1. Executive Forensic Overview and Audit Scope
1.1 Scope of Inquiry
This forensic audit, commissioned under the purview of Defense Logistics Analysis, executes a rigorous examination of Check Point Software Technologies Ltd. (NASDAQ: CHKP). The primary objective is to document, verify, and structurally map the entity’s operational, material, and ideological integration with the Israeli Ministry of Defense (IMOD), the Israel Defense Forces (IDF), and the administrative apparatus of the occupation of Palestinian territories.
The analysis specifically targets the delineation between incidental commercial activity and systemic military complicity. To achieve this, the audit rigorously traces four vectors of integration: direct defense contracting, dual-use technology supply, logistical sustainment of military and carceral zones, and deep-tier supply chain integration with known defense prime contractors. The report aggregates data to facilitate a future ranking on a complicity scale, strictly adhering to an evidence-based presentation of data regarding leadership interchangeability, consortium membership, and infrastructure deployment in conflict zones.
1.2 Operational Profile
Check Point Software Technologies operates as a multinational provider of software and hardware solutions for IT security. Headquartered in Tel Aviv, Israel, and San Carlos, California, the entity is a dominant figure in the global firewall and network security market. However, forensic scrutiny reveals that its corporate architecture is fundamentally intertwined with the Israeli state security establishment. This report documents the mechanisms by which the company’s intellectual property, human capital, and strategic roadmap serve as a “Digital Iron Dome”—a defensive cyber layer protecting the operational continuity of the Israeli military and critical state infrastructure.
The data presented herein distinguishes the entity from a standard commercial vendor by highlighting its foundational role in state-led defense consortiums (IC3), its specialized training pipelines that feed the IDF Intelligence Corps, and the deployment of its technology in specific occupation infrastructures, including the “Meitar” biometric checkpoint system and the Israel Prison Service (IPS) network.
2. Corporate DNA: The Military-Intelligence Leadership Nexus
A forensic assessment of defense complicity necessitates an analysis of the entity’s leadership structure to determine if a “revolving door” exists between the military apparatus and the corporate boardroom. The data indicates a near-total overlap between the founding and executive leadership of Check Point Software and the command structures of the IDF’s elite intelligence units, specifically Unit 8200 (SIGINT).
2.1 The Unit 8200 Founding Triumvirate
The intellectual property that underpins Check Point’s market dominance—Stateful Inspection technology—originates from the operational tradecraft of the IDF. The company was established in 1993 by three veterans of the IDF’s Intelligence Corps, creating a foundational culture indistinguishable from the military units from which they emerged.
Gil Shwed (Founder & Executive Chairman):
The audit identifies Gil Shwed as the central figure in this civil-military fusion. Shwed served in Unit 8200, the IDF’s signals intelligence and code-decryption unit. It was during this service that Shwed conceptualized the methodologies for securing classified networks, which later evolved into the commercial FireWall-1 product. His continued leadership as CEO from 1993 to 2024, and subsequent transition to Executive Chairman, ensures that the company’s strategic vision remains aligned with the technological doctrines of the Israeli security establishment. Shwed’s receipt of the Israel Prize in 2018, awarded by the State of Israel, explicitly recognized his contribution to the nation’s technological prowess, which is viewed by the state as a strategic security asset.1
Marius Nacht (Co-Founder):
Nacht’s profile exhibits an even deeper integration into the military’s R&D complex. He is a graduate of the Talpiot program, an elite IDF training track that recruits cadets with superior aptitude in physics and mathematics for long-term service in defense research and development. Following Talpiot, Nacht served in Unit 8200. This dual background in theoretical sciences and applied intelligence operations places him at the intersection of academic research and military application. His tenure as Chairman until 2020 solidified the structural link between high-level defense physics and corporate cybersecurity strategy.1
Shlomo Kramer (Co-Founder):
Kramer, also a veteran of Unit 8200, completes the founding triad. While he later departed to found other entities, his involvement reinforces the assessment that Check Point was established as a commercial vehicle for military-grade signals intelligence capabilities.3
2.2 The 2024 Command Transition: Nadav Zafrir
The most significant indicator of ongoing military alignment is the appointment of Nadav Zafrir as CEO in December 2024. Zafrir is not merely a veteran; he is a career military commander with a specific focus on cyber warfare.
- Military Rank and Role: Zafrir retired from the IDF as a Brigadier General. He served as the Commander of Unit 8200, the very unit responsible for Israel’s offensive and defensive cyber operations.
- Strategic Architecture: During his service, Zafrir was the architect and founder of the IDF Cyber Command, the overarching military body responsible for cyber warfare.
- Forensic Implication: The transition from Shwed to Zafrir represents a shift from a founder-led model to a commander-led model. The CEO of Check Point is now the individual who previously defined the IDF’s cyber doctrine. This suggests a seamless operational continuity between the national cyber strategy and the corporate roadmap of Check Point Software.5
2.3 The “Cyber Elite” Recruitment Pipeline
Check Point actively participates in mechanisms designed to generate human capital for the defense establishment. The “Cyber Elite” program, launched by the Jerusalem College of Technology in partnership with the National Cyber Directorate, exemplifies this. The program is designed to train Orthodox and Haredi men—demographics historically underrepresented in the military—for integration into IDF intelligence units and subsequent employment in the defense industry.
Check Point serves as a primary industry partner for this program, alongside state-owned weapons manufacturers Rafael Advanced Defense Systems and Israel Aerospace Industries (IAI). By providing R&D internships and mentorship, Check Point facilitates a pipeline that feeds both its own workforce and the reserve cadres of the IDF. This symbiotic relationship ensures that the company’s engineering staff remains culturally and operationally integrated with the military’s cyber units.7
Table 1: Executive Leadership and Military Intelligence Correlations
| Executive Name |
Corporate Role |
Military/Intelligence Service |
Strategic Significance |
| Gil Shwed |
Founder / Exec. Chairman |
Unit 8200 (SIGINT) |
Inventor of “Stateful Inspection” derived from military service; Israel Prize Laureate. |
| Nadav Zafrir |
CEO (2024–Present) |
Commander, Unit 8200; Brig. Gen. |
Established IDF Cyber Command; architect of national cyber doctrine. |
| Marius Nacht |
Co-Founder |
Talpiot Program / Unit 8200 |
Talpiot graduates form the R&D backbone of Israeli military technology. |
| Dorit Dor |
Chief Technology Officer |
IDF Intelligence Corps |
Described as a “Cyber Espionage Officer” in various profiles; operationalizes intel tech. |
| Yoav Chelouche |
Director |
Board Member, Malam Team |
Direct link to Malam Team, the primary IT integrator for the Israel Prison Service. |
3. The National “Digital Iron Dome” and Direct Contracting
The forensic audit identifies Check Point Software not merely as a vendor, but as a strategic partner in the Israel National Cyber Directorate’s (INCD) “Digital Iron Dome” initiative. This doctrine posits that the civilian cyber sphere acts as the first line of defense for the military and critical infrastructure during conflict.
3.1 Integration with the Israel National Cyber Directorate (INCD)
The INCD is the state body responsible for the defense of Israel’s national cyberspace. Check Point maintains a formalized partnership with this directorate, functioning as a private-sector extension of state intelligence.
- Operational Intelligence Sharing: During the “Iron Swords” war (October 2023–Present), Check Point Research (CPR) engaged in joint operations with the INCD. This included the issuance of joint advisories identifying and mitigating threats from Iranian-aligned actor groups such as “Emennet Pasargad” (also known as Aria Sepehr Ayandehsazan). This collaboration demonstrates a real-time fusion of state intelligence requirements with corporate threat analysis capabilities.8
- The “Digital Iron Dome” Concept: The INCD explicitly articulates a strategy of a “Digital Iron Dome” to protect the economy and functional continuity of the state during war. Check Point is cited as a key component of this shield. By securing the networks of banks, hospitals, and energy providers, Check Point ensures the logistical rear of the IDF remains operational under fire. The resilience of the civilian sector is a prerequisite for sustained military operations.9
3.2 Direct Engagement with Ministry of Defense (IMOD)
While many contracts are obscured through third-party integrators (detailed in Section 5), evidence of direct strategic alignment exists.
- Consortium Membership: As detailed in Section 4, Check Point’s membership in IMOD-sanctioned consortiums (IC3) confirms its status as a vetted defense supplier.
- Civil Administration (West Bank): Through its partner ecosystem, Check Point technology is deployed to secure the networks of the Civil Administration (ICA), the body responsible for the administration of the West Bank occupation. This includes IT infrastructure at District Coordination Offices (DCOs).11
- Reserve Duty Mobilization: Corporate filings reveal that a significant portion of Check Point’s Israel-based workforce is subject to mandatory reserve duty. During the “Iron Swords” war, the mobilization of these employees was noted as a potential operational risk. This confirms that the company’s human capital is a shared asset with the IDF, with employees pivoting between corporate coding and military operations during conflict.5
3.3 Ideological and Material Support for the IDF
The audit uncovered evidence of direct financial and ideological support for the military, extending beyond commercial obligations.
- Donations to AWIS: Check Point is documented as a donor to the Association for the Wellbeing of Israel’s Soldiers (AWIS). This organization provides material support (recreational centers, welfare) to active-duty units, directly contributing to the morale and sustainment of the fighting force.14
- IMPACT Scholarship Fund: The company funds scholarships through the IMPACT program, which is specifically designed for combat soldiers. This financial aid serves as a post-service reward system, incentivizing combat service and strengthening the bond between the company and the combat units of the IDF.15
- Wartime Rhetoric: Following the events of October 7, 2023, Check Point pivoted its public and operational stance to one of “civil defense.” The company mobilized resources to secure Israeli organizations from cyberattacks, framing its actions as part of the national war effort.16
4. Structural Integration with Defense Primes (The Lethal Supply Chain)
A critical vector of complicity is the integration of Check Point technology into the platforms and export packages of Israel’s lethal weapons manufacturers. The audit confirms that Check Point is embedded in the supply chains of Israel Aerospace Industries (IAI), Elbit Systems, and Rafael Advanced Defense Systems.
4.1 The Israeli Cyber Companies Consortium (IC3)
Check Point is a founding member of the IC3, a strategic consortium established by the Ministry of Economy and led by Israel Aerospace Industries (IAI).
- Strategic Purpose: The IC3 was created to offer “end-to-end” national cyber defense centers to foreign governments. By bundling cyber defense with kinetic hardware, the consortium enhances the exportability of Israeli arms.
- The IAI Connection: IAI is a state-owned manufacturer of lethal systems, including the Heron and Harop loitering munitions (suicide drones). Check Point’s role within IC3 is to provide the cybersecurity layer that protects these systems and the command-and-control centers that operate them.
- Implication: Participation in IC3 creates a direct functional link between Check Point’s firewalls and IAI’s lethal platforms. A foreign government purchasing an IAI defense package is likely acquiring Check Point software to secure the operational networks of those weapons.18
4.2 The Israeli Aviation Cyber Companies Consortium (IAC3)
Also led by IAI, the IAC3 targets the commercial and military aviation sectors.
- Dual-Use Avionics: Modern aviation relies on secure datalinks between the aircraft and ground stations. This technology is identical for commercial airliners and Unmanned Aerial Vehicles (UAVs). Check Point’s collaboration with IAI in this consortium suggests its technology is used to secure the datalinks of IAI’s drone fleets, protecting them from hijacking or jamming.18
4.3 Partnerships with Elbit Systems and Rafael
- Elbit Systems: Elbit is Israel’s largest non-government defense contractor, manufacturing the Hermes drone and Iron Sting mortar systems. Elbit utilizes integrators like Malam Team (a Check Point partner) for its IT infrastructure. Furthermore, Elbit’s subsidiary Cyberbit (and formerly Nice Systems cyber division) has historically operated in the same ecosystem, often utilizing Check Point firewalls at the network perimeter.22
- Rafael Advanced Defense Systems: As the manufacturer of the Iron Dome and Trophy active protection systems, Rafael requires immense computing power and security. Check Point partners with Rafael in the “Cyber Elite” training program, indicating a shared interest in developing a workforce capable of securing these advanced weapon systems.7
Table 2: Strategic Defense Consortium Memberships
| Consortium |
Lead Entity |
Check Point Role |
Operational Focus |
Complicity Vector |
| IC3 |
Israel Aerospace Industries (IAI) |
Founding Member |
National-grade Cyber Defense Centers |
Bundling security software with lethal arms exports (Drones/Missiles). |
| IAC3 |
Israel Aerospace Industries (IAI) |
Member |
Aviation Cyber Security |
Securing datalinks for aircraft and UAVs (Dual-use). |
| Cyber Elite |
National Cyber Directorate |
Industry Partner |
Workforce Development |
Training personnel for Unit 8200, Rafael, and IAI. |
5. The Intermediary Shield: Integrators, Resellers, and the Occupation
A common logistical strategy for defense firms is to utilize “System Integrators” to service sensitive government clients. This creates a layer of separation between the vendor and the end-user (e.g., a prison or military base). The audit has pierced this veil, identifying Malam Team, One Software Technologies, and Bynet Data Communications as the primary conduits for Check Point technology into the occupation apparatus.
5.1 Malam Team and the Israel Prison Service (IPS)
Malam Team is one of Israel’s largest IT integration firms. Check Point Director Yoav Chelouche serves on the board of Malam Team, establishing a direct governance link between the two entities.25
- The Contract: Malam Team holds massive tenders with the IMOD and the Israel Prison Service (IPS). It is responsible for the IT systems that manage the incarceration of Palestinian political prisoners.
- The Technology: The IPS network manages prisoner databases, surveillance systems, and facility access controls. As a primary partner of Check Point, Malam Team integrates Check Point firewalls and security gateways to protect this sensitive intranet from external penetration.
- Logistical Centers: Malam Team also operates military logistics centers for the IDF, providing the IT backbone for supply chain management. Check Point secures these logistical networks.24
5.2 One Software Technologies and the “Meitar” Checkpoints
One Software Technologies is an authorized reseller and partner of Check Point.28
- The “Meitar” System: One Software provides IT consultancy, management, and maintenance for the “Meitar” biometric identification system.
- Operational Context: The Meitar system is deployed at major checkpoints in the West Bank (e.g., Qalandiya). It is the primary mechanism for controlling the movement of Palestinian laborers. Palestinians are compelled to scan biometric ID cards and undergo facial recognition to cross.
- Data Integration: The biometric data collected by Meitar feeds into the “Rolling Stone” population registry system managed by the IDF.
- Complicity: The security of the Meitar database is paramount for the Civil Administration. One Software, as a Check Point partner, utilizes Check Point’s advanced threat prevention and firewall solutions to secure this biometric data against leaks or cyberattacks. This places Check Point technology at the physical point of friction in the occupation.30
5.3 Bynet Data Communications and West Bank Infrastructure
Bynet is a Gold Partner of Check Point and a leading integrator for the defense sector.31
- Civil Administration Tenders: Bynet has been awarded tenders to upgrade the communications infrastructure of the Civil Administration (ICA) in the West Bank. This includes laying optical fibers at checkpoints and upgrading server rooms at District Coordination Offices (DCOs) in settlements like Beit El.
- Settlement Security: Bynet is also involved in “Smart City” projects for settlement municipalities (see Section 6).
- Role of Check Point: Bynet’s role as a Gold Partner implies that Check Point is the preferred vendor for network security in these deployments. The firewalls installed in the Beit El DCO are Check Point appliances.11
Table 3: Indirect Supply Chain to Occupation Entities
| Integrator |
Check Point Status |
End-User Client |
Operational Deployment |
| Malam Team |
Partner (Director Link) |
Israel Prison Service (IPS) |
IT network security for incarceration facilities and prisoner databases. |
| One Software |
Authorized Reseller |
Civil Administration (ICA) |
Management of “Meitar” biometric systems at West Bank checkpoints. |
| Bynet Data |
Gold Partner |
IDF / Civil Admin |
Infrastructure for West Bank DCOs (Beit El) and checkpoint optical networks. |
| Motorola |
Tech Partner |
Settlement Municipalities |
Surveillance networks for Ariel, Modi’in Illit, Ma’ale Adumim. |
6. Project Nimbus and the “Smart Settlement” Surveillance Grid
The audit reveals Check Point’s critical role in securing two major state initiatives: Project Nimbus (the government cloud) and the surveillance infrastructure of illegal settlements in the West Bank.
6.1 Project Nimbus: Securing the Government Cloud
Project Nimbus is a $1.2 billion initiative to migrate the Israeli government and defense establishment’s computing infrastructure to the cloud, contracted to Google (GCP) and Amazon (AWS).
- Check Point’s Role: Check Point markets its “CloudGuard” and “Harmony” suites specifically for government deployments on AWS and GCP. The company is a technology partner for both cloud providers.33
- Operational Significance: The migration of IMOD and IDF data to the cloud introduces new vulnerabilities. Check Point provides the “Cloud Network Security” layer that wraps around Project Nimbus. This ensures that the IDF’s logistical data, target banks, and intelligence archives stored in the cloud are protected from cyber espionage.
- Evidence: Marketing materials explicitly reference the Israeli Ministry of Environmental Protection and other government bodies as clients using Check Point to secure their cloud transition. The extension of this to defense bodies under Nimbus is a logical operational requirement given Check Point’s status as the national cyber champion.33
6.2 “Smart City” Surveillance in Settlements
Illegal settlements in the West Bank, such as Ariel, Modi’in Illit, and Ma’ale Adumim, have deployed extensive surveillance networks under the guise of “Smart City” or “Safe City” projects.
- The Infrastructure: These systems utilize high-definition cameras, License Plate Recognition (LPR), and facial recognition sensors to monitor Palestinian movement around settlement perimeters.
- The Providers: Motorola Solutions and Bynet are the primary contractors for these systems.36
- Check Point’s Integration: The transmission of surveillance data from these settlement cameras to central command centers (operated by civilian security coordinators or the IDF) requires encrypted VPN tunnels and robust firewalling to prevent interception. Check Point is the dominant market leader for these specific capabilities in Israel. Through its partners Motorola and Bynet, Check Point technology secures the “digital perimeter” of the settlements.36
7. Operational Audit: The “Iron Swords” War (2023–Present)
The conduct of Check Point Software during the “Iron Swords” war provides a clear case study of civil-military fusion during active conflict.
7.1 Intelligence Support and Cyber Defense
Check Point Research (CPR) functioned as a de facto intelligence auxiliary during the conflict. The unit published detailed reports on “Hacktivist” groups targeting Israel (e.g., Anonymous Sudan, Cyber Toufan), sharing this intelligence with the INCD and the public. This activity went beyond commercial threat analysis; it was part of a coordinated national effort to maintain morale and cyber resilience in the face of a multi-front war.8
7.2 Critical Infrastructure Resilience
Attacks on Israeli hospitals, energy grids, and water systems spiked during the war. Check Point provided the defensive perimeter for these assets. While protecting a hospital is a humanitarian act, protecting the energy grid (IEC) and telecom infrastructure is strategically vital for the IDF. The IDF relies on the civilian grid to power its bases and on civilian telecom networks to carry unclassified logistics data. Check Point’s defense of these sectors effectively secured the logistical rear of the military campaign.10
7.3 Personnel Mobilization
The “Iron Swords” war necessitated a massive call-up of IDF reservists. Check Point acknowledged in analyst notes and corporate filings that a “significant number” of its employees were drafted. This confirms that the company’s workforce is composed of combat-age reservists who pivot directly from developing cyber security products to serving in combat or intelligence units. This fluidity of personnel underscores the deep cultural and operational integration between the company and the military.5
8. Dual-Use Technology Assessment
A key requirement of the audit is to determine if Check Point produces “dual-use” or “mil-spec” goods. The analysis confirms that while the software is sold commercially, it is inherently dual-use due to its application in securing high-value state assets.
8.1 “CloudGuard” and “Quantum” Gateways
- Civilian Application: Protecting e-commerce platforms and banking apps.
- Military Application: These products are used to secure the Project Nimbus cloud (IDF data) and the “Torch” (Massu’ah) command-and-control systems. The “Quantum” series firewalls provide the throughput and encryption standards (IPsec VPN) necessary for secure military communications between headquarters and tactical units.
- Assessment: Check Point products are “ruggedized” in the software sense—designed to withstand Advanced Persistent Threats (APTs) from state actors (e.g., Iran, Russia). This capability makes them effectively “mil-spec” software, essential for modern network-centric warfare.
8.2 “Harmony” Mobile Security
- Civilian Application: Protecting enterprise mobile fleets from malware.
- Military Application: The IDF has increasingly moved towards the use of secure mobile devices for officers and logistics personnel. “Harmony” protects these devices from spyware (like Pegasus or Predator) and ensures that location data is not leaked. The acquisition of Perimeter 81 (Zero Trust Network Access) further enhances this capability, allowing secure remote access for military personnel operating in the field.40
9. Global Regulatory Backlash and Geopolitical Risk
The material complicity of Check Point has not gone unnoticed by foreign defense establishments. The audit highlights significant regulatory actions taken against the company due to its perceived proximity to Israeli intelligence.
9.1 The Turkey Military Ban
In 2016, the Turkish Ministry of Defense issued a directive removing Check Point products from its military infrastructure.
- Justification: Turkish officials explicitly cited the “alleged ties to the Israeli military and intelligence” of founder Gil Shwed and the potential risk of “backdoors” or espionage capabilities inherent in the software.41
- Forensic Significance: This action confirms that a NATO-member defense establishment assesses Check Point not as a neutral commercial vendor, but as a potential vector for foreign intelligence collection (Unit 8200).
9.2 The China Procurement Warning
Reports indicate that the Chinese government has warned domestic companies and state-owned enterprises (SOEs) against purchasing Check Point products.
- Justification: National security concerns regarding the ownership structure and the dual-use nature of the technology.42
- Implication: Major geopolitical powers view Check Point as an extension of the Israeli state’s cyber power capabilities.
9.3 BDS and Divestment Risks
Check Point is a primary target for the Boycott, Divestment, Sanctions (BDS) movement and ethical investment screening.
- Reasons: Its presence in the supply chains of settlement-servicing firms (Partner, Cellcom), its direct support of the IDF (AWIS donations), and its founder’s background.
- Precedents: Several pension funds (e.g., New Zealand Super Fund) and organizations (AFSC) have flagged or divested from Israeli technology firms with similar profiles. Check Point’s partnership with One Software (Meitar checkpoints) places it at high risk for future inclusion in the UN Database of businesses operating in settlements.37
10. Data for Complicity Ranking
The following data sets are provided to facilitate the ranking of Check Point Software Technologies on the requested complicity scale. No score is assigned, in adherence to the audit constraints.
| Complicity Vector |
Data Point |
Evidence Source |
Description |
| Direct Defense Contracting |
IC3 Membership |
18 |
Founding member of IMOD-backed consortium led by IAI. |
| Direct Defense Contracting |
INCD Partnership |
8 |
Strategic partner in “Digital Iron Dome” national defense. |
| Leadership Overlap |
CEO Background |
5 |
CEO Nadav Zafrir is ex-Commander of Unit 8200 & Founder of IDF Cyber Command. |
| Leadership Overlap |
Founder Background |
1 |
Founder Gil Shwed is Unit 8200 veteran & Israel Prize winner. |
| Supply Chain Integration |
Malam Team |
24 |
Director Yoav Chelouche on Malam board; Malam operates IPS networks. |
| Occupation Infrastructure |
One Software / Meitar |
30 |
Reseller manages biometric checkpoints in West Bank. |
| Occupation Infrastructure |
Settlement Surveillance |
36 |
Tech used by partners (Motorola/Bynet) for settlement security (Ariel). |
| Ideological Support |
Donations |
14 |
Financial support to AWIS and IMPACT (combat soldier scholarships). |
| Global Sanctions |
Turkey Ban |
41 |
Banned from Turkish military infra due to intel ties. |
Forensic Summary:
The data collected indicates that Check Point Software Technologies functions as a foundational pillar of the Israeli defense ecosystem. While maintaining a commercial listing on NASDAQ, its operational structure, leadership history, and supply chain relationships demonstrate a systemic integration with the IMOD, the IDF, and the administration of the occupation. The entity acts as the “Cyber Armor” for Israel’s kinetic weapons manufacturers (IAI, Elbit) and provides the digital infrastructure security for the Civil Administration’s control mechanisms in the West Bank.
End of Audit Report
Defense Logistics Analysis Unit
January 16, 2026
Works cited
- Marius Nacht – Forbes, accessed January 16, 2026, https://www.forbes.com/profile/marius-nacht/
- Gil Shwed – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Gil_Shwed
- What is Brief History of Check Point Software Company? – MatrixBCG.com, accessed January 16, 2026, https://matrixbcg.com/blogs/brief-history/checkpoint
- Frequently Asked Questions (FAQ) – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/about-us/frequently-asked-questions/
- CHECK POINT SOFTWARE TECHNOLOGIES LTD – 1015922 – 2025 – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1015922/000117891325000867/zk2532836.htm
- Leadership – Executive Management & Board Of Directors – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/about-us/leadership/
- Jerusalem College of Technology launches trailblazing cyber …, accessed January 16, 2026, https://www.jct.ac.il/en/news-and-updates/jerusalem-college-of-technology-launches-trailblazing-cyber-security-program/
- 4th November – Threat Intelligence Report – Check Point Research, accessed January 16, 2026, https://research.checkpoint.com/2024/4th-november-threat-intelligence-report/
- Inside the IDF’s Super-Secret Elite Brain Trust – The Tower, accessed January 16, 2026, http://www.thetower.org/article/inside-the-idfs-super-secret-elite-brain-trust-talpiot/
- The Digital Iron Dome | Bar Ilan University, accessed January 16, 2026, https://www.biu.ac.il/en/article/584153
- The Israeli Occupation Industry – Rad-Bynet – Who Profits, accessed January 16, 2026, https://www.whoprofits.org/companies/company/6526
- 2023-CHKP-form-20F.pdf – Check Point, accessed January 16, 2026, https://www.checkpoint.com/downloads/investor/2023-CHKP-form-20F.pdf
- Cybersecurity companies in Israel could see staff drafted into war: Raymond James, accessed January 16, 2026, https://seekingalpha.com/news/4019359-cybersecurity-israel-staff-drafted-war-raymond-james
- Targeting Israeli Apartheid A Boycott Divestment and Sanctions Handbook. | PDF – Scribd, accessed January 16, 2026, https://www.scribd.com/document/140874882/Targeting-Israeli-Apartheid-a-Boycott-divestment-and-sanctions-handbook
- Gifts – PRESIDENT’S REPORT 2020, accessed January 16, 2026, https://ver2020.presidentsreport.technion.ac.il/gifts-typegifts/
- Check Point Provides Cyber Perspective on Israel-Hamas War | MSSP Alert, accessed January 16, 2026, https://www.msspalert.com/news/check-point-provides-cyber-perspective-on-israel-hamas-war
- The Iron Swords War – Cyber Perspectives from the First 10 Days of the War in Israel, accessed January 16, 2026, https://blog.checkpoint.com/security/the-iron-swords-war-cyber-perspectives-from-the-first-10-days-of-the-war-in-israel/
- Check Point Software: Ex-Israeli military spooks profiting from the cyber-security industry, accessed January 16, 2026, https://corporatewatch.org/check-point-software-ex-israeli-military-spooks-profiting-from-the-cyber-security-industry/
- Startup Showcase @, accessed January 16, 2026, https://en-cyber.tau.ac.il/sites/cyberstudies-english.tau.ac.il/files/media_server/all-units/Startup%20Catalog_digital.pdf
- unique solutions for Cyber defense & protection | IAI | ELTA Systems, accessed January 16, 2026, https://www.iai.co.il/cyber-hls/cyber
- Israel Aerospace Industries Ltd – Tech Inquiry, accessed January 16, 2026, https://techinquiry.org/?entity=israel%20aerospace%20industries%20ltd&guard=
- securities and exchange commission – Elbit Systems, accessed January 16, 2026, https://www.elbitsystems.com/sites/default/files/2025-02/8793706.pdf
- Technology Partners – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/technology-partners/
- The Israeli Occupation Industry – Malam Team – Who Profits, accessed January 16, 2026, https://www.whoprofits.org/companies/company/4217
- Board of Directors – Tower Semiconductor, accessed January 16, 2026, https://towersemi.com/about/board-of-directors/
- Check Point Software Technologies Ltd. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1015922/000117891324003149/zk2432075.htm
- State Comptroller’s Report – Cyber and Information Systems, accessed January 16, 2026, https://library.mevaker.gov.il/sites/DigitalLibrary/Documents/2023/2023.5-Cyber/2023.5-Cyber-Abstracts-EN.pdf
- AWS Marketplace: ONE ServiceNow ITOM Professional platform – Amazon.com, accessed January 16, 2026, https://aws.amazon.com/marketplace/pp/prodview-wjrvrlwjfjscm
- AWS Marketplace: ONE ServiceNow SPM – Amazon.com, accessed January 16, 2026, https://aws.amazon.com/marketplace/pp/prodview-sad4lgo5dctr2
- The Israeli Occupation Industry – One Software Technologies – Who Profits, accessed January 16, 2026, https://www.whoprofits.org/companies/company/3649
- Top 50 Mobile Angel Investors in Israel in September 2025 – Shizune.co, accessed January 16, 2026, https://shizune.co/investors/mobile-angel-investors-israel
- 6-K – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1402606/000117891308000531/zk84900.htm
- Israeli Ministry of Environmental Protection – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/customer-stories/israeli-ministry-of-environmental-protection/
- Evolving Cyber Dynamics Amidst the Israel-Hamas Conflict – Check Point Blog, accessed January 16, 2026, https://blog.checkpoint.com/security/evolving-cyber-dynamics-amidst-the-israel-hamas-conflict/
- Cloud Security Services – CloudGuard – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/cloudguard/
- The Israeli Occupation Industry – Motorola Solutions – Who Profits, accessed January 16, 2026, https://www.whoprofits.org/companies/company/3808
- Released under the OIA – NZ Super Fund, accessed January 16, 2026, https://www.nzsuperfund.co.nz/public/assets/Disclosures/Official-Information-Act-Requests/OIA-2024-2025/4-February-2025-Appendix-1-regarding-NZSF-investee-companies-on-UN-OHCHR-Database.pdf
- The Israeli Occupation Industry – C. Mer Group – Who Profits, accessed January 16, 2026, https://www.whoprofits.org/companies/company/4041
- As war drags on, reservists fight to balance military duty and the home front, accessed January 16, 2026, https://www.timesofisrael.com/as-war-drags-on-reservists-fight-to-balance-military-duty-and-the-home-front/
- Check Point Acquires Perimeter 81—Securing Remote Access – Aragon Research, accessed January 16, 2026, https://aragonresearch.com/check-point-acquires-perimeter-81/
- Cybersecurity company Check Point becomes a political target in Turkey amid Israeli-Hamas conflict – Nordic Monitor, accessed January 16, 2026, https://nordicmonitor.com/2025/03/cybersecurity-company-check-point-becomes-a-political-target-in-turkey-amid-israeli-hamas-conflict/
- China to ban use of Check Point products – report – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-china-to-ban-use-of-check-point-products-report-1001532030
- Beijing blocks Chinese entities from using U.S. and Israeli cybersecurity software — VMWare and Fortinet among the affected vendors | Tom’s Hardware, accessed January 16, 2026, https://www.tomshardware.com/tech-industry/cyber-security/beijing-blocks-chinese-entities-from-using-u-s-and-israeli-cybersecurity-software-vmware-and-fortinet-among-the-affected-vendors
- Stakes in Settler Colonialism (A4) (1) – LSESU Palestine Society, accessed January 16, 2026, https://lsepalestine.github.io/documents/LSESUPALESTINE-Stakes-in-Settler-Colonialism-2025-Web.pdf
- A Simple Boycott List, accessed January 16, 2026, https://boycott-israel.org/boycott.html
- Tāmaki Makaurau Palestine solidarity community protests Israeli tech – Auckland Peace Action, accessed January 16, 2026, https://aucklandpeaceaction.wordpress.com/2025/05/21/tamaki-makaurau-palestine-solidarity-community-protests-israeli-tech/