Actionable news
All posts from Actionable news
Actionable news in CHKP: Check Point Software Technologies Ltd.,

Report of foreign issuer [Rules 13a-16 and 15d-16]

bgcolor="#ffffff" style="DISPLAY: inline; FONT-FAMILY: Times New Roman; FONT-SIZE: 10pt">

of the Securities Exchange Act of 1934

Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F.

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____

Note: Regulation S-T Rule 101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to provide an attached annual report to security holders.

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): ____

Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrant's "home country"), or under the rules of the home country exchange on which the registrant's securities are traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrant's security holders, and, if discussing a material event, has already been the subject of a Form 6-K submission or other Commission filing on EDGAR.

Indicate by check mark whether the registrant by furnishing the information contained in this Form, is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the Securities Exchange Act of 1934.

If "Yes" is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- ________


SAN CARLOS, CA – October 26, 2015 — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the largest pure-play security vendor globally, today announced its financial results for the third quarter ended Sept. 30, 2015.

“We had very good financial results in the third quarter. Revenues were toward the high-end of our projections, while earnings exceeded projections. Our combined products and software blades revenue continued to post double-digit growth, driven primarily by data center appliances, mid-size appliances, and software blades.” said Gil Shwed, founder and chief executive officer, “Mobile devices are becoming the weakest link in cyber security, and we are committed to staying one step ahead and prevent these threats. This quarter we extended our technology to smartphones and tablets, while introducing new and innovative threat prevention solutions for cloud and network infrastructure.”

Financial Highlights for the Third Quarter of 2015:

For information regarding the non-GAAP financial measures discussed in this release, as well as a reconciliation of such non-GAAP financial measures to the most directly comparable GAAP financial measures, please see “Use of Non-GAAP Financial Information” and “Reconciliation of GAAP to Non-GAAP Financial Information.”

We launched the following new products and technologies:

Mobile Threat Prevention : To battle today’s mobile threat environment, Check Point announced Mobile Threat Prevention , a new mobile security solution for stopping mobile threats on iOS and Android. Check Point Mobile Threat Prevention provides the highest level of protection against malware targeted at smartphones and tablets.

SandBlast Zero-Day Protection: A new advanced threat prevention solution designed to provide a level of cyber protection unmatched in today’s market. By utilizing CPU-level threat detection to uncover threats at the pre-infection level, Check Point SandBlast elevates threat defense with evasion-resistant malware detection and comprehensive protection from even the most dangerous attacks, significantly reducing the risk of expensive breaches.

Cloud Security: Check Point vSEC was designed for private cloud environments and works with VMware NSX to extend comprehensive, best-in-class security. The integrated solution allows customers to accelerate security deployment in virtualized datacenter environments for east-west traffic. The solution is designed to prevent zero-day attacks, APTs and other security threats within the private cloud.

We received the following industry accolades:

NSS Breach Detection Systems Results: Check Point’s Next Generation Threat Prevention Solution received a “recommended” rating in the NSS Labs Breach Detection Systems (BDS) group test. Check Point received a 100 percent catch rate of HTTP, 100 percent catch rate for email and 100 percent catch rate for drive by...