UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
FORM 6-K
Report of Foreign Private Issuer
Pursuant to Rule 13a-16 or 15d-16
of the Securities Exchange Act of 1934
For the month of December 2019
Commission File Number 0-28584
CHECK POINT SOFTWARE TECHNOLOGIES LTD.
|
(Translation of registrant's name into English)
|
|
5 Ha’solelim Street, Tel Aviv, Israel
(Address of principal executive offices)
|
Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F.
Form 20-F ☒ Form 40-F ☐
Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____
Note: Regulation S-T Rule 101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to provide an attached annual report to security holders.
Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): ____
Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and
make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrant's "home country"), or under the rules of the home country exchange on which the registrant's securities are
traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrant's security holders, and, if discussing a material event, has already been the subject of a Form 6-K
submission or other Commission filing on EDGAR.
Indicate by check mark whether the registrant by furnishing the information contained in this Form, is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the
Securities Exchange Act of 1934.
Yes ☐ No ☒
If "Yes" is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- ________
MEDIA CONTACT:
|
INVESTOR CONTACT:
|
Gil Messing |
Kip E. Meintzer |
Check Point Software Technologies
|
Check Point Software Technologies
|
|
|
press@us.checkpoint.com |
ir@us.checkpoint.com |
Check Point Software Extends Leadership in Cloud
Security with Unmatched Serverless Protection
The acquisition of a pioneering serverless technology company further expands its
CloudGuard platform and Infinity architecture to protect cloud workloads from 6th
Generation’s Cyber Attacks
SAN CARLOS, CA — December 2nd, 2019 -- Check Point®
Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announces the acquisition of Protego, a new Serverless security technology company. With this acquisition, Check Point becomes the
first security vendor in the industry to have a consolidated security solution for cloud workload protection (CWPP) and security posture management (CSPM), delivering continuous serverless security with unmatched run time protection and
application hardening.
Protego provides a serverless security technology that prevents malicious attacks on serverless functions in run time, and prevents vulnerable code from being deployed into
production.
The rapid adoption of serverless computing technologies such as AWS Lambda is challenging existing cloud and application security paradigms. The move to cloud native
applications bears many inherent vulnerabilities and potential misconfigurations that require extending security solution to protect functions and code.
Check Point will be integrating innovative serverless security technology into its Infinity architecture,
the market leading consolidated security solution to support Networks, Mobile, Endpoint, IoT and Cloud environments.
The Check Point CloudGuard platform provides consistent and comprehensive cloud security for all assets in public, private, hybrid or multi-cloud environments. The
solution is now extended with serverless security providing the CISO with full visibility, control and complete security coverage of all serverless estate with a click of a button. Protego’s technology integrates out-of-the-box with the broadest
set of CI/CD frameworks so DevOps teams ensure that only compliant functions are deployed to production. In addition, customers rave the new technology for its innovative IAM hardening capabilities and minimal performance impact in protecting
serverless run time environments.
The transaction is expected to be closed in Q4 2019 and the technology will be integrated into the Infinity architecture in Q1 2020.
Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check
Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total
Protection with Gen V advanced threat prevention”, this combined product architecture defends enterprise’s cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system.
Check Point protects over 100,000 organizations of all sizes.
©2019 Check Point Software Technologies Ltd.
All rights reserved | P. 2
Signatures
Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.
|
CHECK POINT SOFTWARE TECHNOLOGIES LTD.
|
|
|
|
|
|
|
By:
|
/s/ Tal Payne |
|
|
|
Tal Payne |
|
|
|
Chief Financial Officer |
|
|
|
|
|
December 2, 2019 |
|
|
|
©2019 Check Point Software Technologies Ltd.
All rights reserved | P. 3