6-K

FORM 6-K
SECURITIES AND EXCHANGE COMMISSION

Washington, D.C. 20549

Report of Foreign Private Issuer

Pursuant to Rule 13a-16 or 15d-16
of the Securities Exchange Act of 1934

For the month of February, 2006

Commission File Number 0-28584

CHECK POINT SOFTWARE TECHNOLOGIES LTD.

(Translation of registrant’s name into English)

3A Jabotinsky Street, Ramat-Gan 52520, Israel

(Address of principal executive offices)

Indicate by check mark whether the registrant files or will file annual reports under cover Form 20-F or Form 40-F.

Form 20-F x Form 40-F o

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____

Note: Regulation S-T Rule 101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to provide an attached annual report to security holders.

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): ____

Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrant’s “home country”), or under the rules of the home country exchange on which the registrant’s securities are traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrant’s security holders, and, if discussing a material event, has already been the subject of a Form 6-K submission or other Commission filing on EDGAR.

Indicate by check mark whether by furnishing the information contained in this Form, the registrant is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the Securities Exchange Act of 1934.

Yes o No x

If “Yes” is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- ________




FOR IMMEDIATE RELEASE

Media Contact: Investor Contact:
Molly Ford Anne Marie McCauley
Check Point Software Technologies Check Point Software Technologies
650.628.2022 650.628.2040
press@us.checkpoint.com ir@us.checkpoint.com

CHECK POINT SOFTWARE PROVIDES UPDATE ON SOURCEFIRE ACQUISITION

REDWOOD CITY, Calif., – Feb. 13, 2006 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the world leader in securing the Internet, received notice its pending acquisition of Sourcefire®, Inc. has moved into the investigative stage with the Committee on Foreign Investment in the United States (“CFIUS”).

        In order to clear the transaction with the United States Government, Check Point submitted two regulatory applications. Check Point received U.S. anti-trust approval and was advised that CFIUS would continue reviewing the application during a 45-day investigative period.

        CFIUS, an inter-agency committee, is chaired by the Secretary of Treasury. Pursuant to the Exon-Florio legislation, CFIUS reviews proposed foreign acquisitions of U.S. companies in order to protect national security while maintaining the credibility of the United States open investment policy. The Exon-Florio legislation provides for a 30-day review following notification of a potential acquisition. CFIUS has the option to extend the review period for an additional 45-day review (or “investigation”).

Check Point and Sourcefire are both committed to working cooperatively with the committee during the investigative period.



Safe Harbor Statement

Certain statements in this press release are forward-looking statements. Forward-looking statements include statements regarding Check Point’s expectations regarding the timing of receipt of any regulatory approvals and completion of the acquisition. These statements pertain to future events, and therefore they are subject to various risks and uncertainties, and actual results could differ materially from Check Point’s current expectations and beliefs. Factors that could cause or contribute to such differences include, but are not limited to: the parties’ ability to consummate the Sourcefire transaction, including the ability of the parties to secure the CFIUS approval required for the transaction on the terms expected or on the anticipated schedule, if at all; and other factors and risks discussed in Check Point’s Annual Report on Form 20-F for the year ended December 31, 2004, which is on file with the Securities and Exchange Commission. Check Point assumes no obligation to update information concerning its expectations.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. It is a market leader in the worldwide enterprise firewall, personal firewall and VPN markets. Through its NGX platform, the company delivers a unified security architecture for a broad range of perimeter, internal, Web, and endpoint security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company’s ZoneAlarm product line is the highest rated personal computer security suite, comprised of award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry’s framework and alliance for integration and interoperability with “best-of-breed” solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,200 Check Point partners in 88 countries and its customers include 100% of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.


©2003-2005 Check Point Software Technologies Ltd. All rights reserved.
Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security Alliance, Eventia, Eventia Analyzer, Eventia Reporter, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, NGX, Open Security Extension, OPSEC, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge, SecurePlatform, SecuRemote, SecureXL Turbocard, SecureServer, SecureUpdate, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 VSX, VPN-1 XL, Web Intelligence, ZoneAlarm, ZoneAlarm Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988 and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications.



Signatures

Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.

CHECK POINT SOFTWARE TECHNOLOGIES LTD.


BY: /S/ Eyal Desheh
——————————————
Eyal Desheh
Executive Vice President & Chief Financial Office

February 14, 2006