FORM 20-F - Check Point
FORM 20-F - Check Point
FORM 20-F - Check Point
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Overview<br />
We develop, market, and support a wide range of software and combined hardware and software products<br />
and services for information technology (IT) security, and offer our customers an extensive range of network<br />
security, data security and management solutions. A broad range of our network security solutions operate under a<br />
unified security architecture, with central management and enforcement of security policy, and with centralized,<br />
real-time security updates. Our Open Platform for Security (OPSEC) framework, allows customers to extend the<br />
capabilities of our products and services, enabling integration with leading hardware appliances and third-party<br />
security software applications. Our products and services are sold to enterprises, service providers, small and<br />
medium-sized businesses and consumers. Our products are sold, integrated and serviced by a network of partners<br />
around the world.<br />
In January <strong>20</strong>07, we completed a tender offer for the outstanding shares and warrants of Protect Data AB<br />
(“Protect Data”), which at the time was a public company listed on the Stockholm Stock Exchange. As of<br />
December 31, <strong>20</strong>07, we had acquired the rights to all of the shares and warrants of Protect Data, on a fully diluted<br />
basis, and completed the integration of Protect Data into <strong>Check</strong> <strong>Point</strong>’s business. Protect Data operates its<br />
business through its wholly owned subsidiary, <strong>Point</strong>sec Mobile Technologies AB, a worldwide provider of mobile<br />
data protection. <strong>Point</strong>sec delivers solutions for automatic data encryption that keeps the sensitive information<br />
stored on mobile computing devices, such as laptops, PDAs, smartphones, and removable media (e.g., USB<br />
devices), confidential and secure. With the acquisition of Protect Data, <strong>Check</strong> <strong>Point</strong> entered the data security<br />
market.<br />
Our business is subject to the effects of general global economic conditions and, in particular, market<br />
conditions in the IT, Internet security, and data security industries. If general economic and industry conditions<br />
fail to improve, or if they deteriorate, demand for our products could be adversely affected.<br />
We derive most of our revenues from sales of Internet security products primarily under our VPN-1 and<br />
related brands, as well as related revenues from software updates, maintenance and other services. We expect this<br />
to continue to be the case in the foreseeable future. Following the acquisition of Protect Data in <strong>20</strong>07, we expect<br />
to derive revenues also from data security products and associated software updates, maintenance and support<br />
services.<br />
We derive our sales primarily through indirect channels. During <strong>20</strong>07, we derived approximately 49% of<br />
our sales from our ten largest distributors (compared to 48% in <strong>20</strong>06), with the largest distributor accounting for<br />
approximately 16% of our sales, and the second largest distributor accounting for approximately 14% of our sales.<br />
During <strong>20</strong>06, these two distributors accounted for approximately 26% of our sales with the largest distributor<br />
accounting for approximately 15% of our sales, and the second largest distributor accounting for approximately<br />
11% of our sales.<br />
40