Skip to main content

AI assistant

Sign in to chat with this filing

The assistant answers questions, extracts KPIs, and summarises risk factors directly from the filing text.

CHECK POINT SOFTWARE TECHNOLOGIES LTD Foreign Filer Report 2012

Jun 7, 2012

30257_ffr_2012-06-07_8466ea49-9b43-49d1-9e99-feed2dd44ae9.zip

Foreign Filer Report

Open in viewer

Opens in your device viewer

6-K 1 zk1211590.htm 6-K zk1211590.htm Licensed to: ZK Global Document Created using EDGARizer 2020 5.4.1.0 Copyright 1995 - 2009 Thomson Reuters. All rights reserved.

UNITED STATES

SECURITIES AND EXCHANGE COMMISSION

Washington, D.C.20549

FORM 6-K

Report of Foreign Private Issuer

Pursuant to Rule 13a-16 or 15d-16

of the Securities Exchange Act of 1934

For the month of June, 2012

Commission File Number 0-28584

CHECK POINT SOFTWARE TECHNOLOGIES LTD.

(Translation of registrant's name into English)

5 Ha’solelim Street, Tel Aviv, Israel

(Address of principal executive offices)

Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F.

Form 20-F x Form 40-F o

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____

Note: Regulation S-T Rule 101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to provide an attached annual report to security holders.

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): ____

Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrant's "home country"), or under the rules of the home country exchange on which the registrant's securities are traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrant's security holders, and, if discussing a material event, has already been the subject of a Form 6-K submission or other Commission filing on EDGAR.

Indicate by check mark whether the registrant by furnishing the information contained in this Form, is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the Securities Exchange Act of 1934.

Yes o No x

If "Yes" is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- __

software blades TM © 2012 Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals | P. 1

Investor Contact Media Contact
Kip E. Meintzer Stephanie Look
Check Point Software Technologies Check Point Software Technologies
+1.650.628.2040 +1 650.628.2171
[email protected] [email protected]

CHECK POINT SOFTWARE TECHNOLOGIES LTD. SHAREHOLDERS APPROVE ALL

2012 ANNUAL GENERAL MEETING PROPOSALS

REDWOOD CITY, Calif., -- June 7, 2012 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that shareholders approved all five proposals presented at the 2012 Annual General Meeting. Approximately 178 million shares, representing approximately 86 percent of the shares outstanding as of the record date, were voted at the meeting. Check Point would like to thank shareholders for the support and confidence they have in the company and its employees.

For more information on the agenda items, please see the company's proxy statement for the annual general meeting of shareholders:

http://www.checkpoint.com/corporate/investor-relations/annual-general-meeting/2012.html .

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2012 Check Point Software Technologies Ltd. All rights reserved.

software blades TM © 2012 Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals | P. 2

Signatures

Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.

By: /s/ Tal Payne
June 7 th , 2012 Tal Payne
Chief Financial Officer

software blades TM © 2012 Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals | P. 3