U.S. markets close in 5 hours 41 minutes

Check Point Software Technologies Ltd. (CHKP)

NasdaqGS - NasdaqGS Real Time Price. Currency in USD
Add to watchlist
128.55-1.49 (-1.15%)
As of 10:18AM EST. Market open.
Full screen
Trade prices are not sourced from all markets
Gain actionable insight from technical analysis on financial instruments, to help optimize your trading strategies
Chart Events
Bearishpattern detected
Momentum

Momentum

Previous Close130.04
Open130.04
Bid128.43 x 800
Ask128.63 x 1100
Day's Range127.84 - 130.04
52 Week Range80.06 - 139.26
Volume211,805
Avg. Volume1,092,648
Market Cap18.023B
Beta (5Y Monthly)0.66
PE Ratio (TTM)22.03
EPS (TTM)5.84
Earnings DateFeb 03, 2021
Forward Dividend & YieldN/A (N/A)
Ex-Dividend DateN/A
1y Target Est132.12
Fair Value is the appropriate price for the shares of a company, based on its earnings and growth rate also interpreted as when P/E Ratio = Growth Rate. Estimated return represents the projected annual return you might expect after purchasing shares in the company and holding them over the default time horizon of 5 years, based on the EPS growth rate that we have projected.
Fair Value
XX.XX
Overvalued
-16% Est. Return
Research that delivers an independent perspective, consistent methodology and actionable insight
Related Research
View more
  • If You Like EPS Growth Then Check Out Check Point Software Technologies (NASDAQ:CHKP) Before It's Too Late
    Simply Wall St.

    If You Like EPS Growth Then Check Out Check Point Software Technologies (NASDAQ:CHKP) Before It's Too Late

    Like a puppy chasing its tail, some new investors often chase 'the next big thing', even if that means buying 'story...

  • Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q4 2020
    GlobeNewswire

    Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q4 2020

    Check Point Research issues Q4 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal dataSAN CARLOS, Calif., Jan. 14, 2021 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its new Brand Phishing Report for Q4 2020. The report highlights the brands, which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during October, November and December.In Q4, Microsoft was again the brand most frequently targeted by cybercriminals, as it was in Q3 2020. Forty-three percent of all brand phishing attempts related to the technology giant (up from 19% in Q3), as threat actors continued to try to capitalize on people working remotely during the Covid-19 pandemic’s second wave. DHL maintained its position as the second most impersonated brand, with 18% of all phishing attempts related to it as criminals tried to take advantage of the online shopping season in November and December.The most likely industry to be targeted by brand phishing was technology, followed by shipping and retail, showing how threat actors are using well-known brands in these sectors to trick users as they grapple with remote working technology and order goods online during peak shopping periods.“Criminals increased their attempts in Q4 2020 to steal peoples’ personal data by impersonating leading brands, and our data clearly shows how they change their phishing tactics to increase their chances of success” Said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “As always, we encourage users to be cautious when divulging personal data and credentials to business applications, and to think twice before opening email attachments or links, especially emails that claim to from companies, such as Microsoft or Google, that are most likely to be impersonated.”In a brand phishing attack, criminals try to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site. The link to the fake website can be sent to targeted individuals by email or text message, a user can be redirected during web browsing, or it may be triggered from a fraudulent mobile application. The fake website often contains a form intended to steal users’ credentials, payment details or other personal information.Top phishing brands in Q4 2020 The top brands are ranked by their overall appearance in brand phishing attempts: 1. Microsoft (related to 43% of all brand phishing attempts globally) 2. DHL (18%) 3. LinkedIn (6%) 4. Amazon (5%) 5. Rakuten (4%) 6. IKEA (3%) 7. Google (2%) 8. Paypal (2%) 9. Chase (2%) 10. Yahoo (1%)DHL phishing email – password theft example During November we noticed a malicious phishing email which used DHL’s branding and was trying to steal users’ passwords. The email which was sent from the spoofed email address Parcel.docs@dhl.com, contained the subject “RE: Your DHL parcel (Available for pick up) – [ ]” with the user’s email. The attacker was trying to lure the victim to click on a malicious link, which redirected the user to a fraudulent login page in which the user needed to key in their password, which would then be sent to the site selected by the attacker (https://ipostagepay[.]ru/[.]mm0/).Microsoft phishing email – credentials theft example During December we observed a malicious phishing email which was trying to steal credentials of Microsoft Office 365 account users. The email contained the subject “Doc(s) Daily delivery - ” and the content impersonated eFax service. After the user clicks on the link, they are taken to another document which redirects the user to a fraudulent Microsoft login page.Check Point’s Brand Phishing Report is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime, which delivers threat data, and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 3 billion websites and 600 million files daily, and identifies more than 250 million malware activities every day.Follow Check Point Research via: Blog: https://research.checkpoint.com/ Twitter: https://twitter.com/_cpresearch_About Check Point Research Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 200 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.MEDIA CONTACT:INVESTOR CONTACT: Emilie Beneitez LefebvreKip E. Meintzer Check Point Software TechnologiesCheck Point Software Technologies press@checkpoint.com ir@us.checkpoint.com

  • December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat
    GlobeNewswire

    December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat

    Check Point Research reports a new campaign using the Emotet trojan which has targeted over 100,000 users per daySAN CARLOS, Calif., Jan. 07, 2021 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for December 2020. Researchers reported that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of ransomware attacks. But in November it was much less prevalent, dropping to 5th place in the Index. Researchers state that it has now been updated with new malicious payloads and improved detection evasion capabilities: the latest version creates a dialogue box, which helps it evade detection by users. Emotet’s new malicious spam campaign uses different delivery techniques to spread Emotet, including embedded links, document attachments, or password-protected Zip files.First identified in 2014, Emotet has been regularly updated by its developers to maintain its effectiveness for malicious activity. The Department of Homeland Security has estimated that each incident involving Emotet costs organizations upwards of $1 million to rectify.“Emotet was originally developed as banking malware which sneaked on to users’ computers to steal private and sensitive information. However, it has evolved over time and is now seen as one of the most costly and destructive malware variants,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “It’s imperative that organizations are aware of the threat Emotet poses and that they have robust security systems in place to prevent a significant breach of their data. They should also provide comprehensive training for employees, so they are able to identify the types of malicious emails which spread Emotet.”The research team also warns that “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 42% of organizations globally, followed by “HTTP Headers Remote Code Execution (CVE-2020-13756)” which impact 42% of organizations worldwide.Top malware families *The arrows relate to the change in rank compared to the previous month.This Month, Emotet remains the most popular malware with a global impact of 7% of organizations, closely followed by Trickbot and Formbook – which impacted 4% of organizations worldwide, each. 1. ↑ Emotet – Emotet is an advanced, self-propagate and modular Trojan. Emotet once used to employ as a banking Trojan, and recently is used as a distributer to other malware or malicious campaigns. It uses multiple methods for maintaining persistence and Evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links. 2. ↑ Trickbot \- Trickbot is a dominant banking Trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customizable malware that can be distributed as part of multi purposed campaigns. 3. ↑ Formbook - Formbook is an Info Stealer that harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to its C&C orders. Top exploited vulnerabilitiesThis month “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 42% of organizations globally, followed by “HTTP Headers Remote Code Execution (CVE-2020-13756)” which impact 42% of organizations worldwide. “Web Server Exposed Git Repository Information Disclosure” is on the third place in the top exploited vulnerabilities list, with a global impact of 41%. 1. ↑ MVPower DVR Remote Code Execution \- remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. 2. ↓ HTTP Headers Remote Code Execution (CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. 3. ↑ Web Server Exposed Git Repository Information Disclosure - information disclosure vulnerability has been reported in Git Repository. Successful exploitation of this vulnerability could allow an unintentional disclosure of account information. Top mobile malwareThis month, Hiddad holds 1st place in the most prevalent mobile malware, followed by xHelper and Triada. 1. Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. 2. xHelper - A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisement. The application is capable of hiding itself from the user and reinstall itself in case it was uninstalled. 3. Triada - Modular Backdoor for Android which grants superuser privileges to downloaded malware. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily and identifies more than 250 million malware activities every day.The complete list of the top 10 malware families in December can be found on the Check Point Blog. Follow Check Point Research via: Blog: https://research.checkpoint.com/ Twitter: https://twitter.com/_cpresearch_About Check Point Research Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprise’s cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.MEDIA CONTACT:   INVESTOR CONTACT: Emilie Beneitez Lefebvre     Kip E. Meintzer Check Point Software Technologies        Check Point Software Technologies     press@checkpoint.com     ir@us.checkpoint.com