Bloomberg the Company & Products

Bloomberg Anywhere Login

Bloomberg

Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.

Company

Financial Products

Enterprise Products

Media

Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000

Communications

Industry Products

Media Services

Follow Us


Last $84.09 USD
Change Today -0.59 / -0.70%
Volume 87.9K
CHKP On Other Exchanges
Symbol
Exchange
NASDAQ GS
Frankfurt
As of 10:10 AM 06/2/15 All times are local (Market data is delayed by at least 15 minutes).

check point software tech (CHKP) Key Developments

Check Point Software Technologies Ltd. Introduces New 1200R Security Gateway Appliance, to Protect Industrial Control Systems Against Cyber Threats

Check Point Software Technologies Ltd. announced the extension of its comprehensive Industrial Control Systems (ICS) security solution with the introduction of a new 1200R security gateway appliance, enhancements to granular visibility and control of SCADA networks, and SCADA aware threat detection and prevention. The Check Point 1200R is a new, purpose-built, ruggedized security gateway appliance for harsh environments and remote deployments like those found on plant floors, at remote electrical substations and at power generation facilities. The 1200R complements Check Point's existing lineup of security gateway appliances that deliver full visibility and granular control of SCADA traffic to prevent network, devices and logical process attacks. With over 500 SCADA commands and parameters within the Check Point Firewall and Application Control Software Blades, and over 200 SCADA-specific IPS signatures, Check Point offers the most extensive SCADA security support. Specialized threat reports in Check Point Next Generation SmartEvent provide full reports on SCADA traffic to grant quick and detailed forensics for incident investigations. This overall security solution also has regulation compliance monitoring with the Check Point Compliance Blade. Check Point also provides a full IT-OT security blueprint to protect the corporate perimeter, the bridge between IT-OT, the operator workstations, and the SCADA devices and traffic to deliver the best security for ICS.

Check Point Software Technologies Ltd. Presents at 43rd Annual J.P. Morgan Global Technology, Media and Telecom Conference, May-18-2015

Check Point Software Technologies Ltd. Presents at 43rd Annual J.P. Morgan Global Technology, Media and Telecom Conference, May-18-2015 . Venue: The Westin Boston Waterfront, 425 Summer St., Boston, MA 02210, United States.

Check Point Software Technologies Ltd. Presents at Jefferies 2015 Global Technology, Media and Telecom Conference, May-13-2015 01:30 PM

Check Point Software Technologies Ltd. Presents at Jefferies 2015 Global Technology, Media and Telecom Conference, May-13-2015 01:30 PM. Venue: Mandarin Oriental Brickell, Miami, Florida, United States.

Check Point Software Technologies Ltd. Presents at Bank of America Merrill Lynch 2015 Global Technology Conference, Jun-02-2015

Check Point Software Technologies Ltd. Presents at Bank of America Merrill Lynch 2015 Global Technology Conference, Jun-02-2015 . Venue: The Ritz Carlton, 600 Stockton Street, San Francisco, California, United States.

CHECK Point Software Technologies Ltd Offers New Solution to Tackle Malware

CHECK Point Software Technologies Ltd. has introduced Check Point Threat Extraction, a radical new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds. Attacks are evolving and increasing every day, however documents still pose one of higher risks of infection for organizations. According to the Check Point 2014 Security Report, 84% of companies downloaded an infected document in 2013. Companies need to implement stronger defenses against these attacks. The only way to ensure complete protection is to preemptively remove threats by reconstructing documents with known safe elements. Active content, embedded objects and other exploitable content are simultaneously extracted, and the document is then reconstructed without potential threats to provide 100 safe content.

 

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup
Recently Viewed
CHKP:US $84.08 USD -0.60

CHKP Competitors

Market data is delayed at least 15 minutes.

Company Last Change
Citrix Systems Inc $66.84 USD +1.07
F5 Networks Inc $124.54 USD -0.57
Fortinet Inc $39.75 USD -0.11
Palo Alto Networks Inc $170.53 USD +0.03
Qihoo 360 Technology Co Ltd $53.96 USD +0.25
View Industry Companies
 

Industry Analysis

CHKP

Industry Average

Valuation CHKP Industry Range
Price/Earnings 24.2x
Price/Sales 10.2x
Price/Book 4.3x
Price/Cash Flow 22.9x
TEV/Sales 9.2x
 | 

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact CHECK POINT SOFTWARE TECH, please visit . Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at bwwebmaster@businessweek.com.