6-K

UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549

FORM 6-K

Report of Foreign Private Issuer

Pursuant to Rule 13a-16 or 15d-16
of the Securities Exchange Act of 1934

For the month of September, 2008

Commission File Number 0-28584

CHECK POINT SOFTWARE TECHNOLOGIES LTD.

(Translation of registrant’s name into English)

5 Ha'solelim Street, Tel Aviv, Israel
(Address of principal executive offices)

Indicate by check mark whether the registrant files or will file annual reports under cover of Form 20-F or Form 40-F.

Form 20-F x Form 40-F o

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(1): ____

Note: Regulation S-T Rule 101(b)(1) only permits the submission in paper of a Form 6-K if submitted solely to provide an attached annual report to security holders.

Indicate by check mark if the registrant is submitting the Form 6-K in paper as permitted by Regulation S-T Rule 101(b)(7): ____

Note: Regulation S-T Rule 101(b)(7) only permits the submission in paper of a Form 6-K if submitted to furnish a report or other document that the registrant foreign private issuer must furnish and make public under the laws of the jurisdiction in which the registrant is incorporated, domiciled or legally organized (the registrant’s “home country”), or under the rules of the home country exchange on which the registrant’s securities are traded, as long as the report or other document is not a press release, is not required to be and has not been distributed to the registrant’s security holders, and, if discussing a material event, has already been the subject of a Form 6-K submission or other Commission filing on EDGAR.

Indicate by check mark whether the registrant by furnishing the information contained in this Form, is also thereby furnishing the information to the Commission pursuant to Rule 12g3-2(b) under the Securities Exchange Act of 1934.

Yes o No x

If “Yes” is marked, indicate below the file number assigned to the registrant in connection with Rule 12g3-2(b): 82- ________






Investor Contact: Media Contact:
Kip E. Meintzer Greg Kunkel
Check Point Software Technologies Check Point Software Technologies
+1 650.628.2040 +1 650.628.2070
ir@us.checkpoint.com press@us.checkpoint.com

Check Point Software Shareholders Approve all Proposals at
2008 Annual General Meeting

REDWOOD CITY, Calif., – September 4, 2008 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that shareholders approved all four proposals presented at the 2008 Annual General Meeting. Approximately 158 million shares, representing approximately 74 percent of the shares outstanding as of the record date, were voted at the meeting. Check Point would like to thank shareholders for the support and confidence they have in the company and its employees.

For more information on the agenda items, please see the company’s proxy statement dated August 7, 2008: http://www.checkpoint.com/corporate/ir/sec_filings.html.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers’ dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point’s pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point’s award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.


©2003–2008 Check Point Software Technologies Ltd. All rights reserved.



Signatures

Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.

CHECK POINT SOFTWARE TECHNOLOGIES LTD.


By: /s/ John Slavitt
——————————————
John Slavitt
General Counsel

September 4, 2008