Hubbry Logo
Check PointCheck PointMain
Open search
Check Point
Community hub
Check Point
logo
8 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
Check Point
Check Point
from Wikipedia

Check Point Software Technologies is a multinational cybersecurity company active in over 60 countries and with headquarters in Redwood City, California and Tel Aviv, Israel. Check Point’s Infinity Platform delivers AI-powered threat prevention across the networks from end point to cloud to mobile and beyond. The company protects over 100,000 organizations globally and is home to the Check Point Research team. It is a partner organization of the World Economic Forum.[5]

Key Information

History

[edit]

Check Point was established in Ramat Gan, Israel in 1993, by Gil Shwed (CEO as of 2016), Marius Nacht (Chairman as of 2016) and Shlomo Kramer (who left Check Point in 2003).[6] Shwed had the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1; soon afterwards they also developed one of the world's first VPN products, VPN-1.[7] Shwed developed the idea while serving in the Unit 8200 of the Israel Defense Forces, where he worked on securing classified networks.[8][9]

Initial funding of US$250,000 was provided by venture capital fund BRM Group.[10]

In 1994 Check Point signed an OEM agreement with Sun Microsystems,[7] followed by a distribution agreement with HP in 1995.[11] The same year, the U.S. head office was established in Redwood City, California.

By February 1996, the company was named worldwide firewall market leader by IDC, with a market share of 40 percent.[12] In June 1996 Check Point raised $67 million from its initial public offering on NASDAQ.[13]

In 1998, Check Point established a partnership with Nokia, which bundled Check Point's Software with Nokia's computer Network Security Appliances.[13]

In 2003, a class-action lawsuit was filed against Check Point over violation of the Securities Exchange Act by failing to disclose major financial information.[14]

On August 14, 2003, Check Point opened its branch in India's capital, Delhi (with the legal name Check Point Software Technologies India Pvt. Ltd.). Eyal Desheh was the first director appointed in India.

During the first decade of the 21st century Check Point started acquiring other IT security companies, including Nokia's network security business unit in 2009.[15]

In 2018, the company discovered malware, which it named "AdultSwine", that was found programmed into around 60 apps on the Google Play Store, primarily those aimed at children. The bug would display pornographic ads that, when clicked on, would instruct victims to download more malicious software in an attempt to steal personal data.[16][17] It's estimated that between 3 and 7 million users may have been infected.[18]

In 2019, researchers at Check Point found a security breach in Xiaomi phone apps.[19] The security flaw was reported preinstalled.[20]

Over the years many employees who worked at Check Point have left to start their own software companies. These include Shlomo Kramer, who started Imperva; Nir Zuk, who founded Palo Alto Networks; Ruvi Kitov and Reuven Harrison of Tufin; Yonadav Leitersdorf, who founded Indeni; and Avi Shua, who founded Orca Security.

In December 2024, Gil Shwed moved to become Executive Chairman of the Board of Check Point. Nadav Zafrir joined Check Point as the new Chief Executive Officer.[21]

Acquisitions

[edit]

2004: Zone Labs (Endpoint Security)[22]

2009: Nokia Security (Enterprise Network Security)[23]

2015: Hyperwise (Threat Prevention)[24]

2018: Dome 9 (Cloud Security Posture)[25]

2021: Avanan (Cloud Email Security)[26]

2023: Perimeter 81 (SASE/SSE Platform)[27]

2023: Atmosec (Software as a Service platform)[28]

2024: Cyberint (External Risk Management)[29]

2025: Veriti (Threat Management)[30]

2025: Lakera (AI Cybersecurity)[31]

Products

[edit]

Quantum Force Firewalls : Quantum is a portfolio of high-performance firewalls to secure enterprises of all sizes and in all enterprises. Check Point Quantum Remote Access VPN is an enterprise-grade solution that provides secure access to a host organization’s assets. It provides businesses and organizations with unyielding security, a comprehensive approach, and best-in-class features.[32]

Check Point’s Quantum Force firewalls serve as intelligent enforcement points, capable of blocking malicious traffic. When threats are identified, Check Point’s dynamic policy engine enables automatic response through Check Point’s AI Security Management.[33]

Harmony Email & Collaboration: Harmony is a unified cloud security platform combining firewall-as-a-service (FWaaS), secure web gateway, zero-trust network access (ZTNA), SaaS protection, and SD-WAN. The platform, powered by Check Point’s ThreatCloud AI, boasts a 99% threat detection rate and AI-driven security capabilities to proactively block malware, phishing, and anomalous behaviour.[34]

The hybrid security architecture, integrating on-device and cloud-based protections, promises 10x faster secure access, high-performance connectivity, and deep visibility into SaaS applications.[34][35]

CloudGuard: With a unique prevention-first security approach, Check Point CloudGuard allows organizations to expand in the cloud with confidence by seamlessly embedding security guardrails at development to reduce complexity, automatically detect and stop threats, block attacks, and secure connectivity across applications, networks, and workloads. Check Point CloudGuard protects at the highest levels of security, visibility and trust to ensure businesses can innovate and grow in the cloud at scale.[36]

Check Point CloudGuard Network Security provides 100% evasion protection, blocking all TCP, IP, and HTTP-based evasions, including network segmentation techniques, fragmentation manipulations, deceptive transfer encoding, padding, and header modifications.[37]

Check Point CloudGuard WAF provides precise threat prevention using contextual AI to protect applications against known and unknown threats. It does this without relying on signatures and continuously learning from vast threat data to block sophisticated attacks, including zero-day exploits like Log4j and MOVEit.[36]

A partnership between Check Point and cloud security provider Wiz, announced in February 2025, replaces CloudGuard CNAPP with Wiz’s offering inside the CloudGuard suite. According to the company, this combined setup delivers comprehensive protection across hybrid mesh environments.[38]

Infinity External Risk Management: Check Point Infinity External Risk Management is a solution that protects against threats like credential theft, fraud, and brand impersonation. The platform has been bolstered by the recent acquisition of Veriti to integrate their threat management exposure capabilities into the platform. The combined platform enables seamless integration with an ecosystem of more than 70 vendors, synergy with Wiz for cloud exposure insights, as well as safe and context-aware threat remediation.[39][40]

Check Point Research

[edit]

The Check Point research team consists of over 200 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs. Their data sources include open sources, the ThreatCloud AI network and dark web intelligence.[41]

In 2020, the Check Point Research team uncovered multiple vulnerabilities in the TikTok app that exposed users to having personal information scraped from their profile, including their phone number and profile settings. That information could have been used to manipulate users' account details and build a database of TikTok users for malicious activity. The company notified TikTok and a fix was deployed to solve this.[42]

In mid-2025, Check Point Research identified six Windows vulnerabilities, including one rated as critical, which could crash systems, allow attackers to run malicious code, or expose sensitive data. The flaws were privately reported to Microsoft under a responsible disclosure process and Microsoft issued fixes for the vulnerability in August.[43]

Critics

[edit]

As of December 2023, Check Point Software continues to operate in Russia, selling its cybersecurity products in the country. Despite the Russian invasion of Ukraine, the company has maintained its office in Moscow and has faced criticism for its decision to remain active in Russia.[44]

[edit]

SofaWare Technologies was founded in 1999, as a cooperation between Check Point and SofaWare's founders, Adi Ruppin and Etay Bogner, with the purpose of extending Check Point from the enterprise market to the small business, consumer and branch office market. SofaWare's co-founder Adi Ruppin said that his company wanted to make the technology simple to use and affordable, and to lift the burden of security management from end users while adding some features.[45] In 2001 SofaWare began selling firewall appliances under the SofaWare S-Box brand;[46] in 2002 the company started selling the Safe@Office and Safe@Home line of security appliances, under the Check Point brand.[45] By the fourth quarter of 2002 sales of SofaWare's Safe@Office firewall/VPN appliances had increased greatly, and SofaWare held the #1 revenue position in the worldwide firewall/VPN sub-$490 appliance market, with a 38% revenue market share.[47]

Relations between Check Point and the SofaWare founders went sour after the company acquisition in 2002. In 2004 Etay Bogner, co-founder of SofaWare, sought court approval to file a shareholder derivative suit, claiming Check Point was not transferring funds to SofaWare as required for its use of SofaWare's products and technology. His derivative suit was ultimately successful, and Check Point was ordered to pay SofaWare 13 million shekels for breach of contract. In 2006 the Tel Aviv District Court Judge ruled that Bogner SofaWare could sue Check Point by proxy for $5.1 million in alleged damage to SofaWare.[48] Bogner claimed that Check Point, which owned 60% of Sofaware, had behaved belligerently, and withheld money due for use of SofaWare technology and products[48] Check Point appealed the ruling, but lost.[49]

In 2009 the Israeli Supreme Court ruled that a group of founders of SofaWare, which includes Bogner, had veto power over any decision of SofaWare. The court ruled that the three founders could exercise their veto power only as a group and by majority rule.

In 2011 Check Point settled all litigation relating to SofaWare. As part of the settlement it acquired the SofaWare shares held by Bogner and Ruppin, and began a process of acquiring the remaining shares, resulting in SofaWare becoming a wholly owned subsidiary.[50]

See also

[edit]

References

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia

Software Technologies Ltd. is an Israeli specializing in cybersecurity software, hardware, and services for enterprises and governments.
Founded in 1993 in , , by , , and Marius Nacht, the company pioneered the first stateful inspection firewall technology with its FireWall-1 product, revolutionizing by inspecting packets in rather than individually.
Headquartered in , operates globally, serving over 100,000 organizations across more than 80 countries with solutions encompassing , endpoint protection, cloud , and threat powered by AI.
The company reported total revenues of $2.565 billion for 2024, reflecting a 6% year-over-year increase, driven by demand for its Infinity architecture integrating prevention-first across hybrid environments.
maintains a leadership position in the industry, consistently earning top rankings in independent tests for and prevention efficacy, such as blocking 99.9% of in benchmarks, while its research arm contributes to global threat .

Overview

Founding and Core Mission

Check Point Software Technologies Ltd. was founded in July 1993 in , , by , Marius Nacht, and . Shwed, who became the company's first CEO, conceived the core technology of stateful packet inspection while working on early challenges, addressing the limitations of existing packet filtering methods that lacked context awareness for network traffic. The trio's venture capitalized on 's burgeoning tech ecosystem, with initial funding limited to approximately $150,000 from personal resources and early investors, reflecting a bootstrapped start amid rising demand for enterprise-grade network protection as internet adoption surged globally. The company's inception stemmed from a recognition of vulnerabilities in nascent , where traditional perimeter defenses failed against sophisticated ; Shwed's enabled firewalls to track connection states, improving and detection without excessive overhead. This led to the launch of FireWall-1, the first commercially viable stateful inspection-based firewall, which set industry standards by integrating security into network gateways rather than relying on host-level measures alone. Check Point's core mission, articulated consistently since founding, centers on securing digital operations by delivering prevention-focused cybersecurity architectures that protect organizations' internet-enabled business activities at the highest efficacy levels. This entails pioneering unified platforms that consolidate threat intelligence, policy enforcement, and adaptive defenses against evolving cyber risks, prioritizing architectural simplicity to reduce complexity in multi-vector environments. Over three decades, this purpose has driven innovations from firewalls to AI-enhanced prevention, emphasizing empirical threat data over reactive patching to enable secure scalability for enterprises worldwide.

Leadership and Corporate Governance

Check Point Software Technologies Ltd. was founded in 1993 by Gil Shwed, Shlomo Kramer, and Marius Nacht, with Shwed serving as the initial CEO and credited as the inventor of the modern computer firewall. Shwed led the company for over three decades until December 16, 2024, when he transitioned to the role of Executive Chairman of the Board of Directors to focus on long-term strategy and innovation. On the same date, Nadav Zafrir was appointed Chief Executive Officer and added to the Board, bringing expertise from co-founding the cybersecurity venture firm Team8 and prior service as a Brigadier General commanding Israel's Unit 8200 signals intelligence unit. The executive team under Zafrir includes key roles such as Itai Greenberg, who joined in 2010 and oversees global sales; Roei Golan, appointed in 2021 with prior experience at EY; and Jonathan Zanger, formerly CTO at Trigo and a alumnus. Other senior leaders encompass and Head of R&D Nataly Kremer, Chief Services Officer Sharon Schusheim, and Brett Theiss, reflecting a blend of internal long-termers and external hires with backgrounds in , defense, and . The comprises Shwed as Executive Chairman, Zafrir as a director, and independent members including Ray Rothrock (chair of the ) and Jerry Ungerman. As an Israeli-incorporated company listed on , Check Point qualifies as a foreign private issuer, which permits flexibility in such as not requiring a majority of independent directors but mandates compliance with NASDAQ listing standards and Israeli Companies Law. Corporate governance is guided by Board-adopted principles emphasizing ethical conduct, director independence in oversight, and , with dedicated committees including the (focused on financial reporting and internal controls), Nominating and Sustainability Committee, and others addressing compensation and . These structures support , with the Board reviewing executive performance annually and maintaining policies against conflicts of interest.

Global Operations and Market Leadership

Check Point Software Technologies maintains its primary headquarters in , , at 5 Shlomo Kaplan Street, and a key U.S. office in , at 100 Oracle Parkway, Suite 800. The company owns its Tel Aviv facility and leases office spaces in various global locations. It operates subsidiaries including Check Point Software Technologies (Canada) Inc. and Check Point Software Technologies GmbH in , supporting its presence across the , , the , , and . As of December 31, 2024, Check Point employed 6,669 people worldwide. Revenue distribution reflects its international footprint, with approximately 50% generated from , the , and Africa, 40% from the , and 10% from . The firm serves over 100,000 businesses and millions of users globally, delivering cybersecurity solutions to enterprises, service providers, and governments. Check Point holds market leadership in , particularly firewalls, as evidenced by its designation as a Leader in the 2025 IDC MarketScape for Worldwide Enterprise Hybrid Firewalls, amid a $12.3 billion firewall market in 2024. It was also positioned as a Leader in Gartner's 2025 for Hybrid Mesh Firewalls and recognized as the sole Outperformer in GigaOm's enterprise evaluation. The company's Infinity Platform achieves a reported 99.8% prevention , underpinning its competitive edge.

Historical Development

Inception and Early Innovations (1993–1996)

Check Point Software Technologies was founded in in , , by , Marius Nacht, and . Shwed, aged 25 at the time, conceived the company's core technology—stateful inspection—addressing limitations in existing packet-filtering approaches by tracking the context and state of network connections rather than inspecting packets in isolation. This innovation emerged amid the rapid growth of internet connectivity, where traditional security methods proved inadequate against evolving threats. In 1994, Check Point released FireWall-1 version 1.0, the industry's first commercial stateful inspection firewall, which integrated inspection at the while maintaining high performance through kernel-level processing. The technology enabled granular control over traffic by maintaining a state table of active connections, allowing legitimate packets to pass efficiently while blocking unauthorized ones based on session history, a significant advancement over stateless filters that treated each packet independently. FireWall-1 version 2.0 followed in 1995, introducing enhancements such as improved management interfaces and support for additional protocols, further solidifying its position as a benchmark for enterprise . By 1996, Check Point had refined stateful inspection into a patented framework that became the for firewall efficacy, emphasizing without compromising network speed. These early developments positioned the company to capitalize on the burgeoning demand for robust perimeter defenses as corporate networks expanded.

Initial Public Offering and Expansion (1996–2000)

In June 1996, Check Point Software Technologies Ltd. conducted its (IPO) on the stock exchange under the CHKP, raising $67 million at an initial share price of $14. This capital infusion enabled accelerated , product diversification, and international following its recognition as the global firewall market leader with 40% share by IDC earlier that year. Post-IPO, Check Point expanded its product portfolio beyond core firewall solutions, introducing software in 1997 to facilitate centralized security administration for enterprise customers. The company also launched VPN-1 that year, providing secure remote access capabilities via virtual private networks, which addressed growing demand for encrypted connectivity amid proliferation. Geographically, Check Point established a U.S. in , and opened additional offices in to support sales and operations in North American and European markets. Financial performance reflected robust expansion, with revenues growing from approximately $38.7 million in net income implications of early scaling to $141.9 million in total revenues by , $219.6 million in 1999, and $425.3 million in , driven by increased adoption of its stateful technology and OEM partnerships. A pivotal partnership with integrated Check Point's software into Nokia's appliances, enhancing hardware-software bundling and distribution reach. These developments solidified Check Point's position in the burgeoning cybersecurity sector during the late 1990s dot-com boom.

Acquisition-Driven Growth (2000–2010)

During the first decade of the , Check Point Software Technologies shifted from organic in firewall technology to an acquisition-led expansion strategy, aiming to broaden its capabilities in , data protection, intrusion detection, and hardware appliances. This approach addressed emerging threats like mobile data leakage and vulnerabilities, while integrating complementary technologies into its unified security architecture. By 2010, these moves had diversified Check Point's offerings, positioning it as a provider of comprehensive threat solutions rather than a firewall specialist alone. In December 2003, Check Point acquired MetaInfo, though details on its integration into core products remain limited; subsequent deals built on this momentum. The pivotal 2004 acquisition of Zone Labs Inc., developer of the popular personal firewall, for approximately $114 million in cash plus 5.3 million shares, strengthened for consumer and enterprise markets, adding behavioral analysis and personal VPN features to Check Point's portfolio. Key expansions in data and followed in 2006 with the acquisition of Protect Data Mobile, a Swedish firm specializing in and secure data deletion for PDAs and laptops, valued at around €425 million (approximately $540 million at the time), which enhanced Check Point's offerings for protecting sensitive information on portable devices amid rising mobile workforce risks. In , Check Point completed the $20 million purchase of NFR Security, a U.S.-based provider of real-time network intrusion prevention systems using pattern-matching and , bolstering defenses against sophisticated network attacks and integrating into Check Point's intrusion prevention software (IPS) blades. By 2009, amid economic recovery, Check Point acquired Nokia's IP security appliance business for $161 million, gaining hardware platforms and a customer base exceeding 10,000 deployments, which allowed seamless migration to Check Point software while expanding into integrated security gateways. That year also saw the purchase of Communications' application control database, incorporating visibility and controls for over 50,000 widgets and 4,500+ internet applications to combat evolving and SaaS threats. The decade closed with the June 2010 acquisition of Liquid Machines, a prevention (DLP) specialist, for an undisclosed sum, adding policy-based and content-aware protection for endpoints and networks, further unifying Check Point's stack. These acquisitions, totaling over a in the period, drove product innovation through technology assimilation rather than greenfield development, with integrated "software blades" enabling modular deployments that appealed to enterprises seeking scalable, single-vendor solutions. Despite integration challenges and market competition, this strategy correlated with sustained revenue growth, from $506 million in 2000 to $1.043 billion by 2010, reflecting broader adoption of layered security paradigms.

Contemporary Advances and AI Focus (2010–2025)

In 2010, Check Point introduced ThreatCloud, a collaborative, cloud-based intelligence network designed to aggregate global threat data for real-time updates and enhanced prevention capabilities across its security gateways. This marked an early pivot toward scalable, intelligence-driven defenses amid rising cloud adoption and sophisticated attacks. By 2015, the acquisition of Hyperwise bolstered CPU-level threat prevention through advanced behavioral analytics and , enabling proactive detection of zero-day exploits without performance degradation. The launch of the architecture in 2017 consolidated Check Point's portfolio into a unified platform spanning networks, cloud, mobile, and endpoints, emphasizing prevention-first strategies with integrated threat intelligence sharing. This evolution addressed fragmented by incorporating modular Software Blades for , while laying groundwork for AI enhancements in subsequent years. Acquisitions like Avanan in 2021 extended cloud email and SaaS protections via API-based scanning and . From 2023 onward, Check Point intensified AI integration, debuting Harmony SaaS in March 2024 as an AI-powered solution for preventing threats in SaaS environments through continuous and automated policy enforcement. The Infinity Platform evolved to include AI-driven features like contextual threat prevention and autonomous zero-trust capabilities, recognized by Miercom in April 2025 as the top-ranked AI-powered cybersecurity platform for superior efficacy in blocking advanced attacks. In 2025, acquisitions such as Veriti for AI and Lakera for adversarial AI defenses further embedded into external threat hunting and application protection, while new appliances delivered 4x faster AI-accelerated prevention at network edges. These advances prioritized empirical over reactive signatures, yielding measurable reductions in breach windows as validated by independent benchmarks.

Products and Technologies

Network and Firewall Solutions

Check Point's foundational contribution to lies in pioneering stateful inspection technology with the 1993 release of FireWall-1, the industry's first firewall to track active connection states for context-aware filtering, surpassing stateless packet inspection by analyzing packet sequences and session data at the network layer. This approach maintains state tables to validate traffic legitimacy, enabling enforcement of security policies based on full communication history rather than isolated packets. The company's modern network and firewall solutions center on the Quantum series of AI-powered next-generation firewalls (NGFWs), which provide scalable protection up to 1 Tbps throughput with 99.999% resiliency via intelligent clustering for enterprise data centers, branches, and hyperscale environments. These gateways integrate over 50 AI engines for real-time threat prevention, achieving a 99.9% block rate against zero-day attacks, alongside defenses for IoT vulnerabilities, DDoS floods, and sophisticated exploits through cloud-delivered intelligence. Quantum NGFWs support comprehensive connectivity features including remote access VPN, (SASE), and (SD-WAN), all managed via a unified console that enforces consistent policies across users, applications, and hybrid cloud infrastructures. Performance metrics include up to 800 Gbps firewalling, sub-3μs latency, and 75 Gbps Layer 1-7 threat prevention, distinguishing them from traditional firewalls by emphasizing proactive AI-driven hyperscalability over reactive signature-based detection. Core capabilities encompass multilayered threat prevention with intrusion prevention systems (IPS), sandboxing, anti-malware, and encrypted traffic inspection, complemented by identity-based controls using identity and access management (IAM) and (RBAC) to align with zero trust principles. Centralized security management offers unified visibility and across on-premises, , and remote deployments, reducing operational complexity while independent benchmarks confirm superior efficacy, such as a 99.7% overall block rate compared to competitors' 72.7%. For small to medium-sized businesses, the Quantum Spark appliances deliver simplified NGFW functionality with automatic updates, unified access policies covering firewall rules, application control, and filtering, ensuring accessible yet robust perimeter defense without extensive expertise.

Endpoint and Mobile Security

Check Point's endpoint security solutions center on Endpoint, a unified platform that integrates endpoint (EPP), endpoint detection and response (EDR), and extended detection and response (XDR) capabilities into a single agent to safeguard devices against advanced s. This solution supports diverse environments including Windows, macOS, , servers, virtual desktop infrastructure (VDI), browsers, and mobile devices, leveraging Check Point's ThreatCloud AI network with over 60 AI engines for real-time zero-day prevention. Key protections encompass and blocking, zero-phishing defenses, , advanced data loss prevention (DLP) with full , and automated vulnerability assessment paired with patch management, as enhanced in updates announced on May 11, 2023. Endpoint also monitors generative AI tool usage for compliance risks and facilitates rapid incident resolution through automated responses, addressing a reported 38% year-over-year increase in cyberattacks targeting remote workforces. For mobile-specific security, Check Point offers Harmony Mobile, a mobile threat defense (MTD) solution that secures corporate data on employee devices by defending against threats across applications, files, networks, and operating systems without compromising or . It blocks malicious app and file downloads, prevents man-in-the-middle network attacks via on-device controls, detects OS vulnerabilities (including CVEs), jailbreaking or rooting attempts, and via SMS or other vectors, with version 4.0 released on May 19, 2022, introducing industry-leading malicious file protection capabilities. Harmony Mobile integrates seamlessly with Harmony Endpoint and broader Harmony SASE for unified management, enabling scalable oversight of mobile workforces amid rising threats like and advanced persistent threats. These offerings evolved from earlier products like SmartEndpoint, which reaches end-of-support on December 31, 2025, with migration paths to Harmony Endpoint's web management console for continued functionality. Both endpoint and mobile solutions emphasize prevention over detection, incorporating Check Point's Infinity Architecture for consolidated policy enforcement and reduced complexity in hybrid work environments. Independent evaluations, such as those highlighting its automated EDR for breach minimization, underscore its effectiveness against exploits and sophisticated .

Cloud and Data Center Protections

Check Point Software Technologies delivers cloud security through its CloudGuard platform, a comprehensive solution designed to prevent threats and manage risks across multi-cloud, hybrid, and environments. CloudGuard functions as a prevention-first Cloud Native Application Protection Platform (CNAPP), incorporating AI-powered threat detection to secure applications from code to cloud deployment, while addressing misconfigurations, known threats, and zero-day attacks. It supports unified management of cloud network security, including firewalls that achieved a 99.7% block rate in Miercom benchmarks and a 99.8% catch rate in CyberRatings evaluations. The platform protects over 821 million cloud assets daily and is utilized by 50% of the top 50 companies, yielding an 84% reduction in risks and a 169% according to Forrester analysis. For protections, Check Point employs Quantum Security Gateways, such as the Quantum 26000, 28000, and the 28600 model, which is the fastest 1U gateway available. These gateways integrate SandBlast Network for advanced prevention against fifth-generation attacks, delivering up to 1.5 Tbps in hyperscale and 30 Gbps of prevention per unit. Features include telco-grade reliability, 100% SSD storage, high density with modular expansion to 16 x 100 GbE interfaces, and 2.5 times greater power efficiency compared to competitors. They enable zero-touch provisioning and unified policy management across hybrid cloud setups, ensuring consistent enforcement for workloads transitioning to or integrated with public clouds. CloudGuard and Quantum solutions interoperate within Check Point's Infinity architecture to bridge cloud and data center defenses, with recent enhancements including a 100% block rate for cloud firewalls in the Q1 2025 CyberRatings test and recognition in the 2025 Market Guide for Cloud Web Application and API Protection. This integration facilitates automated , compliance monitoring, and risk prioritization in environments combining on-premises data centers with AWS, Azure, and Cloud infrastructures.

AI-Integrated Management Platforms

Check Point's Infinity Platform serves as the core AI-integrated management framework, providing unified security operations across network, endpoint, cloud, and mobile environments through cloud-delivered architecture. It offers comprehensive application security, including automated policy enforcement to secure CI/CD pipelines and over 10,000 applications, SaaS Security Posture Management via Harmony SaaS, cloud application protection through CloudGuard with zero-configuration application security and AI-powered WAFaaS, Application Control for identity-based app security, and workspace security for SaaS applications. Launched as an evolution of earlier management systems like SmartConsole, it incorporates for real-time threat intelligence and , enabling centralized policy enforcement and visibility for hybrid infrastructures. The platform's AI capabilities aim to simplify operations by reducing manual configurations and integrating to anticipate vulnerabilities. In February 2024, Check Point introduced AI Copilot, a generative AI tool embedded within the platform to automate administrative tasks such as policy optimization and via queries. This copilot functions as both an analytical assistant, generating proactive recommendations based on data, and an engine for complex workflows, thereby enhancing without requiring deep expertise in rule syntax. Independent evaluations, including a Miercom benchmark in April 2025, rated as the top AI-powered cybersecurity platform for its superior prevention efficacy and unified management integration compared to competitors. Further advancements occurred in February 2025 with the release of two AI management bundles tailored for hybrid environments, focusing on enhanced visibility, automated compliance checks, and risk prioritization through AI-driven . These bundles leverage Infinity's AI to vast datasets from gateways, correlating events across silos to reduce mean time to resolution for incidents. Additionally, the platform's AI-enabled handles repetitive tasks like log analysis and , scaling prevention mechanisms while minimizing false positives via models. The Platform also integrates with external AI tools via features like the MCP Server, introduced in July 2025, which facilitates secure data exchange between generative AI models and Check Point's infrastructure for customized exposure . This modular approach allows enterprises to extend AI capabilities without compromising core , though it requires careful configuration to mitigate risks from third-party AI integrations. Overall, these elements position Infinity as a consolidated layer that prioritizes prevention over reaction, supported by Check Point's proprietary feeds.

Research and Innovation

Check Point Research Division

The Check Point Research Division, also known as Check Point Research (CPR), serves as the cybersecurity intelligence arm of Check Point Software Technologies, delivering threat intelligence derived from analysis of global cyber attack data collected through the company's ThreatCloud network. Comprising over 200 analysts, malware reverse engineers, and researchers, the division employs advanced techniques including machine learning modules for anomaly detection, reverse engineering of malicious code, and proactive campaign hunting to identify emerging threats. This team collaborates with external security vendors, law enforcement agencies, and computer emergency response teams (CERTs) to share findings and enhance collective defenses. The division's primary mission focuses on dissecting cybercriminal operations, vulnerabilities, and to inform product updates and protect Check Point's customer base, which spans over organizations worldwide. It leverages data from billions of daily security events processed by ThreatCloud to produce actionable intelligence, including monthly threat bulletins, quarterly cyber attack trend reports, and annual security reports that quantify attack volumes—such as documenting a 75% surge in global cyber attacks in Q3 , with manufacturing sectors facing elevated risks. CPR's outputs emphasize empirical metrics, like average weekly attacks per organization (e.g., 3,828 in the / sector during Q3 ), to highlight causal patterns in threat evolution rather than unsubstantiated narratives. Key contributions include pioneering disclosures of sophisticated threats, such as the infrastructure supporting the Cerber ransomware in 2016 and the Nuclear Exploit Kit, which targeted vulnerabilities in browsers and plugins. More recently, CPR uncovered the YouTube Ghost Network in October 2025, a coordinated malware distribution scheme using hijacked YouTube accounts to propagate infostealers and remote access trojans. The division has also exposed ransomware operations like LockBit variants affecting dozens of organizations and vulnerabilities in systems such as IIS servers via exposed ASP.NET machine keys, enabling unauthorized access. These findings have driven mitigations, including patches and indicators of compromise shared publicly, contributing to the broader cybersecurity ecosystem without reliance on centralized academic or media interpretations prone to institutional biases. Through regular publications and podcasts, CPR fosters industry-wide awareness of causal threat dynamics, such as the role of open-source malware in lowering barriers for novice actors (e.g., Yurei group) and the intensification of AI-related risks amid a 46% surge in 2025. Its work prioritizes verifiable, data-driven insights over speculative trends, enabling organizations to address root causes like exploited supply chains and unpatched endpoints.

Threat Intelligence Outputs

Check Point's threat intelligence outputs encompass a range of publications and feeds derived from its global sensor network and research efforts, aimed at disseminating insights on emerging cyber threats. These include weekly Threat Intelligence Bulletins that summarize recent discoveries, such as the October 20, 2025, edition covering global cyber attack trends and top attacks. Annual reports provide broader analyses, exemplified by the 2025 Cyber Report, which details prevalent threats like , infostealers, and vulnerabilities based on from over 1 billion daily security events. The company's AI Security Report, released in April 2025, highlights AI-driven cyber threats, including AI-assisted detection evasion and generative AI for , drawing from empirical observations of attack patterns to recommend defensive strategies. Specific intelligence reports address targeted campaigns, such as the October 2025 disclosure of a large-scale malware distribution network involving stealthy operations across multiple regions. These outputs prioritize actionable data over narrative framing, leveraging Check Point's proprietary rather than unverified third-party claims. Central to these outputs is the ThreatCloud service, a collaborative platform aggregating data from thousands of sensors worldwide to deliver real-time feeds, including indicators of compromise (IOCs) and behavioral signatures updated dynamically. Infinity ThreatCloud AI extends this by integrating over 50 AI technologies for novel detection, feeding prevention engines with insights from on evasion tactics. Outputs are disseminated via customer portals, APIs, and public research portals, enabling organizations to prioritize feeds through customizable collections that filter and aggregate IOCs for integration into security operations. Check Point Research also publishes ad-hoc alerts on high-impact threats, such as September 2025 identifications of LockBit ransomware variants affecting multiple victims, supported by forensic analysis of attack artifacts. This output model emphasizes empirical validation through sensor-derived evidence, contrasting with less rigorous industry reports that may amplify unconfirmed incidents for visibility. While Check Point's data reflects its product ecosystem, cross-verification with independent scans underscores the reliability of shared IOCs in disrupting campaigns.

Benchmarks and Industry Contributions

Check Point's products have demonstrated superior performance in independent benchmarks evaluating threat prevention efficacy. In Miercom's 2025 Next-Generation Firewall Benchmark, Check Point achieved the highest scores across all categories, blocking 99.9% of and 99.7% of attacks, securing top ratings for the third consecutive year. Similarly, in the 2024 Evaluations for enterprise , Check Point's Infinity Platform recorded a 100% detection rate against tested threats without alerts. For gateways, independent testing reported 100% prevention and 99.8% block rate for new variants. Analyst evaluations position Check Point as a leader in key categories. Gartner named it a Leader in the 2025 Magic Quadrant for Hybrid Mesh Firewalls, citing strengths in AI-powered prevention and unified management. In the Q3 2025 Evaluation for Zero Trust Platforms by an independent firm, Check Point was recognized for comprehensive platform capabilities. Peer reviews on Gartner Peer Insights average 4.5 out of 5 stars from over 2,100 users for network firewalls, highlighting reliability and feature depth. Check Point has contributed to cybersecurity standards through foundational innovations and shared intelligence. The company developed stateful packet inspection in 1993, a core technology enabling context-aware firewalling that underpins modern architectures. Its division produces annual threat reports, such as the 2025 Cyber Security Report, analyzing global attack trends including surges and cloud exploits, which inform industry defenses and policy. Recent advancements include AI engines for zero-day threat detection, achieving 99.8% prevention rates in controlled tests, advancing proactive paradigms. These outputs, disseminated via public reports and partnerships, enhance collective threat visibility without reliance on proprietary data silos.

Business Strategy

Strategic Acquisitions

Check Point has executed a series of strategic acquisitions to bolster its cybersecurity portfolio, focusing on areas such as cloud security, email and SaaS protection, (SASE), threat intelligence, and AI-driven defenses. These moves aim to integrate innovative technologies into its architecture, addressing evolving threats like vulnerabilities, cloud migrations, and generative AI risks. By acquiring specialized firms, often Israeli startups, Check Point has expanded beyond traditional firewalls into unified platforms for hybrid environments. In 2009, Check Point acquired Nokia's security appliance business, enhancing its hardware capabilities for gateways, and FaceTime Communications' application database, which added controls for over 4,500 internet applications and 50,000 widgets. These early deals strengthened application-layer visibility and prevention. In October 2018, the company purchased Dome9 for cloud security, enabling safer management of cloud deployments during transitions. Subsequent acquisitions targeted and SaaS threats. In August 2021, Check Point acquired Avanan, a email security firm specializing in API-based scanning for Office 365 and other platforms, reported at around $300 million; this integrated post-delivery protection against and into Check Point's offerings. In February 2022, it bought Spectral Cyber Technologies, focusing on developer-centric secrets detection to secure code from insider leaks. April 2017's acquisition of ForceNock added and protection using and behavioral . To address SASE and zero-trust needs, Check Point announced the $490 million acquisition of in August 2023, completing it in September, which provided secure network access for remote users, sites, and clouds, accelerating unified SASE deployment. In August 2024, it acquired Cyberint Technologies for enhanced threat intelligence and external management, integrating automated SOC capabilities. These deals supported Check Point's shift toward comprehensive, prevention-first platforms amid rising hybrid work threats. Recent acquisitions emphasize AI and exposure management. In May 2025, Check Point acquired Veriti Security for $100 million, an AI-driven platform for vulnerability assessment and remediation, reducing cyber attack surfaces through continuous exploitability scoring. In September 2025, it purchased Lakera for $300 million, establishing an AI-native security platform to protect AI model lifecycles from prompt injection and data poisoning, with Lakera's Zurich team forming Check Point's global AI R&D center. These moves position Check Point to counter AI-specific risks in enterprise environments.

Partnerships and Ecosystem Building

Check Point maintains an extensive partner ecosystem to enhance its cybersecurity offerings through integrations and collaborative solutions. The company's Program, revamped in January 2024, simplifies tiering from six levels to four—based on annualized bookings and partner training completion—to foster growth and specialization. This structure provides transparent pricing, cumulative discounts, incentives, and free certifications, resulting in a reported 100% increase in deal registrations and protections for renewals via an incumbent partner initiative. The program extends to managed service providers (MSPs) and MSSPs, with a dedicated MSSP Portal launched on September 3, 2024, streamlining service delivery, billing, and support without deployment risks. In June 2025, Check Point expanded its portfolio availability on the marketplace, enabling global MSP partners to access AI-powered, cloud-delivered suites for broader deployment. Partner momentum has accelerated, with significant growth in engagements following the program's introduction, as evidenced by increased bookings and ecosystem participation by March 2025. Technology alliances form a core of ecosystem building, uniting Check Point with leading vendors for cohesive security architectures. CloudGuard solutions integrate natively with (AWS) for infrastructure-as-a-service protections, while partnerships with Google Cloud and enable unified across hybrid environments. A deepened with Wiz, announced September 29, 2025, combines Check Point's cloud with Wiz's cloud-native application protection platform (CNAPP) for integrated threat prevention. These collaborations, part of the broader Technology Partner Alliance, allow third-party developers to build on Check Point's Infinity platform via open APIs and joint go-to-market strategies, expanding solution interoperability.

Financial Metrics and Performance

Check Point Software Technologies reported total revenues of $2.565 billion for fiscal year 2024, marking a 6% increase from $2.414 billion in 2023. For the second quarter of 2025, revenues reached $665 million, reflecting a 6% year-over-year rise, with security subscriptions contributing $533 million (up 4%) and products and licenses at $132 million (up 12%). Trailing twelve-month revenues as of June 30, 2025, stood at $2.642 billion, a 6.27% increase from the prior period. The company maintained strong profitability, with a gross margin of 88.01% on a trailing twelve-month basis, an operating margin of 33%, and a net margin of 32.48%. In Q2 2025, net income was $202.8 million, up 2.7% year-over-year, though the profit margin dipped slightly to 31% from 32%. Earnings per share for fiscal 2024 was $7.65, an improvement from $7.19 in 2023. Check Point's return on assets stood at 9.67% over the trailing twelve months.
MetricFiscal 2024 ValueYear-over-Year Change
Total Revenues$2.565B+6%
Calculated Billings$2.658B+9%
EPS$7.65+6.4%
(TTM)88.01%N/A
Guidance for fiscal 2025 projects EPS between $9.60 and $10.20, with Q3 2025 EPS anticipated at $2.40 to $2.50; third-quarter results were scheduled for release on , 2025. metrics as of late October 2025 included a P/E ratio of 64 and price-to-book of 19.75, indicating a premium relative to and . The shares reached a 52-week high of $234.35 earlier in the period.

Controversies and Challenges

In 1997, Checkpoint Systems, Inc., a provider of physical and loss prevention solutions, demanded that Check Point Software Technologies, Inc. cease using its name, alleging potential consumer in the broader "" industry. Following Check Point's refusal, Checkpoint Systems filed suit in the U.S. District Court for the District of in 1999, claiming under Section 32 of the (15 U.S.C. § 1114) and unfair competition under Section 43(a) (15 U.S.C. § 1125(a)). The plaintiff argued that both companies operated in security-related fields, with similar marks likely to cause among potential customers. After a non-jury trial in 2000, the district court ruled in favor of Check Point Software, finding no likelihood of confusion despite phonetic similarity in the marks. The court applied the multi-factor test from Interpace Corp. v. Lapp, Inc., weighing the weakness of Checkpoint Systems' mark (descriptive and commonly used in security contexts), stark differences in products (physical RFID tags versus network cybersecurity software), distinct sales channels (retail merchandise protection versus enterprise IT procurement), and lack of compelling evidence of actual confusion, such as isolated employee testimonies deemed biased. Sophisticated buyers in Check Point's market further reduced confusion risk. Checkpoint Systems appealed, but the Third Circuit affirmed the decision on October 5, 2001, upholding that the district court properly balanced factors without requiring point-of-sale confusion evidence and rejecting claims of "initial interest" confusion as insufficiently supported. Check Point Software retained its name and continued operations without modification. Beyond trademarks, Check Point Software has defended against numerous suits, often from non-practicing entities asserting broad claims on networking or technologies. Notable cases include Finjan Holdings, Inc. v. Check Point Software Technologies, Inc. (N.D. Cal., filed 2018), which alleged infringement of behavioral analysis patents and settled confidentially in May 2020 with dismissal with prejudice. In Winterspring Digital LLC v. Check Point Software Technologies Ltd. (W.D. Tex., filed May 2023), the claimed infringement of a related to methods used in Check Point's products, with the case ongoing as of 2024. Similarly, Taasera Licensing LLC filed suit in 2022 (E.D. Tex.) over patents on network threat detection, reflecting patterns of litigation common to cybersecurity firms where defendants frequently prevail or settle to avoid protracted costs. These disputes highlight Check Point's exposure to assertions, though outcomes typically favor non-infringement findings or low-value resolutions due to claim invalidity challenges under Alice Corp. v. CLS Bank.

Regulatory Scrutiny and Breach Allegations

In December 2020, Check Point Software Technologies detected unauthorized access to its systems linked to the Orion compromise attributed to Russian state-sponsored actors. The company's internal investigation identified activity between July and December 2020 but found no evidence of access to , , or other sensitive information. Despite this knowledge, Check Point's subsequent SEC filings, including 2021 and 2022 Forms 20-F, retained generic cybersecurity risk disclosures without specifying the intrusion's details, which the U.S. Securities and Exchange Commission (SEC) later deemed materially misleading. On October 22, 2024, the SEC charged Check Point with violating antifraud and disclosure provisions under the and Exchange Act of 1934, resulting in a $995,000 settlement without admitting or denying the findings. Check Point cooperated fully with the inquiry, which stemmed from broader scrutiny of disclosures following the incident affecting multiple firms. This action aligned with the SEC's heightened enforcement on cybersecurity reporting, emphasizing specific rather than boilerplate risk descriptions to avoid misleading investors. In March 2025, "CoreInjection" claimed on BreachForum to have breached Check Point, offering alleged internal —including network access credentials and configuration files—for five bitcoins (approximately $410,000 at the time). Check Point acknowledged a related security incident on March 31, 2025, but described it as an "old, known, and pinpointed event" with limited scope, no of customer environments, and no exfiltration of production or . The company stated it had remediated the issue prior to the claims and found no evidence supporting the hacker's assertions of ongoing access or significant theft, attributing the post to attempted . As of October 2025, no regulatory investigations or confirmed breaches from this allegation have been publicly reported.

Geopolitical and Competitive Criticisms

Check Point Software Technologies, an Israel-based cybersecurity firm, has faced geopolitical criticisms primarily stemming from its close historical ties to the Israeli military and intelligence community. Several key executives and founders, including CEO Gil Shwed, emerged from elite Israeli Defense Forces units such as Unit 8200, which specializes in signals intelligence and cyber operations. This connection has led to accusations that the company's technologies derive from military-developed tools repurposed for commercial use, intertwining its operations with Israeli state security interests. Critics, including activist organizations, argue this facilitates the export of surveillance and offensive cyber capabilities originally honed in conflict zones, though Check Point maintains its products are defensive and compliant with international export regulations. The (BDS) movement has targeted Check Point since at least 2019, citing its Israeli origins and perceived complicity in policies toward as grounds for and boycotts. In its 2018 , the company acknowledged BDS as a , noting instances of increased scrutiny and calls for exclusion from tenders in regions hostile to . BDS-aligned groups, such as the , highlight Check Point's military linkages and global client base—including governments—as enabling Israeli objectives through cyber infrastructure. These campaigns have gained traction in activist circles and some academic settings, though their impact on Check Point's revenue remains limited, with the firm reporting sustained growth in international markets. Sources promoting BDS views often reflect ideological opposition to , potentially exaggerating corporate-military ties without of direct policy influence. Geopolitical tensions have manifested in specific regional backlash, such as in following the October 2023 Hamas- conflict. Turkish media and political figures portrayed Check Point as a symbol of Israeli aggression, leading to public calls for boycotts and scrutiny of its operations amid broader anti-Western sentiment under the Erdogan government. This episode underscores how -linked firms like Check Point become proxies in proxy conflicts, with local media amplifying narratives of complicity despite the company's apolitical stance on product deployment. Founder expressed reservations in July 2023 about establishing the firm in Israel today, citing regulatory hurdles and geopolitical instability as deterrents for startups, reflecting internal acknowledgment of location-based risks. Competitive criticisms of Check Point are less prominent and often anecdotal, focusing on perceived stagnation in relative to U.S.-based rivals like or . Industry analysts have noted Check Point's reliance on legacy firewall technologies amid a shift toward cloud-native and AI-driven , contributing to market share erosion in segments like endpoint detection. However, these views lack formal antitrust actions specific to Check Point; broader cybersecurity sector concerns about consolidation and , raised by U.S. senators in 2023, do not single out the firm. Trademark disputes, such as the 2001-2003 litigation with Checkpoint Systems over naming similarities, centered on unfair competition claims under the but were resolved without findings of predatory practices. Check Point's defenders attribute competitive challenges to execution rather than misconduct, with the company maintaining leadership in unified threat management per evaluations.

References

Add your contribution
Related Hubs
Contribute something
User Avatar
No comments yet.