
I. Executive Summary
This report provides a comprehensive investment analysis of Check Point Software Technologies Ltd. (NASDAQ: CHKP), a foundational company in the global cybersecurity industry. The analysis frames Check Point as a mature, highly profitable, and cash-generative incumbent navigating a critical strategic transition. The company operates against the backdrop of a rapidly evolving, high-growth industry fueled by powerful secular tailwinds, including enterprise digital transformation, widespread cloud adoption, and an escalating threat landscape.
Check Point’s investment profile is characterized by a distinct dichotomy. On one hand, it is a paragon of financial discipline, consistently delivering best-in-class operating and free cash flow margins that are the envy of the software industry. Its capital allocation strategy is resolutely focused on shareholder returns, executed through a long-standing and aggressive share repurchase program that has been a primary driver of earnings per share (EPS) growth. This positions the company as a “value” or “quality” holding within the technology sector.
On the other hand, this financial conservatism is juxtaposed with a persistent, multi-year trend of mid-single-digit revenue growth. This rate significantly lags the double-digit expansion of the broader cybersecurity market and the more aggressive top-line performance of its key competitors, namely Palo Alto Networks (PANW) and Fortinet (FTNT), as well as cloud-native disruptors like CrowdStrike (CRWD). Consequently, Check Point has experienced a gradual erosion of market share, and its valuation multiples remain compressed relative to these “growth” peers.
The central challenge and opportunity for Check Point lies in its ability to accelerate this top-line growth. This requires a successful pivot from its legacy as a hardware-centric firewall provider to a modern, integrated, cloud-first security platform under its “Infinity” architecture. The company’s recent acquisitions, though modest in scale, signal an intent to bolster its capabilities in high-growth areas like Secure Access Service Edge (SASE) and cloud security.
The most significant catalyst for potential change is the recent, pivotal leadership transition. In late 2024, founder Gil Shwed moved to the role of Executive Chairman, appointing Nadav Zafrir as the new Chief Executive Officer. Mr. Zafrir’s background as a former commander of Israel’s elite cyber intelligence unit and a co-founder of a cybersecurity-focused venture group suggests a potential shift towards a more aggressive and innovative strategic posture. The success of this new leadership in revitalizing the company’s growth trajectory without sacrificing its hallmark profitability will be the determining factor for long-term shareholder value creation.
Key risks to the investment thesis include the pace of technological disruption from cloud-native competitors, execution risk on the company’s platform and M&A integration strategy, the potential for cultural friction during the leadership transition, and geopolitical factors related to its headquarters in Israel. This report will dissect these dynamics to provide a thorough, data-driven framework for evaluating Check Point as a potential investment opportunity.
II. The Cybersecurity Imperative: Industry Landscape & Market Dynamics
The investment case for any company in the cybersecurity sector begins with an understanding of the powerful and enduring tailwinds that propel the entire industry. Cybersecurity has evolved from a discretionary IT expense to a mission-critical, board-level priority for enterprises and governments worldwide. The market is characterized by a non-cyclical demand profile, driven by the existential necessity of protecting digital assets in an increasingly connected and hostile world.
Market Size and Secular Growth Trajectory
The global cybersecurity market is vast and expanding at a formidable pace. While precise figures vary depending on the scope and methodology of market research firms, a consistent picture of robust, double-digit growth emerges. Market size estimates for 2024 and 2025 range from approximately $243 billion to $302 billion.1 Forecasts project this market will expand significantly by the end of the decade, with estimates ranging from $434 billion to as high as $878 billion, implying a strong Compound Annual Growth Rate (CAGR) in the 12% to 13% range.1 The wide variance in these forecasts underscores the difficulty in precisely defining the market’s boundaries, as “cybersecurity” now encompasses a rapidly expanding and overlapping set of products and services, from traditional network hardware to cloud-native software, AI-driven analytics, and managed security services. This fluid and expanding Total Addressable Market (TAM) offers multiple avenues for growth but also creates a complex and dynamic competitive landscape.
Geographically, North America currently constitutes the largest market for cybersecurity solutions, a function of its mature economy, high levels of IT penetration, and significant concentration of large enterprises.1 However, the Asia-Pacific region is consistently identified as the fastest-growing market, driven by rapid economic development, increasing internet penetration, and a burgeoning digital economy.1
Core Secular Drivers
The market’s relentless expansion is not a cyclical phenomenon but is instead underpinned by several powerful, long-term secular trends that are reshaping the global economy.
- Digital Transformation & Cloud Adoption: The fundamental shift of business operations, applications, and data from on-premise data centers to public, private, and hybrid cloud environments is the single most significant driver of modern cybersecurity demand. This migration dramatically expands the corporate “attack surface,” dissolving the traditional network perimeter and rendering legacy security architectures insufficient. With 95% of enterprises now using at least one public cloud, the need for cloud-native security solutions that can provide consistent policy and protection across these distributed environments is paramount.1
- Remote & Hybrid Work: The COVID-19 pandemic accelerated a permanent shift towards distributed workforces. This trend has dismantled the traditional security model centered on the corporate office, creating a critical need for new architectures that can secure users, devices, and data regardless of their physical location. This has directly fueled the rapid adoption of frameworks like Zero Trust and solutions such as Secure Access Service Edge (SASE), which converge networking and security functions into a unified, cloud-delivered service.5
- Escalating Threat Landscape: The frequency, sophistication, and economic impact of cyberattacks are increasing at an alarming rate. Adversaries, ranging from individual cybercriminals to organized ransomware gangs and nation-state actors, are employing more advanced techniques, including double-extortion ransomware, supply chain attacks, and AI-driven campaigns.10 The financial stakes are immense; the global annual cost of cybercrime is projected to surge from $3 trillion in 2015 to an astonishing $10.5 trillion by 2025, a 300% increase that compels organizations to continuously augment their security spending.6
- Regulatory & Compliance Mandates: Governments and regulatory bodies worldwide are implementing stricter data privacy and protection laws, such as the General Data Protection Regulation (GDPR) in Europe. These regulations impose significant financial penalties for non-compliance and data breaches—for example, TikTok was fined $370 million in 2023 for GDPR violations.7 This regulatory pressure forces organizations to invest in robust security, governance, and compliance solutions to avoid both financial and reputational damage.7
Key Technology Shifts & Emerging Battlegrounds
Within this growing market, several key technological shifts are defining the next generation of cybersecurity and creating new competitive battlegrounds.
- Artificial Intelligence (AI) and Machine Learning (ML): AI is a transformational force on both sides of the cyber conflict. Attackers are leveraging AI to create highly convincing deepfake phishing campaigns and adaptive malware designed to evade traditional signature-based defenses. In response, defenders are increasingly deploying AI- and ML-powered tools to analyze vast datasets in real-time, detect behavioral anomalies, predict vulnerabilities, and automate incident response. The economic benefit is tangible: research from IBM found that organizations making extensive use of security AI and automation experienced data breach costs that were, on average, $1.88 million lower—a 33% difference.7
- Zero Trust Architecture (ZTA): The outdated “trust but verify” model of perimeter security is being replaced by the “never trust, always verify” principle of Zero Trust. This approach assumes that no user or device, whether inside or outside the network, should be trusted by default. It requires continuous verification of identity and context before granting access to resources. ZTA is rapidly becoming the new standard for enterprise security, with a 2025 report indicating that 96% of organizations favor the approach and 81% plan to implement Zero Trust strategies within the next 12 months.7
- Cloud-Native Security: As applications are increasingly built using cloud-native technologies like containers and serverless functions, security must also become cloud-native. This has given rise to a demand for integrated Cloud-Native Application Protection Platforms (CNAPP), which consolidate multiple security capabilities—such as Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWPP)—into a single platform that provides comprehensive security from the development pipeline (“code”) to the cloud runtime environment.13
- Quantum Computing Threats: While still an emerging, longer-term threat, the advancement of quantum computing poses a significant risk to current cryptographic standards. Experts warn that a sufficiently powerful quantum computer could break widely used encryption methods almost instantly. This has spurred a proactive push toward developing and adopting post-quantum cryptography (PQC). A 2024 study revealed that 61% of global organizations plan to migrate to PQC within the next five years to future-proof their data security.7
Industry Consolidation & The Platformization Imperative
The cybersecurity industry is highly fragmented, with thousands of vendors offering point solutions for specific problems. This has led to significant complexity and operational overhead for security teams, with many organizations managing dozens of disparate security tools.15 In response, two powerful trends are reshaping the industry: vendor consolidation and platformization.
Customers are increasingly seeking to reduce complexity by partnering with a smaller number of strategic vendors that can offer a broad, integrated security platform. This demand is driving a wave of M&A activity, which remained high through 2024 and saw a strong rebound in Q2 2025.13 Strategic buyers, including Check Point’s primary competitors, are aggressively acquiring companies to build out their platform capabilities across key domains like cloud security, identity, and security operations (SecOps).13 This “platformization” trend creates a significant strategic challenge for all players. Companies that can successfully build or acquire and integrate a comprehensive platform are better positioned to capture larger shares of customer security budgets. This dynamic has led to a market where high-growth platform vendors command significant valuation premiums over more narrowly focused or slower-moving competitors.16
The table below summarizes the market size and projected growth for key segments of the cybersecurity industry, providing a quantitative foundation for the market opportunity available to Check Point and its peers.
Market Segment | 2024/2025 Market Size (USD Billions) | Projected Market Size (USD Billions) | Forecast CAGR (%) | Data Sources |
Overall Cybersecurity | $243 – $302 | $435 (2029) – $878 (2034) | 12.6% – 12.9% | 1 |
Network Security | $25 – $78 | $73 (2032) – $111 (2029) | 7.2% – 16.7% | 4 |
Endpoint Security | $15 – $22 | $30 (2032) – $69 (2035) | 9.3% – 11.0% | 19 |
Cloud Security | $36 – $44 | $75 (2030) – $156 (2032) | 12.9% – 18.6% | 8 |
III. Competitive Arena: Check Point’s Position in a Crowded Field
Check Point Software Technologies is one of the original pioneers of the cybersecurity industry, with a legacy rooted in the invention of the commercial firewall. While it remains a major force, the competitive landscape has evolved dramatically, bifurcating into distinct categories of rivals, each presenting a unique challenge to Check Point’s market position.
Mapping the Competitive Landscape
The competitive environment is best understood by segmenting players based on their strategic focus, growth profile, and technological architecture.
- High-Growth Platform Players: This category is dominated by Palo Alto Networks (PANW) and Fortinet (FTNT). Like Check Point, both originated in the network security space but have executed aggressive strategies to transform into broad, integrated security platform providers. They have consistently delivered revenue growth rates significantly higher than Check Point’s, enabling them to capture market share and achieve premium market valuations.
- Cloud-Native Disruptors: This group includes companies like CrowdStrike (CRWD) and Zscaler (ZS). These vendors were “born in the cloud” and built their architectures from the ground up to address the security challenges of the modern, distributed enterprise. CrowdStrike has become the de facto leader in modern endpoint security, while Zscaler pioneers the Secure Access Service Edge (SASE) market. They represent the primary architectural and business model threat to the traditional, appliance-centric incumbents.
- Legacy Diversified Players: Cisco Systems (CSCO) is the most prominent competitor in this category. With its immense global footprint in enterprise networking, a vast sales force, and a broad security portfolio, Cisco is a formidable competitor. However, its security business has historically posted inconsistent growth, often struggling to keep pace with more focused pure-play vendors.23
- Other Niche Competitors: Beyond these primary rivals, Check Point competes with a host of smaller public and private companies that specialize in specific market segments. This includes vendors like Juniper Networks, SonicWall, Sophos, and Barracuda, who often compete in the network security and unified threat management (UTM) spaces, particularly in the mid-market.24
Market Share Analysis
An examination of market share data reveals the central competitive challenge facing Check Point: while its business is growing, its share of the expanding market is contracting relative to its faster-growing peers.
- Overall Cybersecurity Market: According to Canalys data from Q1 2023, Palo Alto Networks led the market with an 8.7% share, followed by Fortinet at 7.0%. In a significant development, CrowdStrike, at 3.6%, had slightly surpassed Check Point’s 3.5% share.23 This data, while not the most recent, illustrates the intense competitive pressure and the success of rivals in capturing a larger portion of new market spending. The core issue for Check Point is not that its business is failing, but that it is underperforming on a relative basis in a market with powerful secular growth.
- Network Security / Firewalls: This segment remains Check Point’s traditional stronghold and the largest component of its business. The firewall market is the largest sub-segment within network security and is projected to grow at the highest CAGR within that category.9 However, it is also the most mature and fiercely contested battleground, with Palo Alto Networks and Fortinet as the primary adversaries.4
- Endpoint Security: This market is increasingly dominated by cloud-native vendors. IDC data from mid-2022 identified CrowdStrike as the leader in the “Modern Endpoint Security” category with a 17.7% share, ahead of Microsoft at 16.4%.27 Check Point competes in this space with its Harmony Endpoint solution but is not considered a market share leader.
- Cloud Security: This is the most critical growth battleground for the entire industry. While specific vendor market share data is not readily available, qualitative assessments, product leadership rankings, and aggressive M&A activity strongly suggest that Palo Alto Networks (with its comprehensive Prisma Cloud platform) and a host of cloud-native specialists are leading the charge in this high-growth arena.8
Competitive Differentiation and Moats
The leading cybersecurity vendors compete on a combination of technological innovation, architectural philosophy, go-to-market strategy, and price-performance.
- Check Point’s Strengths: Check Point’s brand is built on a long-standing reputation for robust, highly reliable technology and a “prevention-first” security philosophy. Its core differentiation is its unified security management and the Infinity consolidated architecture, which aims to provide a single point of control across network, cloud, and user security.28 The company’s primary moat is its large and loyal installed base of over 100,000 organizations, which creates stickiness and opportunities for cross-selling.29 Financially, its unmatched profitability and cash generation provide significant operational stability.
- Palo Alto Networks’ Strengths: PANW is widely perceived as the technology and innovation leader in the sector. It has successfully executed a transition from a next-generation firewall pioneer to a comprehensive, three-platform company covering network security (Strata), cloud security (Prisma), and security operations (Cortex). Its go-to-market engine is highly effective, and it has used an aggressive M&A strategy to rapidly acquire best-of-breed technologies and integrate them into its platforms, as exemplified by its rumored $20B+ bid for identity security leader CyberArk.4
- Fortinet’s Strengths: Fortinet’s key differentiator is its custom-developed Security Processing Unit (SPU) ASICs (Application-Specific Integrated Circuits). These specialized chips allow its FortiGate appliances to deliver high-performance security functions at a compelling price-performance ratio. This advantage is particularly effective in the mid-market and for distributed enterprises. Its “Security Fabric” concept offers a broad and integrated portfolio of products that appeals to customers seeking to consolidate with a single vendor.24
- CrowdStrike’s Strengths: CrowdStrike’s competitive advantage lies in its pure-play, cloud-native architecture. Its Falcon platform utilizes a single, lightweight agent that collects vast amounts of telemetry data, which is then analyzed in its cloud-based Threat Graph to detect and prevent threats. This model provides superior scalability, efficacy, and ease of deployment compared to legacy on-premise solutions. The company’s highly efficient, subscription-first business model has allowed it to become the definitive leader in modern endpoint detection and response (EDR) and expand into adjacent markets.27
The competitive landscape is no longer a simple feature-for-feature comparison but a battle of these distinct architectural philosophies and business models. CrowdStrike’s success validates the power of a cloud-native, subscription-first approach. Palo Alto’s strategy is a bet on aggressive, M&A-fueled platform consolidation. Fortinet’s edge is price-performance driven by custom silicon. Check Point’s historical strength was best-of-breed prevention technology. This context reveals that Check Point’s most significant challenge is not merely technological but also cultural and strategic, requiring a fundamental pivot to compete effectively in this new paradigm. The recent leadership change is a direct acknowledgment of this challenge and represents the most important catalyst for the company’s future competitive positioning.
The following table provides a quantitative comparison of the key financial and operational metrics for Check Point and its primary competitors, starkly illustrating the trade-off between Check Point’s superior profitability and its rivals’ superior growth.
Metric | Check Point (CHKP) | Palo Alto Networks (PANW) | Fortinet (FTNT) | CrowdStrike (CRWD) |
Market Cap (USD Billions) | $24.5 | $129.3 – $139.3 | $80.2 – $81.5 | $116.0 – $117.5 |
TTM Revenue (USD Billions) | $2.6 | $8.9 | $6.0 | $4.1 |
TTM Revenue Growth (%) | 6.4% | 13.9% | ~26% (Q1 2023) | 39.9% (Q1 2023) |
TTM Gross Margin (%) | 88.3% | ~75-78% (Non-GAAP) | ~76-78% (Non-GAAP) | ~75-78% (Non-GAAP) |
TTM GAAP Operating Margin (%) | 33.7% | 11.1% | ~20-22% | Negative |
TTM FCF Margin (%) | ~34-36% | ~39-42% | ~33-35% | ~30-33% |
R&D as % of Revenue | ~15.4% | ~18-20% | ~10-12% | ~20-22% |
Note: Data as of late July 2025. TTM figures are approximate based on latest available quarterly and annual reports. Margin data for peers often reported on a non-GAAP basis; GAAP figures may differ. Data Sources:.23
IV. Deconstructing the Business Model & Financial Engine
Check Point’s business model is in the midst of a multi-year transition from a traditional perpetual license and maintenance model to one increasingly dominated by recurring subscriptions. This shift is crucial for enhancing revenue predictability and long-term customer value. The company’s financial profile is distinguished by its exceptional, best-in-class profitability and robust cash flow generation.
Revenue Architecture & Subscription Transition
Check Point’s revenue is segmented into three primary categories, each reflecting a different aspect of its business model.
- Products & Licenses: This stream primarily includes revenue from the sale of hardware appliances (e.g., Quantum series firewalls) and the perpetual software licenses that run on them. This revenue is typically recognized upfront and can be lumpy, often influenced by enterprise hardware refresh cycles.
- Security Subscriptions: This is the key growth engine and represents the core of the company’s strategic transition. It includes recurring revenue from subscriptions to a wide array of security services, such as advanced threat prevention, cloud security (CloudGuard), and user/endpoint security (Harmony). This revenue is typically recognized ratably over the life of the subscription.
- Software Updates, Maintenance, and Services: This category includes recurring revenue from technical support contracts and software updates for the company’s products. It is a stable and predictable source of revenue tied to the large installed base of Check Point appliances.
An analysis of the most recent financial results for the second quarter of 2025, ended June 30, 2025, provides a clear snapshot of this business model in action 26:
- Total Revenues: $665 million, representing a 6% year-over-year increase.
- Products & Licenses Revenues: $132 million, showing strong 12% year-over-year growth. This acceleration is a positive sign, often indicating successful new product introductions (such as the Quantum Force appliances mentioned by management) that serve as a beachhead for selling higher-margin subscriptions.
- Security Subscriptions Revenues: $298 million, with solid 10% year-over-year growth. This is the most critical long-term value driver, and its continued double-digit expansion confirms progress in the shift to a recurring revenue model. As of Q2 2025, Security Subscriptions now constitute approximately 45% of total revenue, a meaningful increase from prior years.
- Software Updates, Maintenance, and Services: $235 million, roughly flat year-over-year. This stability is expected from a mature, installed-base-driven revenue stream.
Key Performance Indicators (KPIs)
Beyond top-line revenue, several forward-looking metrics are essential for gauging the health and momentum of Check Point’s business.
- Calculated Billings: This metric is defined as total revenue plus the change in deferred revenue during a period. It serves as a proxy for new business activity and is a critical forward-looking indicator of future revenue growth. In Q2 2025, calculated billings grew 4% year-over-year to $642 million.26 The fact that billings growth is lagging revenue growth is a point of concern. While a single quarter does not constitute a trend, this divergence could be a leading indicator of a potential near-term slowdown in revenue growth, suggesting that the strong product sales are not yet translating into an equivalent acceleration in longer-term subscription commitments.
- Remaining Performance Obligation (RPO): RPO represents the total value of contracted, non-cancellable future revenue that has not yet been recognized. It is a direct measure of the company’s contracted revenue backlog. As of the end of Q2 2025, Check Point’s RPO stood at $2.4 billion, an increase of 6% year-over-year.26 This substantial backlog provides good visibility into future revenue streams.
Hallmark Profitability and Cash Flow Generation
Check Point’s financial discipline is a defining characteristic. The company is exceptionally profitable, consistently delivering operating margins that are among the highest in the entire software industry.
- Operating Margins: In Q2 2025, the company reported a GAAP operating margin of 31% and a non-GAAP operating margin of 41%.26 This level of profitability is a testament to a disciplined cost structure and an efficient operating model. However, this strength can also be viewed as a strategic constraint. In a market that demands aggressive investment to capture growth, these world-class margins may indicate a level of underinvestment in sales, marketing, and cloud R&D relative to faster-growing peers. The new leadership faces a critical decision: maintain this margin structure or strategically invest for growth, potentially at the expense of near-term profitability.
- Cash Flow: The company is a prolific cash generator. In Q2 2025, cash flow from operations was a robust $262 million, a significant 31% increase from the $200 million generated in the same quarter of the previous year.26 This strong cash generation provides the financial firepower for the company’s capital allocation priorities, including its aggressive share repurchase program and strategic acquisitions.
Geographic Footprint
Check Point operates a globally diversified business, which mitigates the risk of a downturn in any single economic region. The revenue distribution is well-balanced across major geographies. Based on available data, the company generates approximately 40% of its revenue from the Americas, around 50% from Europe, the Middle East, and Africa (EMEA), and the remaining 10% from the Asia-Pacific (APAC) region.47
V. Growth Vector Analysis: Past Performance and Future Pathways
Check Point’s historical growth has been characterized by stability and consistency rather than the high-velocity expansion seen in other parts of the cybersecurity sector. The company’s future growth hinges on its ability to successfully execute a strategic pivot toward cloud-native solutions, supplemented by a more active, albeit still measured, approach to M&A.
Historical Growth Patterns
An analysis of Check Point’s full-year revenue growth over the past several years reveals a pattern of modest, mid-single-digit expansion.
- Fiscal Year 2021: Total revenue grew 5% year-over-year to $2.17 billion.49
- Fiscal Year 2022: Total revenue growth accelerated to 8%, reaching $2.33 billion.28
- Fiscal Year 2023: Growth decelerated to 4%, with total revenue of $2.42 billion.52
- Fiscal Year 2024: Growth improved to 6%, with total revenue reaching $2.57 billion.53
This “sawtooth” pattern of growth (5% -> 8% -> 4% -> 6%) suggests that the company’s top-line performance is still significantly influenced by the more cyclical nature of enterprise hardware refresh cycles, which drive the lumpy “Products & Licenses” revenue line. A truly successful transition to a subscription-first model would see the recurring revenue engine become dominant enough to smooth out these fluctuations, leading to a more predictable and potentially accelerating growth trajectory. The primary engine of growth during this period has been the Security Subscriptions business, which grew by a more robust 14% in 2023.52
The Cloud Transformation
Accelerating the transition to a cloud-centric security platform is the company’s most critical strategic imperative. This effort is consolidated under the Check Point Infinity architecture, which aims to provide a unified security platform across three core pillars:
- Check Point Quantum: Secures network perimeters and data centers, representing the evolution of the company’s traditional firewall business.28
- Check Point CloudGuard: Designed to automatically secure cloud environments, workloads, and applications. This is the key product suite for competing in the high-growth cloud security market.28
- Check Point Harmony: Focuses on securing remote users, their devices, and their access to corporate resources. This suite includes solutions for endpoint security, email security, and SASE.28
Management has consistently highlighted momentum in its CloudGuard and Harmony suites as the primary drivers for future growth.26 The market’s perception of and customer adoption of these cloud-native offerings will be the ultimate determinant of the success of the company’s strategic pivot.
Innovation and M&A Strategy
While Check Point has a strong history of organic R&D, it has recently become more active on the M&A front to fill specific technology gaps and accelerate its platform strategy. The company’s approach favors strategic “bolt-on” acquisitions rather than the large, market-redefining deals pursued by some competitors.
Key recent acquisitions include:
- Perimeter 81 (September 2023): A Security Service Edge (SSE) company acquired for approximately $490 million to significantly bolster Check Point’s SASE capabilities within the Harmony suite.9
- Atmosec (September 2023): A specialist in SaaS security, acquired to enhance the discovery and protection of SaaS applications, addressing the risks of misconfigurations and malicious apps.8
- Veriti (May 2025): A platform for security posture management and threat exposure mitigation. This technology is being integrated into the Infinity platform to provide customers with consolidated risk assessment and automated remediation capabilities.17
While these acquisitions are strategically sound, their scale is modest compared to multi-billion dollar deals elsewhere in the sector. For instance, Palo Alto Networks’ rumored $20B+ acquisition of CyberArk is a move to dominate the entire identity security market.30 Check Point’s more conservative approach may be financially prudent but risks being “too little, too late” to fundamentally alter its market perception as a “fast follower” rather than a market-shaping innovator through M&A. This could contribute to the persistence of its valuation discount relative to more aggressive acquirers.
Market Expansion Opportunities
Beyond the core technology pivot, Check Point has several avenues for potential market expansion.
- Small and Medium Business (SMB) Market: Traditionally focused on large enterprises, Check Point has an opportunity to penetrate the SMB market more deeply. The SMB segment is identified as a faster-growing portion of the network security market, as smaller organizations are increasingly targeted by cyberattacks and require more accessible, subscription-based security solutions.9
- New Verticals: Certain industries are accelerating their cybersecurity spending at a faster rate than the overall market. The healthcare vertical, in particular, is projected to have the highest CAGR in network security spending, driven by the digitization of patient records, the rise of telemedicine, and the proliferation of connected medical devices.5
- Emerging Markets: While North America and Europe are its largest markets, the Asia-Pacific region represents the fastest-growing geography for cybersecurity spending. A focused effort to expand its go-to-market presence and channel partnerships in this region could provide a meaningful boost to top-line growth.1
VI. Capital Allocation: A Strategy of Shareholder Returns and Strategic Investment
Check Point’s capital allocation strategy is a defining feature of its investment profile. It is characterized by a disciplined and consistent approach that prioritizes direct returns to shareholders through an aggressive share repurchase program, funded by the company’s prodigious free cash flow generation. This is balanced with a strong, debt-free balance sheet and strategic, bolt-on M&A.
Share Repurchase Program
The cornerstone of Check Point’s capital return policy is its share repurchase program. The company does not pay a dividend, instead channeling nearly all of its excess free cash flow into buying back its own stock.55
- Scale and Consistency: The program is substantial and executed with remarkable consistency. Since its inception, Check Point has repurchased approximately 218 million shares for a total consideration of around $15 billion.60 The company typically targets a quarterly buyback amount of approximately $325 million. For example, in Q2 2025, it repurchased 1.5 million shares for $325 million, and in Q1 2025, it also spent $325 million on buybacks.41 For the full fiscal year 2023, total repurchases amounted to approximately $1.3 billion.52
- Program Authorization: The Board of Directors continues to reaffirm its commitment to this strategy. In July 2024, the board authorized a new $2.0 billion expansion of the program, extending its authority to continue repurchases.60
- Impact on EPS: This aggressive reduction of the share count has a significant financial engineering effect on the company’s EPS. It provides a powerful, mechanical lift to EPS growth, which has often outpaced the underlying growth in net income. For investors, it is crucial to decompose the sources of EPS growth, recognizing that a substantial portion is attributable to this capital return strategy rather than purely operational expansion.62
The steadfast commitment to this level of buybacks acts as an implicit signal to the market. While it demonstrates management’s confidence in the company’s value and provides a degree of support for the stock price, it also reinforces the narrative of a mature, “ex-growth” company. In a high-growth sector where peers are reinvesting every available dollar to capture market share, the decision to consistently return over $1.2 billion annually suggests that management believes buying back its own stock generates a superior return to other available internal or external investment opportunities. This reinforces the “value” thesis but may also place a natural ceiling on the valuation multiple the market is willing to assign the company.
Dividend Policy
Check Point Software Technologies does not currently pay a dividend and has not paid one in over a decade.55 The company’s capital return strategy is exclusively focused on share repurchases.
R&D Investment
Check Point invests a significant amount in research and development to drive organic innovation, though its spending as a percentage of revenue is generally more modest than its hyper-growth peers.
- In Q2 2025, R&D expenses were $112.8 million, which equates to 17.0% of total revenue.26
- For the full fiscal year 2024, R&D expenses totaled $395 million, or 15.4% of total revenue.43
- For the full fiscal year 2023, R&D expenses were $369 million, or 15.3% of total revenue.43
This level of R&D reinvestment is substantial in absolute terms but, as a percentage of sales, it is often lower than competitors like Palo Alto Networks or CrowdStrike, who may reinvest 20% or more of their revenue into R&D to fuel faster innovation and growth.
Balance Sheet and M&A Capacity
Check Point maintains a fortress balance sheet, providing it with significant financial flexibility and stability.
- As of June 30, 2025, the company held $2.91 billion in cash, marketable securities, and short-term deposits.41
- Critically, the company has zero long-term debt on its balance sheet.42
- This robust liquidity position provides ample capacity to continue funding its share repurchase program, invest in R&D, and pursue strategic bolt-on acquisitions without needing to access capital markets. The cash balance has declined from over $3.5 billion at the end of 2022, primarily due to the combined cash outlays for acquisitions (such as Perimeter 81 and Veriti) and the ongoing share buybacks.41
VII. Leadership & Governance: A New Era of Command
In late 2024, Check Point initiated the most significant leadership transition in its three-decade history, marking a potential turning point for the company’s strategic direction and corporate culture. This change at the top is the most critical catalyst for investors to monitor, as it could reshape the company’s approach to growth, innovation, and competition.
Pivotal Leadership Transition
After founding the company in 1993 and leading it as CEO for over 30 years, Gil Shwed, an iconic figure in the cybersecurity industry and the inventor of the modern stateful inspection firewall, transitioned to the role of Executive Chairman of the Board in December 2024.63
He was succeeded as Chief Executive Officer by Nadav Zafrir. Mr. Zafrir’s appointment is a clear and deliberate signal of a potential strategic pivot. His background is uniquely suited to the challenges of the modern cybersecurity landscape. He is the co-founder and former managing partner of Team8, a prominent venture group that builds and invests in cutting-edge cybersecurity and enterprise technology startups. Prior to his career in venture capital, Mr. Zafrir had a distinguished military career, where he established the Israel Defense Forces’ (IDF) Cyber Command and served as the commander of Unit 8200, Israel’s elite signals intelligence and cyber unit.63 This appointment appears to be a calculated move to inject a more aggressive, forward-looking, and “attacker’s mindset” into a company culture that has historically been viewed as conservative and engineering-led.
Assessing the New Leadership and Strategic Vision
The new leadership team under Mr. Zafrir is a blend of long-tenured Check Point executives and newer talent brought in to drive the company’s transformation. Key members include Roei Golan (CFO), Nataly Kremer (CPO and Head of R&D), and Itai Greenberg (CRO).63 The company also appointed a new Chief Technology Officer, Jonathan Zanger, in July 2025, another leader with a background in Israel’s Unit 8200.54
The stated strategic vision remains centered on the AI-powered Infinity Platform, with a goal of providing consolidated, prevention-first security across all enterprise vectors: network (Quantum), cloud (CloudGuard), and the modern workspace (Harmony).60 The primary challenge for the new leadership will be to execute this vision with a renewed sense of urgency and translate it into accelerated revenue growth and market share gains.
The dynamic between the new CEO, Mr. Zafrir, and the founder and Executive Chairman, Mr. Shwed, will be the single most important factor determining the company’s success over the next five years. Mr. Shwed’s continued presence ensures deep technical knowledge and strategic continuity. However, it also raises questions about the degree of autonomy the new CEO will have to enact fundamental changes. Investors must closely monitor the company’s strategic announcements, investment priorities, and M&A activity for signs of a true cultural and operational shift, as the potential for friction or disruption during such a significant transition is a tangible risk.64
Board Composition and Corporate Governance
Check Point’s Board of Directors is composed of a diverse group of seasoned technology executives, investors, and business leaders.
- Board Members: The board includes individuals with extensive experience from firms like Venrock, Virgin Atlantic, and Lumenis, as well as former executives from major technology companies.63
- Tenure and Experience: The board is highly experienced, with an average tenure of 13 years.54 While this indicates stability and deep institutional knowledge, it could also be perceived as a potential barrier to fresh perspectives and rapid change.
- Governance Structure: With Mr. Shwed as Executive Chairman and the presence of a Lead Independent Director, Yoav Chelouche, the governance structure is designed to provide both founder guidance and independent oversight.63
VIII. Risk Factors
An investment in Check Point Software Technologies carries a set of risks that are critical for any potential investor to understand and weigh against the company’s strengths. These risks span technological, competitive, operational, and geopolitical domains.
- Technology Disruption & Competitive Lag: The most significant risk facing Check Point is the pace of technological disruption in the cybersecurity industry. The rapid shift to cloud-native architectures and AI-driven security platforms has allowed competitors like Palo Alto Networks and CrowdStrike to gain a perception of being innovation leaders. There is a tangible risk that Check Point could be perceived as a provider of legacy, on-premise security solutions, struggling to keep pace with the architectural shifts demanded by modern enterprises. If the company’s cloud transformation fails to accelerate, it could be relegated to protecting a declining segment of the market, which would severely impact its long-term growth prospects.68
- Market Share Erosion: As demonstrated by third-party market analysis, Check Point is growing more slowly than the overall cybersecurity market and its key competitors.23 While the company remains profitable, a continued, gradual erosion of market share will inevitably put long-term pressure on its revenue growth and, eventually, its profitability. Reversing this trend is the central challenge for the new management team.
- Execution Risk on Cloud and Platform Strategy: The company’s future is intrinsically tied to the success of its Infinity platform and its ability to win in the high-growth cloud security market. This requires not only developing compelling technology but also successfully integrating its recent acquisitions, such as Perimeter 81 and Veriti, into a seamless and cohesive platform experience for customers. Any failure in execution or integration could undermine the entire growth acceleration narrative.
- Leadership Transition Risk: The transition from a founder-CEO who has led the company for over 30 years to a new, external CEO is a moment of significant operational and cultural risk. While the appointment of Nadav Zafrir is promising, there is potential for a period of strategic uncertainty, internal friction, or operational disruption as the new leadership team implements its vision and reshapes the corporate culture.67
- Geopolitical Risk: Check Point is headquartered in Tel Aviv, Israel, and has a significant R&D presence in the country.66 While its business operations, revenue, and customer base are globally diversified, any significant escalation of political or military conflict in the region could pose risks to its operations and personnel. It could also negatively impact investor sentiment due to perceived instability, regardless of the direct impact on the company’s financial performance.
- Margin Pressure: Check Point’s best-in-class operating margins are a key component of its current investment thesis. However, a strategic decision by the new management team to invest more aggressively in sales, marketing, and R&D to reignite top-line growth could lead to a planned or unplanned contraction in these margins. Such a shift could disappoint the segment of its investor base that prizes the company’s profitability and financial discipline, potentially leading to stock price volatility.
IX. Valuation Framework: Assessing Fair Value in a Dynamic Sector
The valuation of Check Point Software Technologies presents a classic case study in the market’s pricing of growth versus profitability. The company trades at a significant discount to its high-growth peers, a reflection of its mature financial profile and modest top-line expansion. The central question for investors is whether this valuation gap represents a compelling value opportunity or a justified discount for a company that is losing ground in a dynamic market.
Historical Valuation Context
Over the past decade, Check Point’s valuation multiples have reflected its status as a mature technology company. Its historical EV/EBITDA multiple has generally traded in a range with a low around 11.9x and a high of 23.1x, with a median of approximately 15.5x.47 As of late July 2025, its TTM EV/EBITDA multiple stood at approximately 21.2x, placing it in the upper end of its historical range, likely reflecting the overall strength in the cybersecurity sector and the company’s consistent profitability.47
Peer Group Benchmarking
A comparison with its primary competitors reveals a starkly bifurcated valuation landscape within the cybersecurity sector. The market awards enormous premiums for high growth, creating a significant valuation disparity.
Valuation Metric | Check Point (CHKP) | Palo Alto Networks (PANW) | Fortinet (FTNT) | CrowdStrike (CRWD) |
P/E (TTM) | ~29x | ~103x – 116x | ~43x – 47x | Negative |
P/E (Forward) | ~22x | ~62x | ~40x | ~846x (GAAP) |
EV/Sales (TTM) | ~8.0x | ~14.6x – 15.5x | ~12.5x – 13.2x | ~27.7x – 28.1x |
EV/EBITDA (TTM) | ~21.2x | ~96.3x | ~37.2x | Very High / Not Meaningful |
Price/Book (P/B) | ~8.6x | ~17.9x | ~40.8x | ~33.6x – 34.8x |
Note: Data as of late July 2025. TTM figures are approximate based on latest available data. Forward multiples are based on consensus estimates and can vary. Data Sources:.36
This table clearly illustrates the market’s narrative:
- Check Point is priced as a mature, profitable “value” stock, with multiples that are a fraction of its peers on a sales and EBITDA basis.
- Palo Alto Networks and Fortinet receive significant premiums for their proven ability to deliver consistent, high-teens to 20%+ revenue growth combined with strong profitability and cash flow.
- CrowdStrike commands the highest multiples, as the market is pricing it as a hyper-growth, cloud-native leader, prioritizing its massive TAM and market share gains over near-term GAAP profitability.
This valuation gap is not an market inefficiency; it is a rational reflection of the companies’ differing growth profiles and strategic positions. The market is clearly signaling its preference for growth in the cybersecurity sector. For Check Point’s valuation multiple to experience a significant and sustained re-rating, the company must first deliver sustained evidence of revenue growth acceleration into the high single-digits or, ideally, the low double-digits. Without this, it is likely to remain in the “value” category.
Analyst Consensus & Price Targets
Wall Street analyst sentiment on Check Point is generally neutral, reflecting the “show me” nature of the investment story.
- Consensus Rating: As of late July 2025, the consensus rating for Check Point stock was a “Hold,” with 15 analysts rating it a hold, compared to 11 with a buy rating.75
- Price Targets: The consensus one-year price target from 31 analysts was approximately $239.80. This suggests a potential upside of around 10% from the stock price at the time of the analysis, indicating that analysts, on average, do not foresee a dramatic re-rating in the near term.76
- Intrinsic Value Models: Some quantitative valuation models, such as those based on discounted cash flow (DCF), suggest that the stock may be fully valued or even overvalued at current levels, with one such model calculating a fair value of approximately $160-$188.70 This highlights the dependence of the stock’s value on its ability to meet or exceed future growth expectations.
The bifurcated valuation structure of the cybersecurity sector suggests that investment flows are overwhelmingly directed toward companies with hyper-growth narratives. An investment in Check Point is therefore not just a bet on the company’s ability to execute its turnaround but is also a contrarian bet against the prevailing market sentiment that only rapid growth, not steady profitability, deserves a premium valuation in this industry.
X. Concluding Analysis & Key Metrics for Monitoring
Check Point Software Technologies represents a unique and complex investment proposition within the dynamic cybersecurity sector. The company is a financially sound, highly profitable, and shareholder-friendly incumbent operating in an industry with powerful and enduring secular growth tailwinds. Its fortress balance sheet, consistent free cash flow generation, and aggressive share repurchase program provide a strong foundation of value and a degree of downside support for the stock.
However, these considerable strengths are counterbalanced by a persistent and undeniable challenge: a modest, mid-single-digit revenue growth rate that significantly trails the broader market and its key competitors. This has led to a gradual erosion of market share and has anchored the company’s valuation at a steep discount to its peers. The investment thesis for Check Point is therefore a “show me” story that hinges on the ability of its new leadership team to successfully execute a strategic pivot.
The appointment of CEO Nadav Zafrir is the most significant catalyst in the company’s recent history. His mandate is to re-accelerate the growth engine by driving the adoption of the Infinity platform and establishing Check Point as a leader in modern, cloud-centric security. The ultimate success of an investment in Check Point will depend on whether this new leadership can revitalize the company’s innovative spirit and go-to-market motion, enabling it to capture a larger share of the industry’s growth without permanently impairing the best-in-class profitability structure that has long been its hallmark.
To effectively track the progress of this strategic transformation, investors should focus on a specific dashboard of forward-looking key performance indicators.
Forward-Looking Dashboard (Key Metrics to Monitor):
- Security Subscription Revenue Growth: This is the single most important metric for gauging the success of the business model transition. Consistent, sequential acceleration in this growth rate above the current 10% level would be a strong positive signal that the cloud and subscription strategy is gaining traction.
- Calculated Billings Growth: This is the best leading indicator of future revenue. Investors should monitor for a positive inflection point where billings growth begins to consistently outpace recognized revenue growth, which would signal an acceleration in new business momentum.
- Net New Annual Recurring Revenue (ARR): While not always explicitly disclosed, any commentary from management on the growth of net new ARR would provide crucial insight into new customer acquisition and, importantly, the company’s ability to expand its footprint within existing accounts.
- Operating Margin Trend: The new management’s approach to the trade-off between growth and profitability is critical. Investors should listen closely on earnings calls for any change in philosophy or guidance regarding the company’s historical 40%+ non-GAAP operating margin target. A willingness to strategically invest for growth, even at the cost of a few points of margin, could be interpreted positively by the market if it leads to tangible top-line results.
- Market Share Reports: Quarterly market share reports from firms like Canalys and IDC should be monitored closely to see if Check Point can halt the trend of share erosion and begin to stabilize or even regain its position relative to peers.
- Performance of CloudGuard and Harmony Suites: Any specific disclosures, customer win announcements, or quantitative data on the growth rates of these two key product pillars will be direct evidence of the cloud transformation’s progress.
Works cited
- Cybersecurity Market Report 2025 – Research and Markets, accessed July 30, 2025, https://www.researchandmarkets.com/reports/5939627/cybersecurity-market-report
- Cyber Security Market Size to Hit USD 878.48 Bn By 2034 – Precedence Research, accessed July 30, 2025, https://www.precedenceresearch.com/cyber-security-market
- Cyber Security Market Size, Share | Industry Report, 2030 – Grand View Research, accessed July 30, 2025, https://www.grandviewresearch.com/industry-analysis/cyber-security-market
- Network Security Market Size & Share | Industry Report, 2033 – Grand View Research, accessed July 30, 2025, https://www.grandviewresearch.com/industry-analysis/network-security-market
- Network Security Market Size, Growth, Share & Forecast Analysis 2030 – Mordor Intelligence, accessed July 30, 2025, https://www.mordorintelligence.com/industry-reports/network-security-market
- Exploring the Explosive Growth of the Cybersecurity Market – Blue Tree Digital, accessed July 30, 2025, https://bluetree.digital/cybersecurity-market-growth/
- 5 Cybersecurity Trends to Watch in 2025 – School of Professional …, accessed July 30, 2025, https://sps.wfu.edu/articles/top-cybersecurity-trends/
- Cloud Security Market Size, Share & Growth Report 2032 – Fortune Business Insights, accessed July 30, 2025, https://www.fortunebusinessinsights.com/cloud-security-market-102427
- Network Security Market Size, Share & Growth Report [2032], accessed July 30, 2025, https://www.fortunebusinessinsights.com/industry-reports/network-security-market-100339
- What Are the Top Cybersecurity Threats of 2025? | CSA – Cloud Security Alliance, accessed July 30, 2025, https://cloudsecurityalliance.org/blog/2025/01/14/the-emerging-cybersecurity-threats-in-2025-what-you-can-do-to-stay-ahead
- sps.wfu.edu, accessed July 30, 2025, https://sps.wfu.edu/articles/top-cybersecurity-trends/#:~:text=The%20Evolution%20of%20Ransomware%20and,by%20the%202020%20SolarWinds%20breach.
- Network Security Market Trends, Insights, and Forecast 2025 – Straits Research, accessed July 30, 2025, https://straitsresearch.com/report/network-security-market
- Cybersecurity Software Sector M&A Industry Insights—Spring 2025 – Kroll, accessed July 30, 2025, https://www.kroll.com/en/publications/m-and-a/cybersecurity-software-sector-ma-industry-insights-spring-2025
- Cloud Security Market Size And Share | Industry Report, 2030, accessed July 30, 2025, https://www.grandviewresearch.com/industry-analysis/cloud-security-market
- FTNT – Fortinet Latest Stock News & Market Updates, accessed July 30, 2025, https://www.stocktitan.net/news/FTNT/
- Cybersecurity M&A Update, Q2 2025 – Solganick, accessed July 30, 2025, https://solganick.com/cybersecurity-ma-update-q2-2025/
- Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 …, accessed July 30, 2025, https://www.securityweek.com/cybersecurity-ma-roundup-42-deals-announced-in-may-2025/
- Network Security Market Share, Forecast | Growth Analysis and Trends Report [2032], accessed July 30, 2025, https://www.marketsandmarkets.com/Market-Reports/network-security-market-151632343.html
- Endpoint Security Market Size & Share Report, 2035 – Roots Analysis, accessed July 30, 2025, https://www.rootsanalysis.com/endpoint-security-market
- Endpoint Security Market Size, Share & Trends Report, 2032, accessed July 30, 2025, https://www.fortunebusinessinsights.com/industry-reports/endpoint-security-market-100614
- Cloud Security Market: Global Industry Analysis and Forecast (2024-2030), accessed July 30, 2025, https://www.maximizemarketresearch.com/market-report/global-cloud-security-market/18082/
- Cloud Security Market Size to Hit USD 121.04 Billion by 2034, accessed July 30, 2025, https://www.precedenceresearch.com/cloud-security-market
- Cybersecurity outpaces wider tech market with … – Canalys Newsroom, accessed July 30, 2025, https://www.canalys.com/newsroom/cybersecurity-market-Q1-2023
- Top Check Point Software Technologies Competitors & Alternatives 2025 | Gartner Peer Insights, accessed July 30, 2025, https://www.gartner.com/reviews/market/network-firewalls/vendor/check-point-software-tech/alternatives
- Top 10 Check Point Next Generation Firewalls (NGFWs) Alternatives & Competitors – G2, accessed July 30, 2025, https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/competitors/alternatives
- [6-K] Check Point Software Technologies Ltd Current Report (Foreign Issuer) – Stock Titan, accessed July 30, 2025, https://www.stocktitan.net/sec-filings/CHKP/6-k-check-point-software-technologies-ltd-current-report-foreign-issu-eac380d52fc6.html
- IDC Worldwide Modern Endpoint Security Market Share Report, July 2021-June 2022, accessed July 30, 2025, https://www.crowdstrike.com/en-us/resources/reports/idc-worldwide-modern-endpoint-security-market-share-report/
- ESG REPORT 2022 – Responsibility Reports, accessed July 30, 2025, https://www.responsibilityreports.com/HostedData/ResponsibilityReportArchive/c/NASDAQ_CHKP_2022.pdf
- Check Point Software Technologies Ltd. – AnnualReports.com, accessed July 30, 2025, https://www.annualreports.com/Company/check-point-software-technologies-ltd
- Why Palo Alto Networks Stock Is Sinking Today | The Motley Fool, accessed July 30, 2025, https://www.fool.com/investing/2025/07/29/why-palo-alto-networks-stock-is-sinking-today/
- Investors Overview – Palo Alto Networks, accessed July 30, 2025, https://investors.paloaltonetworks.com/
- Palo Alto Networks Announces Agreement to Acquire CyberArk, the Identity Security Leader, accessed July 30, 2025, https://www.prnewswire.com/news-releases/palo-alto-networks-announces-agreement-to-acquire-cyberark-the-identity-security-leader-302517351.html
- Fortinet – Wikipedia, accessed July 30, 2025, https://en.wikipedia.org/wiki/Fortinet
- Fortinet (FTNT) Investor Relations Material – Quartr, accessed July 30, 2025, https://quartr.com/companies/fortinet-inc_5804
- Investor Relations | CrowdStrike Holdings, Inc., accessed July 30, 2025, https://ir.crowdstrike.com/
- Palo Alto Networks Inc (PANW) – Morningstar, accessed July 30, 2025, https://www.morningstar.com/stocks/xnas/panw/quote
- Palo Alto Networks Inc Stock Price Today | NASDAQ: PANW Live – Investing.com, accessed July 30, 2025, https://www.investing.com/equities/palo-alto-netwrk
- Fortinet (FTNT) – Market capitalization – Companies Market Cap, accessed July 30, 2025, https://companiesmarketcap.com/fortinet/marketcap/
- CRWD Stock – CrowdStrike Holdings Inc Class A – Morningstar, accessed July 30, 2025, https://www.morningstar.com/stocks/xnas/crwd/quote
- CrowdStrike Market Cap 2019-2025 | CRWD – Macrotrends, accessed July 30, 2025, https://macrotrends.net/stocks/charts/CRWD/crowdstrike/market-cap
- Check Point Software Technologies Ltd. Reports 6% Revenue Increase for Q2 2025, accessed July 30, 2025, https://www.quiverquant.com/news/Check+Point+Software+Technologies+Ltd.+Reports+6%25+Revenue+Increase+for+Q2+2025
- Check Point Software | CHKP Stock Price, Company Overview & News – Forbes, accessed July 30, 2025, https://www.forbes.com/companies/check-point-software/
- Check Point Software Technologies Research and Development Expenses 2010-2025 | CHKP | MacroTrends, accessed July 30, 2025, https://www.macrotrends.net/stocks/charts/CHKP/check-point-software-technologies/research-development-expenses
- Better Bet Than Palo Alto Networks Stock: Pay Less To Get More From PAY | Trefis, accessed July 30, 2025, https://www.trefis.com/stock/panw/articles/570416/better-bet-than-palo-alto-networks-stock-pay-less-to-get-more-from-pay/2025-07-24
- Should I buy Fortinet (FTNT) – Zacks, accessed July 30, 2025, https://www.zacks.com/stock/research/FTNT/stock-style-scores
- Should I buy CrowdStrike (CRWD) – Zacks, accessed July 30, 2025, https://www.zacks.com/stock/research/CRWD/stock-style-scores
- CHKP (Check Point Software Technologies) EV-to-EBITDA – GuruFocus, accessed July 30, 2025, https://www.gurufocus.com/term/ev2ebitda/CHKP
- Check Point Software Technologies 2025 Company Profile – PitchBook, accessed July 30, 2025, https://pitchbook.com/profiles/company/41951-44
- Check Point Software Reports 2021 Fourth Quarter and Full Year Results, accessed July 30, 2025, https://www.checkpoint.com/press-releases/check-point-software-reports-2021-fourth-quarter-and-full-year-results/
- Check Point Software Reports 2021 Fourth Quarter and Full, accessed July 30, 2025, https://www.globenewswire.com/news-release/2022/02/03/2378217/0/en/Check-Point-Software-Reports-2021-Fourth-Quarter-and-Full-Year-Results.html
- check point software technologies ltd. – SEC.gov, accessed July 30, 2025, https://www.sec.gov/Archives/edgar/data/1015922/000117891323000502/zk2329189.htm
- Check Point Software Reports Fourth Quarter and 2023 Full Year …, accessed July 30, 2025, https://www.checkpoint.com/press-releases/check-point-software-reports-fourth-quarter-and-2023-full-year-results/
- Check Point Software Reports Fourth Quarter and 2024 Full Year Results – GlobeNewswire, accessed July 30, 2025, https://www.globenewswire.com/news-release/2025/01/30/3017771/0/en/Check-Point-Software-Reports-Fourth-Quarter-and-2024-Full-Year-Results.html
- Check Point Software Technologies Ltd. (C1HK34) Leadership & Management Team Analysis, accessed July 30, 2025, https://simplywall.st/stocks/br/software/bovespa-c1hk34/check-point-software-technologies-shares/management
- Check Point Software Technologies – 54 Year Dividend History | CHKP – Macrotrends, accessed July 30, 2025, https://www.macrotrends.net/stocks/charts/CHKP/check-point-software-technologies/dividend-yield-history
- Check Point Software Technologies Ltd. – Dividend Yield – Wisesheets, accessed July 30, 2025, https://www.wisesheets.io/dividend-yield/CHKP
- CHKP: Dividend Date & History for Check Point Software Technologies Ltd., accessed July 30, 2025, https://www.dividend.com/stocks/technology/software/infrastructure-software/chkp-checkpoint-software-technologies-ltd/
- Check Point Software Technolgies (CHKP) Dividends – DividendMax, accessed July 30, 2025, https://www.dividendmax.com/united-states/nasdaq/software-and-computer-services/check-point-software-technologies-ltd/dividends
- Check Point Software Technologies Ltd – WKN 901638, ISIN IL0010824113 | DivvyDiary, accessed July 30, 2025, https://divvydiary.com/en/check-point-software-technologies-stock-IL0010824113
- Check Point Software Technologies Announces $2.0 Billion Expansion of Share Repurchase Authorization, accessed July 30, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-announces-2-0-billion-expansion-of-share-repurchase-authorization/
- Check Point Software Reports 2025 Second Quarter Financial Results – SEC.gov, accessed July 30, 2025, https://www.sec.gov/Archives/edgar/data/1015922/000117891325002530/zk2533503.htm
- Checkpoint NASDAQ: CHKP Stock Eyes $260 as Cloud Security Shift and AI Demand Drive Growth – Trading News, accessed July 30, 2025, https://www.tradingnews.com/news/checkpoint-chkp-stock-nasdaq-chkp-targets-260-usd
- Leadership – Executive Management & Board Of Directors – Check …, accessed July 30, 2025, https://www.checkpoint.com/about-us/leadership/
- Gil Shwed Takes on the Role of Executive Chairman of the Board of Directors, Nadav Zafrir Becomes CEO at Check Point Software Technologies – Stock Titan, accessed July 30, 2025, https://www.stocktitan.net/news/CHKP/gil-shwed-takes-on-the-role-of-executive-chairman-of-the-board-of-145x96trwek7.html
- Check Point Software Technologies Ltd Executive & Employee Information – GlobalData, accessed July 30, 2025, https://www.globaldata.com/company-profile/check-point-software-technologies-ltd/executives/
- Check Point – Wikipedia, accessed July 30, 2025, https://en.wikipedia.org/wiki/Check_Point
- Check Point Software Technologies Announces Leadership Transition: Gil Shwed Becomes Executive Chairman, Nadav Zafrir Appointed CEO | Nasdaq, accessed July 30, 2025, https://www.nasdaq.com/articles/check-point-software-technologies-announces-leadership-transition-gil-shwed-becomes
- 20F-2024.pdf – Check Point, accessed July 30, 2025, https://www.checkpoint.com/downloads/investor/20F-2024.pdf
- Check Point Software Technologies Ltd. (CHKP) Stock Price, Quote, News & Analysis, accessed July 30, 2025, https://seekingalpha.com/symbol/CHKP
- CHKP Intrinsic Valuation and Fundamental Analysis – Check Point Software Technologies Ltd – Alpha Spread, accessed July 30, 2025, https://www.alphaspread.com/security/nasdaq/chkp/summary
- PANW Intrinsic Valuation and Fundamental Analysis – Palo Alto Networks Inc, accessed July 30, 2025, https://www.alphaspread.com/security/nasdaq/panw/summary
- PANW EV/EBITDA – Palo Alto Networks Inc – Alpha Spread, accessed July 30, 2025, https://www.alphaspread.com/security/nasdaq/panw/relative-valuation/ratio/enterprise-value-to-ebitda
- Fortinet (NasdaqGS:FTNT) Stock Valuation, Peer Comparison & Price Targets, accessed July 30, 2025, https://simplywall.st/stocks/us/software/nasdaq-ftnt/fortinet/valuation
- Fortinet PE Ratio 2010-2025 | FTNT – Macrotrends, accessed July 30, 2025, https://macrotrends.net/stocks/charts/FTNT/fortinet/pe-ratio
- Check Point Software Technologies Ltd. (NASDAQ:CHKP) Given Average Rating of “Hold” by Brokerages, accessed July 30, 2025, https://www.marketbeat.com/instant-alerts/check-point-software-technologies-ltd-nasdaqchkp-given-average-rating-of-hold-by-brokerages-2025-07-28/
- Check Point Software Technologies (CHKP) Surpasses Q2 Expectations – GuruFocus, accessed July 30, 2025, https://www.gurufocus.com/news/3015639/check-point-software-technologies-chkp-surpasses-q2-expectations