Ratio Range Over the Past 10 Years
Min: 1.62  Med: 2.86 Max: 8.65
Current: 1.62
1.62
8.65
Quick Ratio 1.62
CHKP's Quick Ratio is ranked lower than
55% of the 1750 Companies
in the Global Software - Application industry.

( Industry Median: 1.79 vs. CHKP: 1.62 )
Ranked among companies with meaningful Quick Ratio only.
CHKP' s Quick Ratio Range Over the Past 10 Years
Min: 1.62  Med: 2.86 Max: 8.65
Current: 1.62
1.62
8.65
Days Sales Outstanding 100.30
CHKP's Days Sales Outstanding is ranked lower than
74% of the 1492 Companies
in the Global Software - Application industry.

( Industry Median: 68.98 vs. CHKP: 100.30 )
Ranked among companies with meaningful Days Sales Outstanding only.
CHKP' s Days Sales Outstanding Range Over the Past 10 Years
Min: 89.48  Med: 100.47 Max: 113.66
Current: 100.3
89.48
113.66

Buy Back

vs
industry
vs
history
3-Year Average Share Buyback Ratio 3.40
CHKP's 3-Year Average Share Buyback Ratio is ranked higher than
95% of the 1148 Companies
in the Global Software - Application industry.

( Industry Median: -2.60 vs. CHKP: 3.40 )
Ranked among companies with meaningful 3-Year Average Share Buyback Ratio only.
CHKP' s 3-Year Average Share Buyback Ratio Range Over the Past 10 Years
Min: -51.6  Med: 2.6 Max: 28.9
Current: 3.4
-51.6
28.9

Valuation & Return

vs
industry
vs
history
Price-to-Net-Current-Asset-Value 106.35
CHKP's Price-to-Net-Current-Asset-Value is ranked lower than
97% of the 1066 Companies
in the Global Software - Application industry.

( Industry Median: 7.31 vs. CHKP: 106.35 )
Ranked among companies with meaningful Price-to-Net-Current-Asset-Value only.
CHKP' s Price-to-Net-Current-Asset-Value Range Over the Past 10 Years
Min: 4.16  Med: 15.14 Max: 107.76
Current: 106.35
4.16
107.76
Price-to-Tangible-Book 6.65
CHKP's Price-to-Tangible-Book is ranked lower than
63% of the 1488 Companies
in the Global Software - Application industry.

( Industry Median: 4.38 vs. CHKP: 6.65 )
Ranked among companies with meaningful Price-to-Tangible-Book only.
CHKP' s Price-to-Tangible-Book Range Over the Past 10 Years
Min: 2.69  Med: 4.73 Max: 57.24
Current: 6.65
2.69
57.24
Price-to-Intrinsic-Value-Projected-FCF 1.23
CHKP's Price-to-Intrinsic-Value-Projected-FCF is ranked higher than
76% of the 771 Companies
in the Global Software - Application industry.

( Industry Median: 1.97 vs. CHKP: 1.23 )
Ranked among companies with meaningful Price-to-Intrinsic-Value-Projected-FCF only.
CHKP' s Price-to-Intrinsic-Value-Projected-FCF Range Over the Past 10 Years
Min: 0.62  Med: 1.11 Max: 13.43
Current: 1.23
0.62
13.43
Price-to-Intrinsic-Value-DCF (Earnings Based) 1.25
CHKP's Price-to-Intrinsic-Value-DCF (Earnings Based) is ranked higher than
63% of the 124 Companies
in the Global Software - Application industry.

( Industry Median: 1.45 vs. CHKP: 1.25 )
Ranked among companies with meaningful Price-to-Intrinsic-Value-DCF (Earnings Based) only.
N/A
Price-to-Median-PS-Value 1.21
CHKP's Price-to-Median-PS-Value is ranked lower than
53% of the 1498 Companies
in the Global Software - Application industry.

( Industry Median: 1.15 vs. CHKP: 1.21 )
Ranked among companies with meaningful Price-to-Median-PS-Value only.
CHKP' s Price-to-Median-PS-Value Range Over the Past 10 Years
Min: 0.6  Med: 1.06 Max: 4.3
Current: 1.21
0.6
4.3
Price-to-Peter-Lynch-Fair-Value 2.85
CHKP's Price-to-Peter-Lynch-Fair-Value is ranked lower than
74% of the 339 Companies
in the Global Software - Application industry.

( Industry Median: 1.60 vs. CHKP: 2.85 )
Ranked among companies with meaningful Price-to-Peter-Lynch-Fair-Value only.
CHKP' s Price-to-Peter-Lynch-Fair-Value Range Over the Past 10 Years
Min: 0.51  Med: 1.23 Max: 2.88
Current: 2.85
0.51
2.88
Price-to-Graham-Number 2.71
CHKP's Price-to-Graham-Number is ranked lower than
54% of the 882 Companies
in the Global Software - Application industry.

( Industry Median: 2.52 vs. CHKP: 2.71 )
Ranked among companies with meaningful Price-to-Graham-Number only.
CHKP' s Price-to-Graham-Number Range Over the Past 10 Years
Min: 1.24  Med: 2.19 Max: 13.4
Current: 2.71
1.24
13.4
Earnings Yield (Greenblatt) % 5.11
CHKP's Earnings Yield (Greenblatt) % is ranked higher than
62% of the 2521 Companies
in the Global Software - Application industry.

( Industry Median: 3.23 vs. CHKP: 5.11 )
Ranked among companies with meaningful Earnings Yield (Greenblatt) % only.
CHKP' s Earnings Yield (Greenblatt) % Range Over the Past 10 Years
Min: 5  Med: 6.7 Max: 11.5
Current: 5.11
5
11.5
Forward Rate of Return (Yacktman) % 12.90
CHKP's Forward Rate of Return (Yacktman) % is ranked higher than
57% of the 773 Companies
in the Global Software - Application industry.

( Industry Median: 10.33 vs. CHKP: 12.90 )
Ranked among companies with meaningful Forward Rate of Return (Yacktman) % only.
CHKP' s Forward Rate of Return (Yacktman) % Range Over the Past 10 Years
Min: 3.7  Med: 17.8 Max: 27.9
Current: 12.9
3.7
27.9

More Statistics

Revenue (TTM) (Mil) $1,741
EPS (TTM) $ 4.20
Beta0.75
Short Percentage of Float7.46%
52-Week Range $74.34 - 105.73
Shares Outstanding (Mil)174.90

Analyst Estimate

Dec17 Dec18 Dec19
Revenue (Mil $) 1,867 1,985 2,089
EPS ($) 5.14 5.67 6.12
EPS without NRI ($) 5.14 5.67 6.12
EPS Growth Rate
(Future 3Y To 5Y Estimate)
12.50%
Dividends per Share ($)
» More Articles for NAS:CHKP

Headlines

Articles On GuruFocus.com
Check Point Introduces the Cyber Security Architecture of the Future: Check Point Infinity Apr 20 2017 
Exploit Kits Surge Worldwide as Rig EK Climbs to Second Place in Check Point’s ‘Most Wante Apr 13 2017 
Check Point Software to Announce 2017 First Quarter Financial Results on April 27, 2017 Apr 03 2017 
Check Point Earns U.S. Department of Defense Certifications for Cyber Security Appliances Mar 30 2017 
Check Point Discloses How Hackers Can Take over Hundreds of Millions of WhatsApp & Telegram Accounts Mar 15 2017 
Hancitor Makes First Appearance in Top Five "Most Wanted" Malware in Check Point’s February Glo Mar 13 2017 
Check Point Delivers Advanced Cloud Security to Google Cloud Platform Mar 07 2017 
3 Aggressive Growth Stocks for 2017 Feb 21 2017 
High Predictability Stocks: T. Rowe Price, Roper Tech Jan 27 2017 
5 Companies Reach Yearly Highs Jan 17 2017 

More From Other Websites
Major Cybersecurity Stocks See Rise in Short Interest Bets Apr 26 2017
Check Point (CHKP) to Post Q1 Earnings: What to Expect? Apr 25 2017
Check Point Introduces the Cyber Security Architecture of the Future: Check Point Infinity Apr 20 2017
Analysts' Actions -- Colgate, Clorox, Cummins, McDonald's, Splunk and More Apr 18 2017
Fortinet Stock Rises, Palo Alto Downgraded, Barracuda Earnings Due Apr 17 2017
Exploit Kits Surge Worldwide as Rig EK Climbs to Second Place in Check Point’s ‘Most Wanted’... Apr 13 2017
Cybersecurity Stocks See Increased Bets From Short Sellers Apr 12 2017
Hedge Funds Love These 4 Stocks--Should You? Apr 11 2017
Check Point Software to Announce 2017 First Quarter Financial Results on April 27, 2017 Apr 03 2017
Check Point Earns U.S. Department of Defense Certifications for Cyber Security Appliances Mar 30 2017
The 3 Best Firewall Companies to Buy in 2017 Mar 29 2017
Cybersecurity Stocks See Increase in Short Interest Bets Mar 27 2017
Israeli companies to set up Latin American cyber defence centre Mar 27 2017
Jefferies Has 4 Cybersecurity Stocks to Buy as Growth to Continue for Years Mar 24 2017
Better Buy: Check Point Software Technologies vs. Palo Alto Networks Mar 17 2017
Is the Time Ripe to Build Positions in Check Point (CHKP)? Mar 15 2017
WhatsApp Gets Patch to Correct Flaw With Messaging Mar 15 2017
WhatsApp, Telegram patch flaws in instant messaging applications Mar 15 2017
Check Point Discloses How Hackers Can Take over Hundreds of Millions of WhatsApp & Telegram Accounts... Mar 15 2017

Personalized Checklist

Checklist has been moved to "Checklist" tab.

Get WordPress Plugins for easy affiliate links on Stock Tickers and Guru Names | Earn affiliate commissions by embedding GuruFocus Charts
GuruFocus Affiliate Program: Earn up to $400 per referral. ( Learn More)