¡Welcome!

Here you will find information about the indicators shown in your Performance and Protection.

If you have any questions, please contact us.


Blocked Threats:

Amenazas bloqueadas provenientes de Internet are any external, intentional or automated attempt to interact with a company’s network for harmful purposes.

They are signs that someone or something from outside is “knocking on the company’s door” in a suspicious or dangerous way.

They may include:

  • Unauthorized access attempts to enter systems or servers.
  • Port scans to detect vulnerabilities.
  • Automated attacks that test weak passwords
  • Sending malware or malicious links.
  • Unusual traffic trying to exploit security flaws.

These events don’t always succeed in causing damage, but indicate hostile activity that must be monitoredbecause they are the first step attackers use to compromise information, affect services, or gain access to the company network.


Critical Incidents Mitigated::

Incidentes críticos que se generan desde la empresa hacia Internet son situaciones donde los propios equipos, usuarios o sistemas internos realizan acciones que representan un riesgo grave para la seguridad o la operación del negocio.

Something inside the company begins to behave dangerously outwardly, which may indicate a serious problem.

They may include:

  • Internal devices trying to connect to malicious sites often a sign of malware infection.
  • Compromised devices sending sensitive data to the Internet without authorization.
  • Unusual or massive traffic that could indicate participation in attacks (e.g. a device turned into a bot).
  • Internal apps or users uploading confidential information to unauthorized services.

These incidents are critical because they often reflect that there is already a breach, active malware, or unsafe behavior inside the network — which can lead to data leak, reputational damage or deeper compromises if not addressed immediately.


Daily trend of blocked threats:

A graph showing the number of threats blocked per day during the period covered in the report.


Top 3 Risky Applications Used::

Aplicaciones riesgosas son programas, servicios o sitios web que, por su funcionamiento o reputación, pueden representar una amenaza para la seguridad de la empresa.

In short: they are applications that could expose data, create vulnerabilities, or facilitate attacks even if they are not malicious by design.

They can be considered risky when:

  • They are not trustworthy or don’t have a good security reputation.
  • They request excessive permissions or access to sensitive data.
  • They transmit information unencryptedwhich facilitates data theft.
  • They don’t receive updates and may have known flaws.
  • They operate outside corporate controls, like unauthorized cloud storage apps.
  • They can be used to evade security, like proxies or anonymization tools.

Identifying them is important to prevent users — inadvertently — from creating security breaches or exposing critical company information.


Top 3 Threats Faced::

Amenazas son cualquier tipo de acción, técnica o contenido malicioso que busca engañar, infectar o comprometer a una empresa. Son los “peligros” reales que los atacantes usan para robar información, afectar servicios o tomar control de sistemas.

Things that can cause harm, either through deception, infection, or misuse of information.

Common examples:

  • Phishing: fake emails or messages that try to trick a user into giving sensitive data or clicking malicious links.
  • Malware: software designed to infiltrate machines (like trojans or ransomware).
  • Virus y spam: unwanted files or emails that can infect machines or serve as a gateway for larger attacks.
  • Activities related to the deep web: traffic or connections to hidden areas of the Internet where malware, stolen data or other illegal services are distributed.
  • Emerging threats: Any type of activity reported as malicious that hasn’t yet been classified into a specific category.

Detecting and blocking them is key because they show direct attempts to compromise the network, infect machines or deceive users.


Infrastructure Health:

In a vulnerability analysis, “problems” and “warnings” represent two different risk levels, and help to understand how urgent it is to fix each finding.

Problems

They are detections that represent a real and concrete risk to the company’s security.
In simple terms: something is wrong and can be exploited by an attacker..

They may include:

  • Known and exploitable vulnerabilities.
  • Insecure configurations.
  • Outdated versions with critical flaws.
  • Exposed services without protection.

They require immediate or priority action, because they may lead to unauthorized access, information theft or operational failures.


Warnings

These are situations that do not represent a direct risk, but could become a problem if not addressed.
In short: it’s not a serious flaw, but a sign that something could be improved.

They may include:

  • Services that could be configured more securely.
  • Practices that are not ideal, but don’t open a breach by themselves.
  • Versions that are not critical but should be updated.

They require revisión y mejora, pero no son urgentes.


Remote Access Protection:

A remote access attempt is when someone tries to connect to a company’s computer or system from another place, through Internet or an external network.

Attempts to “enter” a company computer or server without being physically there.

They may be:

  • Authorized but failede.g. an employee typed the password wrong.
  • Intentionalwhen a user — for dissatisfaction or economic reasons — offers access to external attackers.
  • Unauthorizedwhen an attacker tries to get in using stolen credentials or brute-force techniques.
  • Automatedcarried out by bots that try thousands of combinations to gain access.

They are important to monitor because they can indicate someone is trying to take control of internal systems, access sensitive information, or move within the company network.


Top 3 Devices by Consumption:

Shows the devices connected to the network that used the most Internet during the period.


Top 3 Most Used Applications::

Shows the applications most used by users connected to the company network during the period.


Top 5 Popular Browsing Destinations:

Shows the websites most visited by users connected to the company network during the period.


Top 3 Blocked Source Countries

Shows the countries from which BPROT has intercepted the greatest number of dangerous incidents directed at the company.


BPROT Status:

Indicates the overall status of BPROT, the modules contracted by the company, remaining days of annual license, version and automatic update number.


License Capacity:

Indicates whether the number of devices connected to the network detected by BPROT falls within the licensing tier contracted by the company.


Protection Status:

BPROT's automatic updates include lists of malicious sites and actors; this indicator shows whether your company has the latest available update at the time of report generation.

Identified Malicious Sites:

These are websites created or used to carry out harmful actions..
In short: they are dangerous places on the Internet..

They may serve to:

  • Steal passwords (phishing).
  • Install malware.
  • Distribute viruses or infected files.
  • Trick the user into giving personal or corporate information.

The site is the vehicle for the attack..

BPROT updates its lists of malicious sites daily — these are reported as generating dangerous activity from top-tier repositories.

Identified Malicious Actors::

Refers to malicious IP addresses simply addresses on the Internet that have been identified as dangerous because they are associated with harmful activities.

They can belong to computers, servers or networks that carry out actions such as:

  • Sending virus, malware or phishing
  • Attempting to hack systems or steal information.
  • Distributing spam
  • Being part of botnets (infected devices acting in a coordinated way)

When the system detects a "malicious IP", it means that address is on blacklists or in security databases for harmful behavior. Blocking them helps avoid attacks and protect the network.

BPROT updates its lists of malicious actors daily — these are reported as generating dangerous activity from top-tier repositories.