Skip to main content

Check Point Software Value Stock - Dividend - Research Selection

Check point software

ISIN: IL0010824113 , WKN: 901638

Market price date:
Market price:  

Fundamental data and company key figures of the share

Annual reports in
Key figures
Cash flow
Net operating cash flow
Capital Expenditures
Free cash flow
Balance sheet
Total Equity
Liabilities & Shareholders equity
Income statement
Net income
Eps (diluted)
Diluted shares outstanding
Net sales/revenue

Fundamental ratios calculated on:

Key figures
Cash flow
Balance sheet
Income statement
Div. Yield%

Do you want to do make a detailed fundamental analysis of this stock?

✓ NEW Fundamental API Access to 500 data points per month
Fundamental data up to 25 years
Comparison to all other stocks by the FScore
Time saving!

How our site works ...

Non-binding 7 days without automatic subscription
 No termination required after the free week
Finanzoo fundamental analysis
Data updated daily
Virtual depots
Share alarms via email
Subscription can be canceled at any time at the end of the month 
Choice of desired shares
Over 2000 stock analyzes available
Bitcoin payment possible if you do not want to subscribe

Price for monthly subscription $ 19.99 / month including VAT.

Market Capitalization USD
Raw Data Source
Stock Split

Description of the company

Check Point’s sole focus has been on IT security. Making the Internet secure, reliable and available for corporations and consumers everywhere has been – and continues to be – our ongoing vision. Building on our heritage of pioneering the first firewall, and with a long track record of industry-leading security gateways, Check Point is continuing to develop cutting-edge solutions to enable maximum security and business efficiencies. Today, Check Point is one the largest pure security vendors globally. We are committed to addressing the real needs of our customers and to developing new and innovative security solutions that redefine the security landscape.


Future of Cyber Security: Cloud, Mobile, and Threat Prevention


Our mission becomes especially vital in a rapidly changing digital world that is less and less controlled, with disappearing boundaries. Hackers are innovating just as quickly as enterprises, and are finding new ways to attack an increasingly connected world. Malware is increasingly being put into an ecosystem that traditional security techniques cannot always prevent. Attacks targeting networks, mobile devices, and cloud environments are on the rise. Ransomware, a type of computer malware that can hold a victim’s data hostage, was recently used to attack trains in San Francisco; dangerous hacking tools are being sold online; and personal data is constantly exposed. The Gooligan breach that we revealed in November 2016 demonstrates the scale of these current threats, with more than one million Google accounts breached by mobile malware.


In 2017, we expect cyber security to play an even bigger role in our lives. Advanced threats will continue to grow. The continued expansion to the cloud will spark evolving security issues. Mobile will continue to be a high priority. All of this drives and shapes a new imperative to provide the most advanced cyber security solutions that anticipate and solve for the challenges of the future. At Check Point, we see this aligned to three pillars: cloud, mobility, and threat prevention.


Business leaders must guard against things they cannot see, know, or control. They need to protect every point in the infrastructure, from mobile to cloud to virtual and physical. They need to be able to prevent attacks at every stage. To do so, enterprises must have visibility to tomorrow’s threats, not just the threats of today. We do not believe that the right solution is to continuously add point solutions that result in complex technology mosaics. These point solutions typically result in security gaps in an enterprise’s infrastructure. These tenets are the basis for Check Point’s security vision—a single architecture that consolidates comprehensive management and integrated threat intelligence, with the most advanced threat prevention solutions for cloud, mobile, and on-premise networks.


Organizations around the world rely on Check Point to protect their networks, customers, employees, assets, data, and reputation from cyber-attacks. For more than 20 years, Check Point has been at the forefront of the cyber security industry. With a reputation for industry firsts and continuous innovation, Check Point enables millions of users to safely and confidently accelerate their businesses in an ever-changing digital economy.


Check Point Technology Leadership in 2016




Leader Enterprise Network Firewall Market Quadrant 2016


Leader Unified Threat Management Magic Quadrant 2016


NSS Labs


Recommended in Next Generation Firewall Test 2016


Recommended in Breach Detection Systems Test 2016


Recommended in Intrusion Prevention Systems Test 2016




Leader Automated Malware Analysis Forrester Wave 2016


Common Criteria Certification: Check Point was awarded Common Criteria (CC) certification for R77.30, following a rigorous third-party evaluation and testing process.


Business Highlights


Details regarding the important events in the development of our business since the beginning of 2016 are provided in “Item 5 – Operating and Financial Review and Prospects” under the caption “Overview.”


We were incorporated as a company under the laws of the State of Israel in 1993 under the name of “Check Point Software Technologies Ltd.” Our registered office and principal place of business is located at 5 Ha’Solelim Street, Tel Aviv 6789705 Israel. The telephone number of our registered office is 972-3-753-4555. Our company’s web site is The contents of our web site are not incorporated by reference into this Annual Report.


This Annual Report is available on our web site. If you would like to receive a printed copy via mail, please contact our Investor Relations department at 959 Skyway Road, Suite 300, San Carlos, CA 94070, U.S.A., Tel.: 650-628-2050, email:


Our agent for service of process in the United States is CT Corporation System, 818 West Seventh Street, Los Angeles, CA 90017 U.S.A.; Tel: 213-627-8252.


Cyber Security Industry Today


Organizations of all sizes face a challenging threat landscape. With countless new connections formed every day, the world is more globally linked than ever. Cloud, mobility, virtualization, and the Internet of Things (“IoT”) are changing the way customers deploy and consume technology. While this provides more opportunities to innovate and compete, the network edges are blurring. As a result, our networks are becoming more complex, which increases the risk of cyberattacks. Specific trends within this dynamic landscape include:


Increased Sophistication of Threats and Attacks. Today’s threats use sophisticated technology, the Internet, and deception to acquire sensitive information and to disrupt business operations. Many of these threats contain new, unknown signatures when they reach their targets. Because these new, unknown signatures – also known as zero-day threats – are not recognized, they cause damage to their targets immediately. Enterprises need to put in place multi-layer defenses to prevent, detect, and extract these threats before they cause damage.


Rise of Mobility. The proliferation of smartphones and people working remotely through mobile devices has expanded the need to safeguard and manage access to information. Regardless of location, employees and other service providers need constant connectivity to the enterprise network, which also opens up new avenues of attack. As a result, enterprises relying on remote connectivity need to ensure security across all points of their infrastructure and deploy mobile-specific security solutions. As an example, in 2016, Check Point discovered malware embedded in mobile applications, such as ‘DressCode,’ downloaded from Google Play and ‘QuadRooter’, a set of four vulnerabilities affecting Android devices. It also revealed the ‘Gooligan’ breach in November 2016 that demonstrated the extent of these current threats, with over 1 million Google accounts breached by mobile malware.


Cloud Computing and Network Virtualization. Cloud computing, or Internet-based computing, provides resources, software and data storage to computers and other devices on demand using shared servers. New virtual environments and public and private clouds drive the need for enterprise security for both on-premise and in-the-cloud infrastructures. Deploying cloud based security solutions are crucial and are as important as on premise network security measures, to ensure that assets in the cloud are not compromised and that attacks are contained before laterally spreading within the cloud, across virtualized server and network environments.


Overall Complexity within the Enterprise IT Infrastructure. The increasing complexity of deploying, managing, and monitoring multiple security technologies is another key trend. As a result, enterprises face two challenges: how to cost-effectively manage a patch-work of point product solutions, and how to ensure that no gaps are left in the infrastructure. Single-architecture solutions with simplified management can keep the security infrastructure robust, yet simple to manage and adaptable to ongoing changes.


Increased Data Privacy and Compliance Regulation. Data has long been a prime target for hackers seeking financial information, intellectual property, insider business information and authentication credentials. These attacks have exposed personal health and financial data of millions of consumers. As a result, governmental regulations regarding data privacy are on the rise globally, including the new EU based data protection regulations. To ensure compliance – and avoid sanctions, fines and penalties – enterprises need to implement cybersecurity protections and security controls to prevent data loss or data theft.


Role of Social Engineering. Despite constantly improving security solutions, the human element is still a wild card. Attackers attempt to bypass security mitigations and restrictions, using phishing techniques, by tricking employees into exposing credentials or other sensitive information, or to open infected files or infected links. Specific technologies to detect phishing attempts, setting specific security policies, increasing segmentation of the infrastructure, and deploying multi-layer defense solutions are needed to prevent these types of attacks.


Emergence of Security for Operational Technology (OT) and Internet of Things (IoT). Gartner predicts that by 2020, there will be over 21 billion endpoint “connected things” in use worldwide. These connected things vary from smart light bulbs, to wearables and driverless cars, and to almost any area of our lives. In addition more and more OT SCADA based production lines, utilities and critical infrastructures are connected to the Internet and the mix between OT and IT networks is clearly evident. This continuously connected world opens new avenues of attack as the risk of IoT vulnerabilities leading to IT threats becomes more evident. As a result, more robust security will need to be implemented. Enterprises that use or connect with these types of products will need to consider how to prevent unauthorized access and other attacks to their infrastructures through these connected technologies.

The Finanzoo GmbH assumes no liability for the accuracy of the information! All information is provided without warranty. Sources::,,


Okta Is Priced For More Growth Than What The Firm Has To Offer (Earnings Preview)

Okta adapts its sales tactics amidst a challenging macro environment, potentially becoming an acquisition target. See why we recommend a buy on OKTA stock.

Check Point Software Advances API Security Supporting Enterprise Digital Transformation

New API discovery feature on Check Point CloudGuard recognized in latest GigaOm Radar for Application and API SecurityREDWOOD CITY, Calif., May 22, 2024 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, reinforces its Web Application Firewall with the powerful API Discovery feature, aimed at strengthening organizations’ cloud assets. This innovative tool, combined with its cloud native prevention fir

Check Point Software Technologies : May 22, 2024Check Point Software Advances API Security Supporting Enterprise Digital Transformation

Check Point Software Technologies Ltd. , a leading AI-powered, cloud-delivered cyber security platform provider, reinforces its Web Application Firewall with the powerful API Discovery feature,...

Check Point announces API Discovery feature for Web Application Firewall

Looking for stock market analysis and research with proves results? offers in-depth financial research with over 30years of proven results.

Are You a Growth Investor? This 1 Stock Could Be the Perfect Pick

Whether you're a value, growth, or momentum investor, finding strong stocks becomes easier with the Zacks Style Scores, a top feature of the Zacks Premium research service.

January 2025 Options Now Available For Check Point Software Technologies (CHKP)

Looking for stock market analysis and research with proves results? offers in-depth financial research with over 30years of proven results.

ZS, FTNT, or PANW: Which Cybersecurity Stock Could Generate the Highest Returns?

Looking for stock market analysis and research with proves results? offers in-depth financial research with over 30years of proven results.

Rising Cloud Threats Demand Advanced Defenses: Check Point's 2024 Report Highlights Urgent Need for AI and Prevention First Security Measures

Report highlights how technological advancements breed stronger cloud threats as 91% express concern over emerging risks and zero-day attacks.Check Point Software Technologies Ltd. , a leading...

Cybersecurity conference likely to reveal consolidation, AI integration

Looking for stock market analysis and research with proves results? offers in-depth financial research with over 30years of proven results.

Why This 1 Growth Stock Could Be a Great Addition to Your Portfolio

The Zacks Style Scores offers investors a way to easily find top-rated stocks based on their investing style. Here's why you should take advantage.