Check Point Software Technologies is a cybersecurity company based in Tel Aviv, Israel, founded in 1993. It specializes in providing a comprehensive range of security solutions designed to protect against cyberattacks. The company offers products for network security, endpoint security, cloud security, mobile security, and security management. Its solutions are aimed at enterprises, businesses, and individual consumers, helping them prevent, detect, and respond to various cyber threats. With approximately 5,000 employees, Check Point generates about 50% of its revenue from Europe, the Middle East, and Africa, 40% from the Americas, and 10% from the Asia-Pacific region.
Cyberint, established in 2010 and headquartered in Petah Tikva, Israel, specializes in proactive cybersecurity solutions. The company offers a digital risk protection platform that combines real-time threat intelligence with attack surface management, providing organizations with comprehensive visibility into their external risk exposure. Cyberint's platform autonomously discovers and monitors all external-facing assets, utilizing open, deep, and dark web intelligence to identify known and unknown digital risks. Serving over 100 global brands across diverse industries such as financial services, retail, gaming, and entertainment, Cyberint empowers clients to proactively safeguard their businesses against cyber threats, thereby reducing total cost of ownership.
Atmosec
Acquisition in 2023
Atmosec operates a security platform designed to provide continuous protection for hyperconnected SaaS ecosystems. The platform offers comprehensive security services that monitor the interactions of third-party SaaS applications, assessing their contextual security settings. By automating the identification and mitigation of actual and potential risks, Atmosec helps organizations safeguard their data against vulnerabilities that arise from the dynamic nature of their cloud environments. This proactive approach enables companies to effectively manage security risks as their digital ecosystems evolve.
Perimeter 81
Acquisition in 2023
Perimeter 81 is a company focused on simplifying the management of local networks, cloud infrastructures, and corporate applications through its unified cloud platform. This platform enables zero-trust access to on-premise resources and critical cloud environments, enhancing security and efficiency. By employing resilient IPSec tunnels that do not require an agent, Perimeter 81 ensures secure access to web applications. The company's solutions allow clients to comprehensively build, manage, and secure their networks within a multi-tenant cloud setup, streamlining network management while implementing a robust zero-trust model for resource and application access.
Cynamics
Venture Round in 2021
Cynamics is a provider of network detection and response solutions tailored for managed service providers, managed security service providers, and organizations of all sizes. The company leverages proprietary algorithms along with advanced artificial intelligence and machine learning to deliver threat prediction and comprehensive visibility across networks. Its unique network Blueprint technology employs advanced sampling techniques, allowing it to achieve complete visibility using only 1% of network traffic. This innovative approach not only enhances threat detection capabilities but also optimizes network performance and resource utilization. By normalizing diverse client networks, Cynamics facilitates a unified understanding of network behavior, empowering information technology and security teams to implement scalable and cost-effective visibility systems while preventing attacks before they occur.
Avanan
Acquisition in 2021
Avanan, Inc. is a cybersecurity company that specializes in cloud email security solutions designed to protect against sophisticated cyber threats. Founded in 2014 and headquartered in New York, with additional offices in Reston, Virginia, and a research center in Tel Aviv, Israel, Avanan's platform is engineered to detect and mitigate risks such as business email compromise, phishing, malware, data leakage, account takeover, and shadow IT across various cloud applications, including Office 365, Google Drive, and Slack. Utilizing application programming interfaces (APIs), the company's technology scans communication traffic to provide seamless, multi-layered security that enhances existing security measures. Avanan's innovative approach allows organizations to secure their entire cloud collaboration suite with a single, integrated solution, thereby streamlining cybersecurity efforts and reducing reliance on multiple security tools.
Odo Security
Acquisition in 2020
Odo Security Ltd. is a security platform company based in Tel Aviv-Yafo, Israel, founded in 2018. It specializes in managing and monitoring access to applications, servers, databases, and environments, while also enabling the connection, configuration, and deployment of remote cloud environments. Odo offers a range of products, including Server Access, Database Access, and Web Access, designed to facilitate centralized management of remote access for IT and DevOps teams across multi-cloud and on-premises infrastructures, eliminating the need for traditional VPNs. As of September 30, 2020, Odo operates as a subsidiary of Check Point Software Technologies Ltd.
Axis Security
Series A in 2020
Axis Security Inc. is a cybersecurity company founded in 2018 and based in Palo Alto, California. It specializes in providing Zero Trust Network Access solutions, focusing on secure remote access to applications. The company's platform employs application isolation technology and a context-aware security approach, evaluating various factors to ensure that only authorized users can access specific resources within a network. This allows organizations to maintain control over sensitive information while enabling access for employees, partners, and other stakeholders. Through its cloud security and analytics solutions, Axis Security aims to enhance data protection and streamline secure access to business applications.
Protego Labs
Acquisition in 2019
Protego Labs, Inc. specializes in security solutions tailored for serverless applications. Founded in 2015 and headquartered in Baltimore, Maryland, the company addresses the limitations of traditional application security by offering a comprehensive platform that continuously scans serverless infrastructures, including functions, logs, and databases. Utilizing machine-based analysis and deep learning algorithms, Protego Labs builds models of normal behavior to detect threats through anomaly detection as they arise. This approach not only enhances the security posture of applications but also minimizes the attack surface, allowing organizations to identify and prevent attacks in real-time. As of December 2019, Protego Labs operates as a subsidiary of Check Point Software Technologies Ltd.
Cymplify
Acquisition in 2019
Cymplify is a cybersecurity software provider specializing in the protection of Internet of Things (IoT) and connected devices from both known and unknown vulnerabilities. The company offers a simple, on-device protection mechanism that operates through a unique security protocol, creating a point-to-point mesh network among various endpoints, regardless of their operating system or architecture. Cymplify's solution emphasizes security-by-design by automating the hardening process and utilizing military-grade encryption. This automated, easy-to-activate system features a straightforward, one-click activation process that occurs at the end of the development cycle, encompassing image analysis, a cybersecurity posture report, and software hardening. Through these measures, Cymplify enables manufacturers of connected devices to enhance their security posture effectively and efficiently.
ForceNock
Acquisition in 2019
ForceNock developed a fully autonomous web application security solution that replaces existing WAF, API & bot mitigation solutions. The system frees the security teams from managing endless configurations and rules while continuing to maintain the highest level of security. In addition to the fully autonomous negative-security, fully automated or semi-automated positive security is provided in tandem with OWASP top 10, API logic abuse, layer 7 DoS, and protection from a variety other attacks. The ForceNock solution offered as a virtual appliance, AMI or Docker for private cloud deployment as a reverse proxy or plug-in to Nginx / Apache.
Dome9 Security
Acquisition in 2018
Dome9 Security Ltd. develops a SaaS platform focused on security and compliance for businesses utilizing public cloud infrastructure. The platform provides tools for visualizing security status within Amazon Web Services (AWS), remediating potential threats, and enforcing security policies without the need for agent deployment. It also includes Identity and Access Management (IAM) safety products that offer protection for cloud control planes and APIs, as well as features for tamper protection and configuration management. Additionally, Dome9 Magellan enhances security by delivering threat intelligence, event correlation, and intrusion detection. Founded in 2010 and based in Tel Aviv, Israel, Dome9 operates as a subsidiary of Check Point Software Technologies Ltd., offering its services to enterprises and hosting providers, while also supporting various cloud environments such as OpenStack and VMware vCloud.
Social Finance Israel
Grant in 2017
Social Finance Israel (SFI) is an Israeli not-for-profit organization, established in 2013, in order to issue Social Impact Bonds in Israel. Social Impact Bonds are an innovative way of attracting new investment from private investors in order to fund social organizations with a proven track record that aim to tackle Israel's most pressing social issues. Financial returns to investors are made by the public sector on the basis of improved social outcomes. Social Finance Israel (SFI) is based in Tel Aviv, Israel, and is a sister organization of Social Finance UK and Social Finance US.
Lacoon Security
Acquisition in 2015
Lacoon Security, established in 2011 and headquartered in Ramat-Gan, Israel, specializes in mobile cybersecurity solutions. The company offers the Lacoon Mobile Threat Management Platform, a SaaS solution that enables enterprises to manage and mitigate risks associated with Bring Your Own Device (BYOD) policies. This platform protects corporate assets from mobile cyber threats such as malicious apps, targeted network attacks, and advanced persistent threats on both iOS and Android devices. It augments existing security infrastructure, providing real-time security and intelligence, and uses a patented Behavioral Risk Engine to detect and quantify device, application, and in-network threats. Lacoon Security was founded by experts from mobile cybersecurity and defense industries, leveraging their experience from elite units of the Israeli Defense Forces to address the growing security risks posed by BYOD and corporate mobility trends. Since April 2015, the company has operated as a subsidiary of Check Point Software Technologies Ltd.
Hyperwise
Acquisition in 2015
Hyperwise is an enterprise cybersecurity startup focused on providing advanced protection against advanced persistent threat (APT) attacks. Still in stealth mode, the company is developing an innovative solution aimed at enhancing the speed and effectiveness of APT defense compared to existing market offerings. Hyperwise targets businesses and organizations, offering services designed to shield them from various cyber threats and risks, ensuring their digital assets remain secure.
SofaWare Technologies
Acquisition in 2013
SofaWare, founded in 1999 in partnership with Check Point Software Technologies and based in Ramat-Gan, Israel, specializes in firewall-based internet security solutions for the home and home office market. The company's flagship product, Safe@Home, allows service providers to offer managed security solutions, including content filtering and additional value-added services to their subscribers. Additionally, SofaWare provides a platform for the establishment and maintenance of Virtual Private Networks (VPNs), catering to the growing need for secure broadband access.
easy2comply (Dynasec)
Acquisition in 2011
easy2comply (powered by Dynasec) is a leading software provider for Governance, Risk Management and Compliance (GRC). With presence in the USA, Europe and Middle-East, easy2comply has several hundred customers and over 50,000 professionals working with its software, with around 60% in the areas of banking and insurance. easy2comply is a comprehensive platform which supports existing and emerging regulations with built in best practices, full functionality and adaptable workflow. Rapid implementation in an incremental approach enables organizations to deploy only the GRC modules that they really need, minimizing time, cost and impact to normal daily operations. Easy2comply is also flexible and customizable to the way the company operates, as opposed to requiring that the company adjust to the way the solution works. easy2comply enables companies to effectively manage multiple GRC processes on a single platform. Enabling the management of a single regulation or multiple GRC processes such as: Operational Risk Basel II Solvency II FCPA/Anti-Bribery Act Internal Control Sarbanes-Oxley (SOX) ISO27001 Internal Audit Business Continuity Management (BCM) And more.
Liquid Machines
Acquisition in 2010
Liquid Machines specializes in providing Enterprise Rights Management (ERM) solutions that enable organizations to manage and protect electronic corporate assets throughout their information lifecycle. Their software enhances operational efficiency while minimizing risks related to compliance violations and intellectual property theft. The company's offerings include document control software, which regulates access to electronic information, and Email Control, designed to secure communications by automatically encrypting sensitive data. Additionally, Liquid Machines offers Work-group Editions that focus on safeguarding information within specific departments such as human resources, finance, and legal. Their solutions are utilized across various industries, including consulting, financial services, government, legal, manufacturing, and healthcare, allowing organizations to maintain persistent control over their electronic information without disrupting user workflows.
FaceTime Communications
Acquisition in 2009
FaceTime Communications specializes in security solutions enabling businesses to secure and control greynet applications such as instant messaging, adware/spyware, webmail, P2P file sharing, web conferencing, and instant voice.
Nokia Security Appliances
Acquisition in 2009
A division of Nokia
NFR Security
Acquisition in 2006
NFR Security, founded in 1996 and based in Maryland, specializes in intrusion management solutions and enterprise network security software. The company caters to a diverse clientele, including telecommunications companies, Internet service providers, original equipment manufacturers, and managed service providers. NFR Security operates through a combination of channel partners and a direct sales force, ensuring a broad reach in the market. In 2006, the company was acquired by Check Point Software Technologies, further enhancing its capabilities in the cybersecurity sector.
PointSec
Acquisition in 2006
PointSec.
Sourcefire
Acquisition in 2005
Sourcefire, Inc. is a provider of enterprise threat management solutions focused on enhancing the cybersecurity of IT infrastructures across various sectors, including healthcare, financial services, manufacturing, energy, education, retail, telecommunications, and government organizations. Founded in 2001 and headquartered in Columbia, Maryland, the company develops both open source and commercial security products. Notably, its offerings include Snort, an open source intrusion prevention technology, and the Sourcefire 3D System, which integrates multiple security solutions such as intrusion prevention, network behavior analysis, and vulnerability assessment within a unified management framework. Additionally, Sourcefire provides ClamAV, an open source anti-virus and anti-malware solution. Alongside its products, the company offers technical support and professional services that encompass network security deployment, customer support, and certification training. Sourcefire markets its products through a direct sales force and through partnerships with resellers, distributors, and original equipment manufacturers.
Zone Labs
Acquisition in 2003
Zone Labs is a provider of endpoint security solutions, recognized for its trusted brand in Internet security. Founded in 1997 and headquartered in San Francisco, California, with additional offices in Frankfurt, Germany, Japan, and Singapore, the company protects millions of PCs and their sensitive information from hackers, spyware, and data theft. Its award-winning product line includes popular offerings such as ZoneAlarm Pro, ZoneAlarm Plus, and ZoneAlarm, which cater to global enterprises, small businesses, and individual consumers. Additionally, Zone Labs Integrity serves as an endpoint security management platform designed to safeguard corporate data and enhance productivity. The company also offers IMsecure Pro, which provides comprehensive security for instant messaging applications.
Vigil Technologies
Series A in 1999
Vigil Technologies, Inc. is a pioneer in the online intelligence market. The company provides the most time- effective online intelligence solutions that allow decision-makers, business researchers, and analysts to continuously monitor their business landscapes. e-Sense, Vigil's web-based service, automatically and incrementally gathers highly-relevant information based on user-defined business landscapes, while guaranteeing predictable and comprehensive coverage of open Internet sources.
Veriti
Veriti is a developer of a unified security posture management platform designed to enhance security while maintaining business continuity. The platform seamlessly integrates with a company's entire security infrastructure, allowing for continuous assessment of its risk posture. By analyzing security configurations, logs, sensor telemetries, and threat intelligence, Veriti enables organizations to proactively monitor potential threats and identify vulnerabilities. This approach allows for actionable remediation strategies to address security gaps and high-risk areas, ensuring that businesses can operate without disruption while effectively managing their security exposure.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at support@teaserclub.com. Your feedback is most welcome.