For the month of December, 2006
Commission File Number 0-28584
CHECK POINT SOFTWARE TECHNOLOGIES LTD. |
(Translation of registrants name into English) |
3A Jabotinsky Street, Ramat-Gan 52520, Israel |
(Address of principal executive offices) |
Indicate by check mark whether the registrant files or will file annual reports under cover Form 20-F or Form 40-F.
Form 20-F x Form 40-F o
Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____
Note: Regulation S-T Rule
101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to
provide an attached annual report to security holders.
Indicate by check mark if the
registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule
101(b)(7): ____
Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrants home country), or under the rules of the home country exchange on which the registrants securities are traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrants security holders, and, if discussing a material event, has already been the subject of a Form 6-K submission or other Commission filing on EDGAR.
Indicate by check mark whether by furnishing the information contained in this Form, the registrant is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the Securities Exchange Act of 1934.
Yes o No x
If Yes is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- ________
Media Contact: | Investor Contact: |
Allison Wagda | Anne Marie McCauley |
Check Point Software Technologies | Check Point Software Technologies |
+1 650.628.2070 or +1 650.906.6320 | +1 650.628.2040 |
press@us.checkpoint.com | ir@us.checkpoint.com |
CHECK
POINT TO ACQUIRE NFR SECURITY; EXPANDS INTRUSION PREVENTION
CAPABILITIES TO FORTIFY ENTERPRISE NETWORKS
Award-winning
intrusion prevention technologies to augment unified security architecture and offer
the highest
level of protection against Internet attacks
REDWOOD CITY, Calif. and ROCKVILLE, MD December 19, 2006 Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the company has signed a definitive agreement to acquire NFR Security, a leader in real-time threat prevention.
With the acquisition of NFR, Check Point will enhance its technology leadership and raise the security bar in defending enterprise networks against todays most dynamic threats. Check Points SmartDefense and NFRs Hybrid Detection Engine (HDE) will offer customers precise, real-time attack prevention by combining pre-emptive type-based protection (SmartDefense) with the highly granular and accurate attack detection provided by the HDE.
This acquisition is an important step in Check Points leadership strategy to continuously raise the level of security available to enterprises for protecting their mission-critical networks. It is part of our focus on two primary layers: network security as our core platform and our recently announced expansion into data security, said Gil Shwed, founder and chief executive officer of Check Point. NFRs proven security solutions provide the most powerful intrusion detection and prevention technology we have found in the market. We will integrate NFRs technologies into our unified security architecture to provide the industrys broadest and best managed security solutions.
Total consideration of the transaction is approximately $20 million including acquisition related expenses. NFR, established in 1996, is based in Rockville, MD and has 22 employees. The acquisition has received U.S. regulatory approvals and is expected to close before the end of the year.
1
Check Point offers the industrys most comprehensive security solutions for businesses and consumers worldwide. Through Check Points NGX platform, it is the only company to deliver a unified security architecture boasting integrated manageability and security across the full network infrastructure.
NFRs flagship Sentivist Real-Time Threat Protection solution goes beyond standard intrusion detection techniques and combines best-in-class technologies to protect against todays multi-faceted threats, while giving network administrators the real-time information and tools needed to manage and act upon threats. Sentivist protects against all manner of attacks, including intrusion attacks, insidious zero-day attacks, anomaly exploits, malicious code, backdoors, command tampering, polymorphic buffer overflows and more.
Check Point will incorporate NFRs award-winning, intrusion detection and prevention (IDS/IPS) technologies into the companys market-leading network security portfolio of firewall, VPN and security management solutions. This solution will provide the highest level of intelligence, adaptability and manageability. Check Point will also offer stand-alone IDS/IPS solutions by unifying NFRs product line with the companys InterSpect internal security gateway solutions.
Shwed added, Check Point remains purely focused on the security needs of our customers. NFRs technology is an important extension to our unified security architecture and will enable us to more proactively protect against current and future threats with the industrys only integrated and fully-managed security solution portfolio.
Forward-looking
statements
This press release contains
forward-looking statements. These statements appear throughout and are not guarantees of
future performance and are subject to inherent risks and uncertainties. Forward-looking
statements include, but are not limited to, statements about the expected timetable for
closing the acquisition and the expected future business of NFR. These statements reflect
managements current expectations based upon information currently available to them
and are subject to various assumptions, as well as risks and uncertainties that may be
outside of their control. Actual results could differ materially from those expressed or
implied in such forward-looking statements as a result of a number of factors, including:
the conditions to completion of the deal may not be satisfied or the parties may not be
able to achieve all of the benefits of the transaction within the expected time frames or
at all; Check Point may experience unanticipated expenses in connection with the
acquisition; Check Point may not be able to successfully integrate NFRs technologies
into those of Check Point and may experience a loss of customers, employees and business
disruption; and other factors described in Check Points Report on Form 20-F for the
year ended December 31, 2005 which is on file with the Securities and Exchange Commission.
Any such forward-looking statements speak only as of the date on which they are made and
Check Point undertakes no obligation to update or revise any of them, whether as a result
of new information, future events or otherwise.
2
About Check Point
Software Technologies Ltd.
Check Point Software Technologies
Ltd. (www.checkpoint.com) is a leader in securing the Internet. It is a market
leader in the worldwide enterprise firewall, consumer Internet security and VPN markets.
Through its NGX platform, the company delivers a unified security architecture for a broad
range of perimeter, internal, Web, and endpoint security solutions that protect business
communications and resources for corporate networks and applications, remote employees,
branch offices and partner extranets. The companys ZoneAlarm Internet Security Suite
and additional consumer security solutions are among the highest rated in the industry
today, proactively protecting millions of people from hackers, spyware, viruses and
identity theft. Extending the power of the Check Point solution is its Open Platform for
Security (OPSEC), the industrys framework and alliance for integration and
interoperability with best-of-breed solutions from hundreds of leading
companies. Check Point solutions are sold, integrated and serviced by a network of
thousands of Check Point partners around the world and its customers include 100 percent
of Fortune 100 companies and tens of thousands of businesses and organizations of all
sizes.
About NFR Security, Inc.
NFR Security is a leading provider of
Real-Time Threat Protection systems that secure business networks against the four primary
threat points of today automated malware, information leakage, vulnerability
windows and unsanctioned network changes. The companys award-winning Sentivist®
security solution uniquely combines an array of powerful features including a Hybrid
Detection Engine, inline prevention, a full functional firewall, and the Dynamic Shielding
Architecture, NFR Securitys core technology that uses situational intelligence
to dynamically protect network services and assets against compromise, to deliver highly
sought-after piece-of-mind security. With performance level coverage from 20 megabits per
second to 4 Gigabits per second, NFR Security serve customers worldwide in corporate
enterprises, government agencies, service providers and academic institutions through an
extensive worldwide network of channel partners and direct sales. NFR Security is
headquartered in Rockville, MD. Additional information about NFR Security can be found at
www.nfr.com.
©20032006 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications.
3
Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.
CHECK POINT SOFTWARE TECHNOLOGIES LTD. By: /s/ Eyal Desheh Eyal Desheh Executive Vice President & Chief Financial Officer |
December 19, 2006
4