6. Business Model
Check Point Software Technologies (NASDAQ: CHKP)
Check Point Software Technologies is a developer of network
security software. They have a broad portfolio of security products
that can be divided into four categories: threat prevention, mobile
security, firewalls, and management.
• Threat prevention consists of software designed to stop
viruses, malware and spyware on PCs, servers, and other
network devices
• Mobile security software is threat prevention streamlined and
designed for use on mobile devices and endpoints
• Firewalls prevent unauthorized access to a network and are
divided into enterprise and small business
• Management tools include monitoring, analysis, and policy to
ensure all software is working
Headquartered in Tel Aviv, Israel, Check Point
Software sells their products through
distributors and directly to firms online
Founder, Chairman, and CEO: Gil Shwed:
5Description
Products
and
Licenses
36%
Subscriptions
15%
Software
Updates and
Maintenance
49%
Business Segments
Americas
46%
Europe
37%
Asia,
Middle
East,
Africa
17%
Geographic Segments
7. Competitive Landscape
Check Point Software Technologies (NASDAQ: CHKP)
Description
• Fortinet, Inc. (FTNT)
• Fortinet is a multinational corporation that sells high
performance network security products and services
including their flagship product, the FortiGate firewall.
Fortinet distributes its systems via more than 20,000
partners worldwide.
• FireEye, Inc. (FEYE)
• FireEye is a leader in providing cyber security
solutions. They utilize a combination of technology,
intelligence, and expertise – reinforced with an incident
response team – to detect cyber attacks as they
happen, understand the risk they pose, and respond
quickly to eradicate them. FireEye is Check Point’s
principal competitor.
• Palo Alto Networks, Inc. (PANW)
• Palo Alto Networks is an American network security
company that protects thousands of enterprise,
government, and service provider networks from cyber
threats. They offer threat protection, URL filtering, and
specialize in advanced firewalls designed to provide
both network security and visibility.
6
9. Global Demand for Network Security
Check Point Software Technologies (NASDAQ: CHKP)
Drivers
The need for IT security is critical as connectivity and data continue to grow across the world; Check Point Software is
there to meet that need
• The Growing Needs of Businesses
• Large businesses are starting to utilize more and more Big Data
• Big Data is a massive volume of data that requires specialized software and services to utilize
• 67% of executives have reported big data initiatives running in production, up 32% from 2013
• Healthy businesses growth in highest sales areas
• 84% of mid-sized US businesses and 65% of small US businesses preparing to expand growth
• 73% of mid-sized US businesses have a website and 40% of small US businesses do
• 38% of small US businesses plan on creating a web site within 12 months
• Eurozone business growth nearing a 46-month high based on latest purchasing managers index
• PMI up to 54.1 from 53.3 in February
• Wireless networks are seeing increasing adoption and scale where they already exist
• 89% of companies rely on wireless capabilities, up from 75% in 2011
• Wireless data traffic will continue to grow 66% a year for the next three years
• Enterprise attacks are occurring at an unprecedented rate
• 783 successful breaches in 2014, a 14% increase
• Ebay, Target, and Sony
• The Growing Needs of Governments
• Cyber-attacks and cyber-espionage biggest threats
to national security
• 61,000 attacks on the federal government
each day last year
• Last year public sector sales
accounted for 10% of Check Point’s profits
8
10. Strategic Positioning in Network Security
Check Point Software Technologies (NASDAQ: CHKP)
Drivers 9
Check Point Security is poised to capitalize on the growing need for IT security due to its strategic positioning within the
very broad market for data security
• Focused research & development is the key to engineering better products than its main competitors
• R&D expenditures have steadily increased to $133 million in 2014, up from $115 million in 2013
• Company reported 1,055 dedicated employees to R&D and is actively hiring 38 more
• Holds 34 patents with 19 more pending
• Constantly improving security offerings
• Introduction of ThreatCloud
• Industry’s largest real time security updater
• Implementation of Software Blade architecture
• First and only security architecture that delivers flexible and easy to manage software to
businesses of all sizes
• Security Gateway Module 260 doubles firewall and
IPS throughput to 400 Gbps and 130 Gbps and
doubles security power up to 33,00 SecurityPower
Units
• Proven track record
• Large customer base that contains all Fortune 100
companies, all Fortune 500 companies, and all
Global 500 companies
• High switching costs
• Opportunity with governmental legislature
• We believe the high attention on high-profile security could
lead to government action for cyber-security
• Sarbanes-Oxley equivalent, mandates, regulations
• Cybersecurity Information Sharing Act of 2014
11. Opportunity in Wireless Connectivity
Check Point Software Technologies (NASDAQ: CHKP)
Drivers
Growing demand for cloud and mobile security solutions provides new growth opportunities for the company in the coming
years
• The Rise of “The Cloud”
• Spending for cloud services expected to grow to $180 billion by 2017, a CAGR of 23% from 2013-2017
• Hackers can gain access to huge stores of info in single attack
• Check Point is key player in this domain, offering customizable security to meet company-specific needs
• Private Cloud
• Virtualization of existing Checkpoint security gateways
• Security for already virtualized company clouds
• Public Cloud
• Security for Amazon Web Services, Microsoft Azure, Rackspace OpenStack
• Acquired Hyperwise, first pre-infection eradication software (everything else = post-infection)
• The Rise of Mobile in Corporations
• 93% of employees connecting phones to company’s networks
• Need to be connected to the company’s info
• 5% of iPhones/tablet have antivirus
• 40% US bus. had security breach from mobile attacks
• Check Point = leader in mobile sec.
• Checkpoint Capsule
• Secure Viewing
• Pre/Post infection
• Document protection
• Device wipe option
10
19. Price Target Scenario
Check Point Software Technologies (NASDAQ: CHKP)
Valuation 18
Implied DCF Intrinsic Valuation Range Price Target Weighting
Intrinsic Value Per Diluted Share (a) $98.61 65.0%
2.25% 2.50% 2.75%
Base $98.61
6.96% $105.07 $110.36 $116.31 Bull $104.81
7.21% $99.47 $104.15 $109.39 Bear $89.20
7.46% $94.43 $98.61 $103.25 Change offset on Projections sheet and copy/paste 3 scenario targets
7.71% $89.88 $93.62 $97.76
7.96% $85.75 $89.11 $92.82
Implied DCF EV/Sales Valuation Range
Check Point Software Implied $89.52 35.0%
Equity Value per Diluted Share
$72.52 Weighted Price Target
$81.02 Base $95.43 65%
$89.52 Bull $99.46 20%
$98.01 Bear $89.31 20%
$106.51 Please include conviction level behind ea
Implied DCF EV/EBITDA Valuation Range
Check Point Software Implied $130.97 0.0%
Equity Value Per Diluted Share
$121.48
$126.23
$130.97
$135.72
$140.47
Did not use due to two large
outliers in our competitors'
EV/EBITDA
comments
8.4x
25.3x
26.3x
27.3x
28.3x
29.3x
Average EV/EBITDA
for Peer Group
11.4x
12.4x
10.4x
Check Point Software
Median EV/Sales
for Peer Group
Discount Rate
9.4x
20. Bull & Bear Case
Check Point Software Technologies (NASDAQ: CHKP)
Valuation
• Bull Case
• Several more high profile network security breaches bring even more public
scrutiny to the issue
• Check Point recently introduced mobile security software experiences
widespread adoption
•Government legislature requires stronger security measures
• Bear Case
• Check Point fails to distinguish itself from its competitors in the future
• Cyber security importance diminishes in the eyes of the public and
corporations due to a decline in breaches
• Unable to generate demand for mobile security
• Our Case
• More and more businesses are compelled to further their cyber security
solutions in order to preempt a breach
• Data will continue to grow at or above the current rate in which it is being
created, causing an increasing need for data security
• Hackers continue developing sophisticated new forms of malware and
increase cyber attacks
19
23. Company & Industry Risk
Check Point Software Technologies (NASDAQ: CHKP)
Risk Analysis
• Industry Risk
• Check Point competes in a very competitive industry and this is only expected
to grow in the future. They are also relatively small compared to companies like
Cisco and Microsoft that offer their own security solutions even though they may
not specialize in them. All network security companies are competing on a daily
basis against the hackers that wish to breach enterprise, government, and
individual files.
• Company Risk
• Check Point spends a lot of money researching and developing new security
solutions. If products such as their recently introduced mobile security software
fail, they will be losing out on a large and important market as well as suffering in
sales. All firms are constantly under attack and hackers might see the irony in
breaching Check Point’s databases which would lead to a large loss in
confidence. Check Point runs the risk of falling behind it’s competitors as well.
22
31. Correlation & Debt Distribution
Check Point Software Technologies (NASDAQ: CHKP)
Appendix 30
32. Appendix Notes
Check Point Software Technologies (NASDAQ: CHKP)
Appendix
SunTrust survey of 564 businesses
Barlow Research of 680 small business
31