Home » Computer & Software » Hardware » Check Point Software Technologies Reports 2015 Second Quarter Financial Results
Ihren XING-Kontakten zeigen

Check Point Software Technologies Reports 2015 Second Quarter Financial Results

SAN CARLOS, CA — (Marketwired) — 07/22/15 — (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced its financial results for the second quarter ended June 30, 2015.

Total Revenue: $395 million, representing a 9 percent increase year over year

Non-GAAP Operating Income: $221 million, representing a 7 percent increase year over year

Non-GAAP EPS: $0.99, representing an 11 percent increase year over year

Deferred Revenues: $780 million, representing an 18 percent increase year over year

“We continued to post good financial results in the second quarter. Total revenues from products and software blades subscriptions delivered 11 percent growth, which was driven by strong demand across industries and business segments. Data Center, Super High-End and SMART-1 Management appliances drove product revenue growth. Subscription growth was driven by demand for our new and innovative technologies including Threat Emulation and Threat Extraction which combat advanced cyber-attacks,” said Gil Shwed, founder and chief executive officer of Check Point Software Technologies.

$395 million compared to $363 million in the second quarter of 2014.

$199 million compared to $190 million in the second quarter of 2014.

$221 million compared to $207 million in the second quarter of 2014.

GAAP net income was $163 million compared to $160 million in the second quarter of 2014. GAAP earnings per diluted share were $0.88 compared to $0.83 in the second quarter of 2014.

Non-GAAP net income was $183 million compared to $172 million in the second quarter of 2014. Non-GAAP earnings per diluted share were $0.99 compared to $0.89 in the second quarter of 2014.

As of June 30, 2015, deferred revenues were $780 million compared to $660 million as of June 30, 2014.

Cash flow from operations increased to $193 million from $168 million in the second quarter of 2014.

During the second quarter of 2015, the company repurchased 2.9 million shares at a total cost of $245 million compared to $194 million in the second quarter of 2014.

$3,611 million as of June 30, 2015, compared to $3,643 million as of June 30, 2014. The change reflects our strong cash flow, offset by expanded share repurchase program and the Company–s recent acquisitions.

For information regarding the non-GAAP financial measures discussed in this release, as well as a reconciliation of such non-GAAP financial measures to the most directly comparable GAAP financial measures, please see “Use of Non-GAAP Financial Information” and “Reconciliation of GAAP to Non-GAAP Financial Information.”

We launched the following new products and technologies:

– The expands Check Point–s mobile security portfolio by adding advanced mobile application threat emulation, behavioral risk analysis and real-time anomaly detection capabilities.

– The launch of the is an extension of Check Point–s solutions for Industrial Control Systems (ICS) and critical infrastructure. The 1200R is a ruggedized security gateway appliance purposely-built for deployment in remote often harsh environments. It delivers full visibility and granular control of SCADA traffic to prevent network, devices and logical process attacks.

– designed for VMware NSX to extend comprehensive, best-in-class security to private cloud environments. The integrated solution allows customers to accelerate security deployment in virtualized datacenter environments for east-west traffic. The solution prevents zero-day attacks, APTs and other security threats within the private cloud.

We have also expanded our research and security partnerships, including:

Check Point issued its annual Security Report, based on collaborative research and in-depth analysis from more than 16,000 Threat Prevention gateways and 1 million smartphones. The report revealed that 96% of organizations are using high-risk applications and that there was an increase in security incidents across all categories: more data leakage incidents, additional attacks and malware and an increase in malicious sites being accessed. The report is available at .

Check Point–s Malware and Vulnerability Research Group recently discovered a critical RCE (remote code execution) vulnerability in eBay–s Magento web ecommerce platform, affecting nearly two hundred thousand online shops. If exploited, the vulnerability would give the attacker the ability to compromise an online store based on the Magento platform, including credit card information and other customer financial and personal data.

Check Point and FireEye announced the sharing of threat intelligence to protect mutual customers from modern advanced attacks. As part of this cooperation, Check Point–s ThreatCloud and Next Generation Threat Prevention solutions and the FireEye NX platform will share the latest threat intelligence in real-time, allowing customers to update firewall security policies dynamically based on the intelligence from both platforms.

We received the following industry accolades:

Check Point is positioned as a Leader in the Gartner Magic Quadrant for Enterprise Network Firewall. The company has been in the Leaders quadrant since 1997.(1)

– Check Point led in the worldwide market share for Firewall Equipment for Q1 2015, according to the Gartner Market Share: Enterprise Network Equipment by Market Segment, Worldwide reports.(2)

– Check Point continued to be the number one vendor in worldwide combined Firewall and UTM appliance revenue for Q1 2015, according to the IDC Worldwide Quarterly Security Appliance Tracker.(3)

“We are pleased with the increased demand for our latest technologies to combat cyber-attacks and the healthy interest in our mobile threat prevention technologies. We continue to execute on our vision for a consolidated security platform that addresses tomorrow–s security needs,” Shwed concluded.

August 5, 2015 – New York, NY

August 11, 2015 – Vail, CO

September 10, 2015 – New York, NY

September 16-17, 2015 – Las Vegas, NV (1×1 meetings only)

Members of Check Point–s management team are expected to present at these conferences and discuss the latest company strategies and initiatives. Check Point–s conference presentations are expected to be available via webcast on the company–s web site. To view these presentations and access the most updated information please visit the company–s web site at . The schedule is subject to change.

Check Point will host a conference call with the investment community on July 22, 2015 at 8:30 AM ET/5:30 AM PT. To listen to the live webcast, please visit the website at: . A replay of the conference call will be available through July 29, 2015 on the company–s website or by telephone at +1.201.612.7415, replay ID number 13614245.

Check Point Software Technologies Ltd. (), the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyber-attacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises– networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.

©2015 Check Point Software Technologies Ltd. All rights reserved

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to the increased demand for, and penetration of, our latest technologies to combat cyber-attacks and the interest in our mobile threat prevention technologies; our continued execution on our vision for a consolidated security platform that addresses tomorrow–s security needs; and our expectations for our products, services and technology and the market acceptance thereof. Our expectations and beliefs regarding these matters may not materialize, and actual results in future periods are subject to risks and uncertainties that could cause actual results to differ materially from those projected. These risks include our ability to continue to develop platform capabilities and solutions; customer acceptance and purchase of our existing solutions and new solutions; the market for IT security continuing to develop; competition from other products and services; and general market, political, economic and business conditions. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F for the year ended December 31, 2014, filed with the Securities and Exchange Commission on April 24, 2015. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

In addition to reporting financial results in accordance with generally accepted accounting principles, or GAAP, Check Point uses non-GAAP measures of net income, operating income and earnings per share, which are adjustments from results based on GAAP to exclude stock-based compensation charges, amortization of intangible assets and acquisition related expenses and the related tax affects. Check Point–s management believes the non-GAAP financial information provided in this release is useful to investors– understanding and assessment of Check Point–s ongoing core operations and prospects for the future. Historically, Check Point has also publicly presented these supplemental non-GAAP financial measures in order to assist the investment community to see the Company “through the eyes of management,” and thereby enhance understanding of its operating performance. The presentation of this non-GAAP financial information is not intended to be considered in isolation or as a substitute for results prepared in accordance with GAAP. A reconciliation of the non-GAAP financial measures discussed in this press release to the most directly comparable GAAP financial measures is included with the financial statements contained in this press release. Management uses both GAAP and non-GAAP information in evaluating and operating business internally and as such has determined that it is important to provide this information to investors.

(1) G00263955. Adam Hils, Greg Young, Jeremy D–Hoinne. 22 April 2015.

(2) Gartner, Inc., Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 1Q15, Christian Canales, Petr Gorodetskiy, Naresh Singh, and Joe Skorupa, June 2015. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner–s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(i-ii) Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner–s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(3) Source: IDC Worldwide Quarterly Security Appliance Tracker 1Q2015, June 4, 2015.

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop