Check Point

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Check Point Software Technologies Ltd.
Public
NASDAQ-100 component
Traded as NASDAQCHKP
Industry Security software
Computer hardware
Founded Ramat Gan, Israel
(1993; 31 years ago (1993))
Founders Gil Shwed
Marius Nacht
Shlomo Kramer
Headquarters Tel Aviv, Israel and San Carlos, California
Key people
Gil Shwed, (Founder & CEO)
Products FireWall-1, VPN-1, UTM-1,
Check Point Integrity,
Intrusion prevention systems,
Endpoint, security,
Security appliances,
Web Application Security
Revenue Increase US$ $1,629.84 million (2015)
Increase US$ $685.87 million (2015)
Number of employees
3,400 (2015)[1]
Subsidiaries ZoneAlarm, SofaWare, Easy2comply
Website www.checkpoint.com

Check Point Software Technologies Ltd. is an international provider of software and combined hardware and software products for IT security, including network security, endpoint security, data security and security management.

As of 2014 the company had approximately 2,900 employees worldwide. Headquartered in Tel Aviv, Israel, the company has development centers in Israel, California (ZoneAlarm), Sweden (Former Protect Data development centre), and Belarus. The company has main offices in the United States, in San Carlos, California, in Dallas, Texas, in Ottawa, Ontario, Canada, and Sydney Australia.

Check Point competes in the antivirus industry against AVG, Avira, ESET, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.

History

Check Point was established in Ramat-Gan, Israel in 1993, by Gil Shwed (CEO as of 2015), Marius Nacht (Chairman as of 2015) and Shlomo Kramer (who left Check Point in 2003).[2] Shwed had the initial idea for the company’s core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1; soon afterwards they also developed one of the world’s first VPN products, VPN-1.[3] Shwed developed the idea while serving in the Unit 8200 of the Israel Defense Forces, where he worked on securing classified networks.[4][5]

Initial funding of US$400,000 was provided by venture capital fund BRM Group.[6]

In 1994 Check Point signed an OEM agreement with Sun Microsystems,[3] followed by a distribution agreement with HP in 1995.[7] The same year, the U.S. head office was established in Redwood City, California.

By February 1996 the company was named worldwide firewall market leader by IDC, with a market share of 40 percent.[8] In June 1996 Check Point raised $67 million from its initial public offering on NASDAQ.[9]

In 1998 Check Point established a partnership with Nokia, which bundled Check Point's Software with Nokia's computer Network Security Appliances.[10]

In 2003, a class action lawsuit was filed against Check Point over violation of the Securities Exchange Act by failing to disclose major financial information.[11]

During the first decade of the 21st century Check Point started acquiring other IT security companies, including Nokia's network security business unit in 2009.[12]

Over the years many employees who worked at Check Point have left to start their own software companies. These include Shlomo Kremer who started Imperva, Nir Zuk who founded Palo Alto Networks, Ruvi Kitov and Reuven Harrison of Tufin and Yonadav Leitersdorf.

Products

Check Point offers the following primary products:

  • Network Security – Check Point's core business has historically focused on network security components including Firewall, IPsec VPN, Mobile Access, Intrusion Prevention, Antivirus, Anti-spam and Email security, URL filtering, Data Loss Prevention, Anti-Bot and Application Control. Check Point provides these components as individual products called Software Blades or combined in one of their bundle offerings: Next Generation Firewall (NGFW), Next Generation Threat Prevention (NGTP), Next Generation Data Protection (NGDP) and Next Generation Secure Web Gateway (NGSWG). These products are deployed as software on x86-based hardware made by third parties including BlueCoat (formerly Crossbeam), Hewlett-Packard, IBM, Fujitsu, or by Check Point.
  • Software Defined Protection – Software-defined protection enables organizations to design and deploy a modern security infrastructure that is modular, flexible, secure, and is applicable across networks, hosts, and mobile and cloud environments. Software-defined protection describes enterprise security architecture in the context of three inter-connected layers, the Enforcement Layer, the Control Layer, and the Management Layer.[13]
  • Public and Private Cloud Security – Check Point Virtual Appliance for Amazon Web Services protects Amazon public cloud with Check Point software blade protections.[14] The Security Gateway Virtual Edition product protects private clouds and virtual environments. It runs on VMware ESXi servers and inspects traffic between virtual machines and hosts by integrating with the hypervisor using VMWare NetX API. Check Point also integrates with OpenStack to defend the emerging cloud infrastructure against threats.[15]
  • Data Security – VPNs, access controls, and the DLP security gateway secure data-in-motion and data-in-use. Check Point Document Security protects data-in-use. Full Disk Encryption, Media Encryption and Port Control secure data-at-rest on endpoints.
  • ThreatCloud – Released April 2012, ThreatCloud® is a collaborative network to share security intelligence between organizations all over the world. ThreatCloud collects its data from a global network of security enforcement points, research, community feeds and other industry feeds. By sharing information between organizations globally, ThreatCloud provides immediate protection to all organizations as soon as a new attack gets detected. To date, ThreatCloud has 250 million+ addresses analyzed for bot discovery, created 11million malware signatures, and detected 3 million+ malware-infested sites. Data collected and analyzed by ThreatCloud is automatically distributed as security protections on subscribed customers’ security gateways.[16]
  • ThreatCloud IntelliStore – Released May 2014, ThreatCloud® IntelliStore is a marketplace that provides access to a wide variety of threat intelligence data that can be selected according to an organizations’ needs. Some of the vendors that provide threat intelligence to ThreatCloud IntelliStore today include, iSIGHT, CrowdStrike, IID, NetClean, PhishLabs, SenseCy and ThreatGRID. Using the ThreatCloud infrastructure, threat data from the intelligence store gets passed on the security gateways in real-time as well.[17]
  • Virtual Systems – Check Point’s Virtual Systems technology enables consolidation of up to 250 security gateways into one single hardware platform. Virtual Systems can be deployed on any gateway or can be pre-configured and packaged on Check Point Virtual System Appliances.[18]
  • Endpoint Security – a single security agent that combines firewall, antivirus, anti-spyware, full disk encryption, removable media encryption, protection of I/O ports such as USB, network access control, and a VPN client. The security policies for networked endpoints can be centrally managed from a single location via the Endpoint Policy Management Software Blade product.[citation needed]
  • Mobile Security – Check Point Mobile Access software provides secure access to corporate resources via a SSL VPN portal for devices such as laptops, mobile phones, and tablet PCs.
  • Security Management – Allows administrators to manage events, set policy and apply protections across the entire security infrastructure from a single interface. Based on the Software Blade architecture, with 11 management software blades including event analysis, correlation, multi-domain security management, and device provisioning. a good access point

Acquisitions

  • SofaWare Technologies, in January 2002 (partial acquisition).[19]
  • Zone Labs, makers of the ZoneAlarm personal firewall software, in 2003, for $205 million in cash and shares.[20]
  • Protect Data, the holding company for PointSec Mobile Technologies, in a cash deal valued at $586m in late 2006.[21] Prior to their acquisition by Check Point, Protect Data acquired Reflex Software.[22]
  • NFR security, an intrusion prevention system developer, for $20 million in late 2006, following its failed plan to acquire the larger IPS vendor Sourcefire.[23]
  • Nokia Security Appliances division was acquired in April 2009.[12]
  • Liquid Machines, a data security startup company based in Boston, was acquired in June 2010.[24]
  • Dynasec, a provider of enterprise governance, risk management, and compliance products, was acquired in November 2011. Dynasec offers a Web-based enterprise application, branded as Easy2comply, for Sarbanes-Oxley compliance, Basel II compliance, operational risk management, information security management, HIPAA compliance, and internal audit management.[25]
  • Hyperwise, an early-stage startup, focused on CPU Level Threat Prevention was acquired Feb 2015.[26]
  • Lacoon Mobile Security was acquired in April 2015.[27]

In 2005, Check Point tried to acquire intrusion prevention system developers Sourcefire for $225 million,[28] but later withdrew its offer after it became clear US authorities (C.F.I.U.S) would try to block the acquisition.[29]

SofaWare legal battle

SofaWare Technologies was founded in 1999, as a cooperation between Check Point and SofaWare's founders, Adi Ruppin and Etay Bogner, with the purpose of extending Check Point from the enterprise market to the small business, consumer and branch office market. SofaWare's co-founder Adi Ruppin said that his company wanted to make the technology simple to use and affordable, and to lift the burden of security management from end users while adding some features.[30] In 2001 SofaWare began selling firewall appliances under the SofaWare S-Box brand;[31] in 2002 the company started selling the Safe@Office and Safe@Home line of security appliances, under the Check Point brand.[30] By the fourth quarter of 2002 sales of SofaWare's Safe@Office firewall/VPN appliances had increased greatly, and SofaWare held the #1 revenue position in the worldwide firewall/VPN sub-$490 appliance market, with a 38% revenue market share.[32]

Relations between Check Point and the SofaWare founders went sour after the company acquisition in 2002.[19] In 2004 Etay Bogner, co-founder of SofaWare, sought court approval to file a shareholder derivative suit, claiming Check Point was not transferring funds to SofaWare as required for its use of SofaWare's products and technology.[19] His derivative suit was ultimately successful, and Check Point was ordered to pay SofaWare 13 million shekels for breach of contract.[19] In 2006 the Tel Aviv District Court Judge ruled that Bogner SofaWare could sue Check Point by proxy for $5.1 million in alleged damage to SofaWare.[33] Bogner claimed that Check Point, which owned 60% of Sofaware, had behaved belligerently, and withheld monies due for use of SofaWare technology and products[33] Check Point appealed the ruling, but lost.[34]

In 2009 the Israeli Supreme Court ruled that a group of founders of SofaWare, which includes Bogner, had veto power over any decision of SofaWare.[19] The court ruled that the three founders could exercise their veto power only as a group and by majority rule.[19]

In 2011 Check Point settled all litigation relating to SofaWare. As part of the settlement it acquired the SofaWare shares held by Bogner and Ruppin, and began a process of acquiring the remaining shares, resulting in SofaWare becoming a wholly owned subsidiary.[35]

See also

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. 3.0 3.1 Lua error in package.lua at line 80: module 'strict' not found.
  4. Savage, Marcia. Gil Shwed, Chairman & CEO, Check Point Software Tech. CRN, Nov. 07, 2001.
  5. , Oct 1, 2002
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.
  9. Lua error in package.lua at line 80: module 'strict' not found.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. 12.0 12.1 Lua error in package.lua at line 80: module 'strict' not found.
  13. Lua error in package.lua at line 80: module 'strict' not found.
  14. Lua error in package.lua at line 80: module 'strict' not found.
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. 19.0 19.1 19.2 19.3 19.4 19.5 Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. Check Point Acquires Data Security Startup Liquid Machines
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. Check Point Acquires Hyperwise to Deliver Industry's First CPU Level Threat Prevention Capabilities
  27. Check Point to Acquire Lacoon Mobile Security for Industry's Most Advanced Mobile Threat Prevention
  28. Lua error in package.lua at line 80: module 'strict' not found.
  29. Lua error in package.lua at line 80: module 'strict' not found.
  30. 30.0 30.1 Interview with Adi Ruppin, Founder and Managing Director of SofaWare, by Berislav Kucan — Tuesday, 21 January 2003.
  31. Check Point bolsters new firewall appliance. Network World Dec 17, 2001. p. 15, 18
  32. Check Point Software Stakes Claim in Small Business Internet Security Space Company Duplicates Market-leading Enterprise Success in Sub-$490 Appliance Segment [1]
  33. 33.0 33.1 Lua error in package.lua at line 80: module 'strict' not found.
  34. Israeli Supreme Court, עא 2850/08 CHECK POINT SOFTWARE TECHNOLOGIES LTD נ' איתי בוגנר (עליון, א' רובינשטיין, ח' מלצר, נ' הנדל)
  35. Check Point 20-F SEC filing. 2011

External links