PREPARED FOR< fill in company name >PREPARED BY< fill in name and title here >DATE October 22, 2025REPORT IDID_025D4456-740C-4175-9942-E287853ED59ETABLE OF CONTENTEXECUTIVE SUMMARY3ACCESS CONTROL & DATA PROTECTION FINDINGS 4Web Security Events4Data Loss Events8THREAT PREVENTION FINDINGS11Bot Events11Virus Events13Advanced Threats16Intrusion & Attack Events18ENDPOINT SECURITY FINDINGS19COMPLIANCE SECURITY ANALYSIS22BANDWIDTH ANALYSIS26REMEDIATION RECOMMENDATIONS28SOFTWARE-DEFINED PROTECTION37ABOUT CHECK POINT SOFTWARE TECHNOLOGIES41 EXECUTIVE SUMMARYThis document provides the findings of a recent security analysis of your infrastructure. The document represents a summary of these findings and presents a set of recommendations for addressing the detected events. The analysis is based on data collected using the characteristics below:The following is a summary of the main high and critical risk security events detected: ACCESS CONTROL & DATA PROTECTION FINDINGSWEB SECURITY EVENTSTop High Risk Applications & SitesWithin the areas of web applications and websites, the following items are of the highest risk levels¹ ¹ Risk level 5 indicates an application that can bypass security or hide identities (for example: Tor, VTunnel). Risk level 4 indicates an application that can cause data leakage or malware infection without user knowledge (for example: File Sharing, P2P uTorrent or P2P Kazaa). Remote Administration applications might be legitimate when used by admins and helpdesk. High Risk Applications Compliant with Organizational Security Policy High risk applications are applications that can bypass security, hide identities, cause data leakage or even malware infection without user knowledge. In most cases, use of such applications is agai...