CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Exact Name of Registrant As Specified in Its Charter)

Total Page:16

File Type:pdf, Size:1020Kb

CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Exact Name of Registrant As Specified in Its Charter) UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F ☐ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 OR ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2020 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to OR ☐ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report Commission file number 000-28584 CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Exact name of Registrant as specified in its charter) ISRAEL (Jurisdiction of incorporation or organization) 5 Shlomo Kaplan Street Tel Aviv 6789159, Israel (Address of principal executive offices) John Slavitt, Esq. General Counsel Check Point Software Technologies, Inc. 959 Skyway Road, Suite 300 San Carlos, CA 94070 U.S.A. Tel: (650) 628-2000 (Name, Telephone, E-mail and/or Facsimile number and Address of Company Contact Person) Securities registered or to be registered pursuant to Section 12(b) of the Act. Title of each class Trading symbol(s) Name of each exchange on which registered Ordinary shares, NIS 0.01 nominal value CHKP NASDAQ Global Select Market Securities registered or to be registered pursuant to Section 12(g) of the Act. None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act. None Indicate the number of outstanding shares of each of the issuer’s classes of capital or common stock as of December 31, 2020. 137,151,930 ordinary shares, nominal value NIS 0.01 per share Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act: Yes ☒ No ☐ If this report is an annual or transition report, indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934: Yes ☐ No ☒ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes ☒ No ☐ Indicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). Yes ☒ No ☐ Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or an emerging growth company. See definition of “large accelerated filer,” “accelerated filer,” and “emerging growth company” in Rule 12b-2 of the Exchange Act. Large Accelerated filer ☒ Accelerated filer ☐ Non-accelerated filer ☐ Emerging growth company ☐ If an emerging growth company that prepares its financial statements in accordance with U.S. GAAP, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards † provided pursuant to Section 13 (a) of the Exchange Act. ☐ The term “new or revised financial accounting standard” refers to any update issued by the Financial Accounting Standards Board to its Accounting Standards Codification after April 5, 2012. Indicate by check mark whether the registrant has filed a report on and attestation to its management’s assessment of the effectiveness of its internal control over financial reporting under Section 404(b) of the Sarbanes-Oxley Act (15 U.S.C. 7262(b)) by the registered public accounting firm that prepared or issued its audit report. ☒ Indicate by check mark which basis of accounting the registrant has used to prepare the financial statements included in this filing: U.S. GAAP ☒ International Financial Reporting Standards as issued Other ☐ by the International Accounting Standards Board ☐ If “Other” has been checked in response to the previous question, indicate by check mark which financial statement item the registrant has elected to follow. Item 17 ☐ Item 18 ☐ If this is an annual report, indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act): Yes ☐ No ☒ Currency of Presentation and Certain Defined Terms In this Annual Report on Form 20-F, or the Annual Report, references to “U.S.” or “United States” are to the United States of America, its territories and possessions; and references to “Israel” are to the State of Israel. References to “$”, “dollar” or “U.S. dollar” are to the legal currency of the United States of America; references to “NIS” or “Israeli shekel” are to the legal currency of Israel and references to “Euro” are to the legal currency of the European Union. Our financial statements are presented in U.S. dollars and are prepared in conformity with accounting principles generally accepted in the United States of America, or U.S. GAAP. All references to “we,” “us,” “our” or “Check Point” shall mean Check Point Software Technologies Ltd., and, unless specifically indicated otherwise or the context indicates otherwise, our consolidated subsidiaries. Forward-Looking Statements In addition to historical fact, this Annual Report contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, or the Securities Act, and Section 21E of the Securities Exchange Act of 1934, as amended, or the Exchange Act. These forward- looking statements are subject to risks and uncertainties, and include information about possible or assumed future results of our business, financial condition, results of operations, liquidity, plans and objectives. In some cases you can identify forward-looking statements by terminology such as “may,” “will,” “could,” “would,” “should,” “expects,” “plans,” “anticipates,” “believes,” “intends,” “estimates,” “predicts,” “potential,” or “continue” or the negative of these terms or other comparable terminology. These forward-looking statements include, but are not limited to, statements concerning the following: • our expectations for our business, trends related to our business and the markets in which we operate and into which we sell products; • the effects of increased competition in our market; • our ability to timely and effectively scale and adapt our existing technology and infrastructure to meet current and future market demands; • the effects on our business of the global COVID-19 pandemic; • our ability to develop or acquire new and more technologically advanced products, and to successfully commercialize these products; • our ability to protect our proprietary technology and intellectual property; • our ability to increase adoption of our products and to maintain or increase our market share; • our ability to maintain our growth; • future amounts and sources of our revenue; • our future costs and expenses; • the adequacy of our capital resources; • our plans to recalibrate the Infinity portfolio of products and our expectations to provide security for all organizations; • our expectations with respect to share repurchases by us and dividend payments by us; • the effects on our business of evolving laws and regulations, including government export or import controls and U.S. tax regulations, and the potential economic effects of “Brexit”; • our ongoing relationships with our current and future customers and channel partners, suppliers, contract manufacturers and distributors; and • our other expectations, beliefs, intentions and strategies. These statements are subject to known and unknown risks, uncertainties and other factors, which are difficult to predict and which may cause our actual results to differ materially and adversely from those implied by the forward-looking statements. Many of these risks, uncertainties and assumptions are described in the risk factors set forth in “Item 3 – Key Information – Risk Factors” and elsewhere in this Annual Report. All forward- looking statements included in this Annual Report are based on information available to us on the date of the filing. While we may elect to update forward-looking statements in the future, we specifically disclaim any obligation to update or revise any of the forward-looking statements after the date of the filing, except as required by applicable law. 2 TABLE OF CONTENTS PART I Item 1. Identity of Directors, Senior Management and Advisers 4 Item 2. Offer Statistics and Expected Timetable 4 Item 3. Key Information 4 Item 4. Information on Check Point 19 Item 4A. Unresolved Staff Comments 31 Item 5. Operating and Financial Review and Prospects 31 Item 6. Directors, Senior Management and Employees 39 Item 7. Major Shareholders and Related Party Transactions 50 Item 8. Financial Information 51 Item 9. The Offer and Listing 51 Item 10. Additional Information 51 Item 11. Quantitative and Qualitative Disclosures about Market Risk 62 Item 12. Description of Securities Other than Equity Securities 63 PART II Item 13. Defaults, Dividend Arrearages and Delinquencies 63 Item 14. Material Modifications to the Rights of Security Holders and Use of Proceeds 63 Item 15. Controls and Procedures 63 Item 16A. Audit Committee Financial Expert 65 Item 16B. Code of Ethics 65 Item 16C. Principal Accountant Fees and Services 65 Item 16D. Exemptions from the Listing Standards for Audit Committees 66 Item 16E. Purchases of Equity Securities by the Issuer and Affiliated Purchasers 66 Item 16F. Change in Registrant’s Certifying Accountant 66 Item 16G. Corporate Governance 66 Item 16H. Mine Safety Disclosure 67 PART III Item 17. Financial Statements 67 Item 18. Financial Statements 67 Item 19. Exhibits 67 3 PART I ITEM 1. IDENTITY OF DIRECTORS, SENIOR MANAGEMENT AND ADVISERS Not applicable.
Recommended publications
  • Check Point Firewall V1.0
    Check Point Firewall Benchmark v1.0 Editor: John Traenkenschuh December 2007 Copyright 2001-2007, The Center for Internet Security (CIS) http://cisecurity.org [email protected] TERMS OF USE AGREEMENT Background. The Center for Internet Security ("CIS") provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (―Products‖) as a public service to Internet users worldwide. Recommendations contained in the Products (―Recommendations‖) result from a consensus-building process that involves many security experts and are generally generic in nature. The Recommendations are intended to provide helpful information to organizations attempting to evaluate or improve the security of their networks, systems, and devices. Proper use of the Recommendations requires careful analysis and adaptation to specific user requirements. The Recommendations are not in any way intended to be a ―quick fix‖ for anyone‘s information security needs. No Representations, Warranties, or Covenants. CIS makes no representations, warranties, or covenants whatsoever as to (i) the positive or negative effect of the Products or the Recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness, or completeness of the Products or the Recommendations. CIS is providing the Products and the Recommendations ―as is‖ and ―as available‖ without representations, warranties, or covenants of any kind. User Agreements. By using the Products and/or the Recommendations, I and/or my organization (―We‖) agree and acknowledge that: 1. No network, system, device, hardware, software, or component can be made fully secure; 2.
    [Show full text]
  • Highlights of This Year's Jewish Book Festival
    Washtenaw Jewish News Presort Standard In this issue… c/o Jewish Federation of Greater Ann Arbor U.S. Postage PAID 2939 Birch Hollow Drive Ann Arbor, MI Ann Arbor, MI 48108 Maimonindes Sukkarnival Environmentalist Permit No. 85 Symposium Photo Raymond to Focus on Album DeYoung Head Trauma Page 4 Page 13 Page 23 November 2012 Cheshvan/Kislev 5773 Volume XXXVII: Number 3 FREE Hasidic superstar Highlights of this year's Jewish Book Festival Matisyahu to Halye Aisner, special to the WJN he Jewish Community Center of Greater This free event will featured authors include Bar- cost for this entertaining event is $5 per person. perform at EMU Ann Arbor’s 25th annual Jewish Book bara Cain, Andrei S. Markovits, Geri Markel, Irene On Friday, November 16, at noon, Aviva Festival will include several programs Miller, Mitchell Rycus, Ivan Sherick, Ken Wasch- Kleinbaum and Aric Mutchnick will lead a cook- Martin Shichtman, special to the WJN T during the two-week event featuring authors berger and Marina von Neumann Whitman. ing demonstration featuring recipes from their n Thursday, November 8, music super- from across the nation and Ann Arbor’s own Also on November 11 a family program with book, Fusion by Nadia. A Quilting of Flavors from star, Matisyahu will perform at Eastern backyard. This year will feature seven Iraq, Israel and America. This event OMichigan University’s Pease Audito- Lunch with the Author events, where will also include lunch with the au- rium. The concert is sponsored by Hillel at EMU, participants will be able to dine with thors.
    [Show full text]
  • Quantum Rugged 1570R Security Gateways
    QUANTUM RUGGED 1570R SECURITY GATEWAYS Secure. Rugged. Simple. Check Point Quantum Rugged appliances ensure industrial sites, manufacturing floors and mobile fleets are connected and secure. The solid-state design of the 1570R operates in temperatures ranging from minus 40° C to 75° C, making it ideal for securing any industrial application — power and manufacturing plants, oil and gas facilities, maritime fleets, building management systems, and more. Connect your field devices to the 1570R via an 8 port LAN switch or Wi-Fi and in turn connect your 1570R to OT management networks via 1 GbE copper or fiber WAN port or a highly available dual SIM LTE modem. The Check Point NGFW in the 1570R ensures the connection is secure. Transportation Oil & Gas Manufacturing Energy Utilities SECURE SCADA AND ICS ENVIRONMENTS RUGGED FORM FACTOR The Check Point Quantum Rugged 1570R Next Generation The rugged solid-state form factor enables the 1570R to Firewall (NGFW) secures Critical Infrastructure and operate in a temperature range of -40C to +75C, making it Industrial Control Systems (ICS) without impacting ideal for deployment in harsh environments. The 1570R is operations. Our NGFWs identify and secure over 70 certified for the industrial specifications IEEE 1613 and IEC standard and proprietary SCADA (Supervisory Control and 61850-3 for heat, vibration, and immunity to Data Acquisition) and ICS protocols. This includes the most electromagnetic interference (EMI). In addition, the 1570R is popular protocols used in Utilities and Energy sectors, certified for maritime operation per IEC-60945 and IACS E10 Manufacturing sectors, Building Management Systems and and complies with DNV-GL-CG-0339.
    [Show full text]
  • Check Point + Vmware SD-WAN by Velocloud | SOLUTION BRIEF
    Check Point + VMware SD-WAN by VeloCloud | SOLUTION BRIEF Check Point + VMware SD-WAN SECURE CLOUD-DELIVERED SD-WAN As more applications move to the cloud, business users increasingly rely on these applications to do their jobs. From virtual meetings to file-sharing to collaboration through tools like Skype, Slack, and Office 365, including voice and video traffic, they require consistent, high-quality bandwidth, all the time. For IT organizations that are managing remote and branch offices, it can be a challenge to accommodate these needs in a way that’s efficient, secure, and cost effective. For branch office users who are consuming more Wide-Area Network (WAN) bandwidth than ever, the user experience is often suboptimal. Traditional WAN architectures weren’t designed to support cloud and SaaS applications. WAN traffic is carried through expensive leased lines that drive up costs or unreliable public Internet lines that frustrate end users. CHECK POINT VMWARE SD-WAN SOLUTION Now there’s a better option. Software-Defined WAN (SD-WAN) enables enterprises to support application growth and simplify branch operations while streamlining access to cloud services and private data centers over both ordinary broadband Internet and private links, regardless of the transport mechanism. SD-WAN is critical for today’s hybrid cloud environments because it brings enterprise-level manageability, performance, and reliability across branch offices. Private links backhauled to the data center can be secured in a hub and spoke model, but the local Internet breakout to the cloud is susceptible to cyber-attacks. Check Point secures these links with the same advanced threat prevention available in Check Point on-premises security gateways.
    [Show full text]
  • Infoblox Partner Solution Brief
    Check Point + Infoblox | Solution Brief CHECK POINT + INFOBLOX: IMPROVE YOUR SECURITY POSTURE OVERVIEW Benefits Malware is constantly evolving, making threat intelligence an essential tool. You need timely, reliable and accurate data to optimize and improve your organization’s security • Respond faster to emerging threats posture. But with so many sources, how do you choose the best security intelligence with advanced threat intelligence feed for you? provided through Infoblox TIDE—a single platform that aggregates threat intelligence from various external and CHECK POINT THREAT INTELLIGENCE PLATFORM internal sources such as the Comprehensive and timely threat intelligence delivered simultaneously to all of your Automated Indicator Sharing (AIS) of enforcement points is essential to prevent attacks before they occur. Check Point the Department of Homeland Security delivers that and more across all your enforcement points. With Check Point (DHS), open source ecosystems and ThreatCloud, all enforcement points in your network, cloud and mobile environments are third-party vendor subscriptions. armed with threat intelligence derived from multiple external feeds, internal research and • Minimize false positives with curated indicators from Check Point customers around the world. threat intelligence feeds provided by Infoblox's Cyber Intelligence Unit. While Check Point ThreatCloud provides the foundation and intelligence, we understand • Receive prioritized threats in that your security infrastructure may include additional products and data sources. context, automatically distributed Therefore, Check Point provides a rich set of APIs to integrate third-party security tools by Check Point’s ThreatCloud as part of the broader security infrastructure. Check Point enables you to build a single, and relevant security products. cohesive security posture while making your security team more efficient and effective.
    [Show full text]
  • Simins V. Zoom Video Communications, Inc
    Case 5:20-cv-02893-VKD Document 1 Filed 04/27/20 Page 1 of 24 1 Eric H. Gibbs (SBN 178658) Andre Mura (SBN 298541) 2 Amanda M. Karl (SBN 301088) Jeffrey Kosbie (SBN 305424) 3 GIBBS LAW GROUP LLP 505 14th Street, Suite 1110 4 Oakland, California 94612 Telephone: (510) 350-9700 5 Fax: (510) 350-9701 6 [email protected] [email protected] 7 [email protected] [email protected] 8 Attorneys for Plaintiff and Proposed Class 9 10 11 UNITED STATES DISTRICT COURT 12 NORTHERN DISTRICT OF CALIFORNIA 13 14 STACEY SIMINS, on behalf of herself and Case No. 5:20-cv-2893 all others similarly situated, 15 CLASS ACTION COMPLAINT AND 16 Plaintiff, DEMAND FOR JURY TRIAL 17 v. 18 ZOOM VIDEO COMMUNICATIONS, 19 INC., 20 Defendant. 21 22 23 24 25 26 27 28 CLASS ACTION COMPLAINT AND DEMAND FOR JURY TRIAL CASE NO. 5:20-cv-2893 Case 5:20-cv-02893-VKD Document 1 Filed 04/27/20 Page 2 of 24 1 Plaintiff, on behalf of herself and all others similarly situated, alleges the following: 2 SUMMARY OF THE CASE 3 1. Zoom provides a video-conferencing service called Zoom Meetings. The video meetings 4 ostensibly allow users to engage in video and audio conversations with only those specified people with 5 whom they have chosen to communicate. Users reasonably expect these conversations to be private and 6 secure, and these expectations are heightened by the very nature of Zoom Meetings, where users can 7 not only be heard, but also seen.
    [Show full text]
  • Security Gateway Appliances R77 Security Target
    Security Gateway Appliances R77 Security Target Version 1.4 November 18, 2013 Prepared by: Metatron Security Services Metatron Security Services Ltd. Security Gateway Appliances R77 Security Target Version 1.4 2 Prologue 11/18/2013 © 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses. Copyright 2013, Check Point Software Technologies Ltd. All Rights Reserved. Security Gateway Appliances R77 Security Target Version 1.4 3 Prologue 11/18/2013 Document Version Control Log Version Date Author Description Version 0.1 July 13, Nir Initial draft. 2009 Naaman Version 0.5 December Nir Post-iVOR updates: removed FAU_SAA.4. Expanded 7, 2009 Naaman description of L2TP support.
    [Show full text]
  • Complimentary Inaugural Report Courtesy Of
    Complimentary Inaugural Report Courtesy of v3 Complimentary Inaugural Report Courtesy of We are excited to provide you with a complimentary copy of the AVANT Research & Analytics 6-12 Report on SD-WAN. As your Trusted Advisor, we aim to empower you with the information and resources you need to support your company’s digital transformation. There has never been a faster pace of change in IT, and the pace is accelerating every year. This 6-12 Report arms you with the most relevant information and insights necessary to assist you in evaluating a migration to SD-WAN over the next six to twelve months. We look forward to supporting your IT needs and business outcomes to help you differentiate and stay ahead of your competition in this fast-paced and ever-changing world. 1 Copyright © 2019 AVANT Communications, Inc. About the Analyst Ken Presti develops the strategic framework and manages the process of leveraging AVANT’s inter- nal data and external data to drive high-value market research designed to help consultants, agents, channel partners, and other members of the Trusted Advisor community more effectively help their business customers understand and evaluate Information Technologies. Ken Presti comes to the table with a wealth of experience in market research, survey development, focus group moderation, interviewing, and content development for the technology industry. His primary area of expertise is focused on go-to-market and channel strategies spanning the industry sectors of networking, cloud, security, and telecom. A former Research Director of IDC’s Network Channels & Alliances service, he has served as a Trust- ed Advisor to several key networking vendors and service providers.
    [Show full text]
  • Cloudguard Network Security for Microsoft Azure Solution Brief
    CloudGuard Network Security for Microsoft Azure Comprehensive Security Protections for Azure and Hybrid Clouds Hybrid Cloud Security Overview The wide adoption of cloud architectures is being driven by the desire to transform businesses for greater efficiency, speed, agility, and cost controls. While cloud solutions offer many advantages over traditional IT infrastructure, legacy security approaches do not address the dynamic nature of cloud environments, and can expose organizations to a new set of security risks. Security insertion and management is a significant challenge for the cloud. Organizations struggle to manage disparate security solutions for their premises and cloud environments, resulting in a lack of consistent policy enforcement that makes regulatory compliance difficult. At the same time, the frequency and sophistication of threats continues to increase. Security solutions protecting premises- based environments do not extend to the cloud, leaving them exposed and making them attractive targets for cyber criminals. Once a cloud environment is breached, attacks are able to spread laterally from VM to VM within the cloud and even extend externally to corporate networks.. Check Point CloudGuard Network Security for Azure delivers comprehensive security tailored to protect public and hybrid cloud environments, allowing businesses to confidently extend their data center applications and workflows to the cloud and connect to them securely. Microsoft Azure is a secure, Check Point CloudGuard Network Security for Microsoft Azure delivers dedicated public cloud computing advanced, multi-layered security for the Azure cloud environment, protecting service operated by Microsoft. assets in the cloud from attacks while enabling secure connectivity from The service supports existing enterprise networks to the Azure cloud and hybrid networks.
    [Show full text]
  • Quantum Appliances Brochure
    NETWORK SECURITY 2021 TABLE OF CONTENTS CHECK POINT NETWORK SECURITY 03 CHECK POINT INFINITY ARCHITECTURE 04 NEXT GENERATION THREAT PREVENTION 05 SECURITY GATEWAYS 16 VIRTUAL APPLIANCES 17 MANAGEMENT APPLIANCES 18 DDoS PROTECTOR 19 SANDBLAST APPLIANCES 20 PROVEN SECURITY BACKGROUND As the world becomes more connected and networks continue to evolve, securing IT environments is becoming more complex than it once was. We are now facing Gen V (5th Generation) of cyberattacks, large scale attacks that quickly spread and move across attack vectors and industries. Gen V attacks are more sophisticated than ever, crossing mobile, cloud and networks, and bypassing conventional defenses that are based on detection. Separate IT environments often drive businesses to apply different point solutions, many of which are focused on detection and mitigation rather than prevention. This reactive approach to cyberattacks is costly and ineffective, complicates security operations and creates inherent gaps in security posture, leaving you unprotected from sophisticated Gen V attacks. It’s time to step up to Gen V of cyber security, with the architecture that truly protects your entire IT infrastructure. SOLUTION Check Point Infinity is the only fully consolidated cyber security architecture that protects your business and IT infrastructure against Gen V mega cyberattacks across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. It provides complete threat prevention which seals security gaps, enables automatic, immediate threat intelligence sharing across all security environments, and a unified security management for an utmost efficient security operation. Check Point Infinity delivers unprecedented protection against current and potential attacks—today and in the future.
    [Show full text]
  • View Annual Report
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F ☐ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 OR ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2019 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to OR ☐ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report Commission file number 000-28584 CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Exact name of Registrant as specified in its charter) ISRAEL (Jurisdiction of incorporation or organization) 5 Shlomo Kaplan Street Tel Aviv 6789159, Israel (Address of principal executive offices) John Slavitt, Esq. General Counsel Check Point Software Technologies, Inc. 959 Skyway Road, Suite 300 San Carlos, CA 94070 U.S.A. Tel: (650) 628-2110 Fax: (650) 649-1975 (Name, Telephone, E-mail and/or Facsimile number and Address of Company Contact Person) Securities registered or to be registered pursuant to Section 12(b) of the Act. Title of each class Trading symbol Name of exchange on which registered Ordinary shares, NIS 0.01 nominal value CHKP NASDAQ Global Select Market Securities registered or to be registered pursuant to Section 12(g) of the Act. None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act. None Indicate the number of outstanding shares of each of the issuer’s classes of capital or common stock as of December 31, 2019.
    [Show full text]
  • Solution Brief: Cloudguard Network Security for Cisco
    Check Point CloudGuard for Cisco ACI | Solution Brief CHECK POINT + CISCO Comprehensive Security Protections for Software-Defined Datacenters Cisco Application Centric MODERN DATACENTER SECURITY OVERVIEW Infrastructure (ACI) is a Organizations today demand an agile data center environment to reduce IT comprehensive software defined networking (SDN) architecture that costs, increase business agility and remain competitive. At the same time, supports a business-relevant the shift from a hardware-centric to an application-focused infrastructure has application policy language to led to a dramatic increase in network traffic going east-west, or laterally, accelerate application delivery, between applications in the data center. reduce operating costs and greatly increase business agility. Cisco ACI Security has traditionally been focused on protecting perimeter, or north- helps customers dramatically reduce south, traffic going into and out of the data center while east-west traffic application deployment times from between applications inside the data center is not inspected. This presents a weeks to minutes while improving IT host of new challenges where threats introduced into the data center can alignment with business objectives traverse unimpeded since they no longer pass through the security gateway. and policy requirements. What’s more, traditional security approaches are manual, operationally complex, slow and unable to keep pace with dynamic changes and rapid CloudGuard Network Security application provisioning. Check Point CloudGuard
    [Show full text]