CHKP Check Point Software Technologies Ltd.

Check Point Software Technologies Recognized by Forbes as World’s Leading Cybersecurity Employer

Check Point Software Technologies Recognized by Forbes as World’s Leading Cybersecurity Employer

Inclusion in the annual Forbes World’s Best Employers list recognizes Check Point’s strong culture, gender equality and corporate social responsibility

SAN CARLOS, Calif., Oct. 13, 2022 (GLOBE NEWSWIRE) -- For the third year in a row, Forbes has named (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, to its list of the . With over 6,000 employees around the world, Check Point continues to be recognized as the world’s number one cybersecurity employer and praised for its strong company culture, gender equality and corporate social responsibility.

“Our people are our greatest asset in making the world a safer and more secure place,” said Yiftah Yoffe, Worldwide VP of Human Resources at Check Point Software Technologies. “Our whole company ethos is centered around organizations deserving the best security and we can only do that with the best people. We strive every day to foster a collaborative and innovative culture with commitment to gender equality, diversity and inclusion while positively impacting our local communities. It’s fantastic to have this recognized by Forbes.”

The Forbes World’s Best Employers 2022 list is based on independent surveys of 150,000 employees across 57 countries working for multinational companies and institutions. Surveyed by market research firm Statista, employees were asked to rate their willingness to recommend their employers to friends and to evaluate other employers in their respective industries that stood out either positively or negatively. Check Point moved up in this year’s IT, Internet, Software & Services category rankings to spot #19 versus #23 in 2021 and #33 in 2020, with spot #175 in the full list out of 800 organizations.

Rupal Hollenbeck, Chief Commercial Officer at Check Point, added, “We invest greatly in the training and development of our colleagues worldwide and have always been committed to their wellbeing. With the current global uncertainty and dialogue around the ‘great resignation’, it is especially meaningful for us to receive this recognition based on employee surveys.”

She continued: “As cyberattacks continue to threaten and damage individuals and organizations around the world, we are proud of our highly valued and committed employees who make the difference in designing and deploying innovative solutions.”

Environmental, Social and Governance (ESG) is something that Check Point takes seriously. Not only does it promote core values of honest and ethical conduct, integrity, open communication, equal opportunity and diversity, but Check Point also takes an active part in helping to ensure the sustainability of the world’s resources and environment. It also runs special programs dedicated to developing the careers of its female employees and more than half of Check Point’s top executive management positions are held by women.

Follow Check Point via:

Twitter: 

Facebook: 

Blog:

YouTube: 

LinkedIn:

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT: INVESTOR CONTACT:
Liz Wu Kip E. Meintzer
Check Point Software Technologies Check Point Software Technologies
   

 



EN
13/10/2022

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise...

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale A unified AI security control plane delivering end-to-end protection across employee AI use, AI applications, and agentic systems REDWOOD CITY, Calif., March 23, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today announced the , a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business. As AI systems move from assistants to autonomous actors that access data, invoke tools, and t...

 PRESS RELEASE

Check Point Releases AI Factory Security Blueprint to Safeguard AI Inf...

Check Point Releases AI Factory Security Blueprint to Safeguard AI Infrastructure from GPU Servers to LLM Prompts As enterprises and neo-clouds invest billions in private AI infrastructure, Check Point delivers the industry's most comprehensive security architecture for AI data centers REDWOOD CITY, Calif., March 23, 2026 (GLOBE NEWSWIRE) --  (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released the — a comprehensive, vendor-tested reference architecture for securing private AI infrastructure from the hardware layer to the application layer. Leveraging...

 PRESS RELEASE

Check Point Enables Email Security Telemetry to Flow into CrowdStrike ...

Check Point Enables Email Security Telemetry to Flow into CrowdStrike Falcon Next-Gen SIEM REDWOOD CITY, Calif., March 17, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into . The integration allows security teams to ingest and correlate email-based activity with downstream identity and endpoint signals during investigations, helping connect activity from inbox to endpoint within a single workflow. “Email remains a primary entry point for credential theft and account takeover,” sai...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch