Check Point Software Technologies Ltd. (CHKP)

Get CHKP Alerts
*Delayed - data as of Jul. 28, 2015 9:42 ET  -  Find a broker to begin trading CHKP now
Exchange: NASDAQ
Industry: Technology
Community Rating:
View:    CHKP Pre-Market
Symbol List Views
FlashQuotes InfoQuotes
Stock Details
Summary Quote Real-Time Quote After Hours Quote Pre-market Quote Historical Quote Option Chain
Basic Chart Interactive Chart
Company Headlines Press Releases Market Stream
Analyst Research Guru Analysis Stock Report Competitors Stock Consultant Stock Comparison
Call Transcripts Annual Report Income Statement Revenue/EPS SEC Filings Short Interest Dividend History
Ownership Summary Institutional Holdings Insiders
(SEC Form 4)
 Save Stocks

Check Point Software Technologies (CHKP)

UBS Global Technology Conference

November 15, 2012 12:00 PM ET


Kip Meintzer - Head, IR

Tal Payne - CFO


Brent Thill - UBS


Brent Thill - UBS

Thank you. And welcome everyone to launch. So Check Point is here for launch, we’re going to keep this interactive again for you, feel free to jump in with question. I have a handful of questions. But Check Point as many of you know has really been the de facto in the standalone security market, if you add all the players behind them up they don’t even get close to the revenue figure. I think it gives you a sense of their scale of standalone vendor, their cash flow has been a standout and we’re really happy to have Tal Payne with us CFO; Kip Meintzer, Head of Investor Relations, many of you know him for quiet sometime, Kip needs to read the Safe Harbor statement.

Kip Meintzer

So we’ll just start off with the Safe Harbor, obviously during the course of the presentation, and subsequent Q&A, there could be some forward-looking statements. They are covered under the Securities and Exchange Act of 1934. As far as the statements are concerned, you can find all the risk factors associated with them in our latest press release or our 20-F file for the year-ending December 31, 2011. And also we make no duty to update any of the forward looking statements that are made. With that, I'll throw it back to Brent and we’ll go from there.

Brent Thill - UBS

Great. May be at a little high level if you could just help level that, we’ve had a handful of security coming here this week and I think it’s been pretty interesting to hear about how defensive these businesses are. May be if you can just talk through why, your particular industry has been so defensive and why you continue to effectively, all our network spaces continue to outgrow some of the other categories of security.

Tal Payne

Sure. So first if you look through historical data you will see that in recession period, your tougher macroeconomic environment, security is usually more, it’s not protective completely but the effect is slightly muted because it’s a critical infrastructure, it’s critical for the organization to protect their environment and it’s less of a discount environment and price competitive environment, although there is competition. Its more about the quality of your technology and the value they provide to your customers. So we’ve been seeing it for quite a few recessions and hopefully we’ll go through that one that we might be going through right now.

Brent Thill - UBS

Just on the network side that has been a particular (inaudible) what’s going on there versus what’s you’re seeing just as it relates to some of the end point categories. What’s drawing customers into this?

Tal Payne

So I think endpoint specifically is more a commoditized environment, network is special since it require very high level of security skill. On the other hand, network going through consolidating in the different adjacent markets of the network.

So if we look historically network security started with a firewall and then there were many different security solutions that appears, there were antivirus, anti-spam, then URL filtering, IPS and so on. And each one was almost like a separate universe that had different competitors that played separately.

Since probably 2005-2006 we see more and more companies requesting to simply this complicated universe and consolidate this functionalities for them. Obviously the higher you go the less you need it, because you have the budget, you have the manpower to maintain all these different security solution, and the lower you go, the more consolidation you need.

Now the consolidation that is required is not only on the purpose to reduce the total cost of ownership that you don’t have to have a separate gateway per security solution, but also because it became unmanageable. When you think of a regular IT department, if you have to manage more than 10 different security solutions, it’s quite complicated. Not only that you have to have a separate book for each one, you have to put the rules and the policies in each one of these solutions. You need to learn how each product is working. You need to have to update the software every six months.

So it’s quite complicated universe and more and more customers came to us as market leader. We are today number one security player in the network, standalone player in the network, also not standalone. And they expect us to do that work for them. So in mid-2009 we came with a soft tool blade architecture which goes to your question of why this network security is doing so well because as we consolidate this market, it allows our main market to grow faster than those adjacent markets as a result of the consolidation. So that’s how it works.

Brent Thill - UBS

Over the last three years, you know prior to this year, you had taken market share every single year. So have some of the other players and what’s interesting is, if you look at Cisco and Juniper, they have a combined pool of over $2 billion of security, spent in fields like many benefited because of Cisco and Juniper’s lack of on this space.

Read the rest of this transcript for free on