Specifications include, but are not limited to: • Exploit Prevention • Anti-Malware and Anti-Virus Capabilities (Signature and Behavior Based Detection) • Anti-Ransomware (Behavorial Detection and Automatic Response) • OnAccess Scanning and Protection • Windows, macOS, and Linux Clients and Servers • Scheduled Scans • Role Based Access Controls (Suporting our Decentralized Environment) • Segmented Administrative Areas of Control/Visibility (i.e. SubEstates) • Centralized Visibility, Monitoring, and (Mature) Reporting • Customized Policy capabilities • Active Directory Integration (LDAP) • Auto-updating Signatures and Engine • Remote Forensic Capabilities • SIEM Integration (Splunk) • Ticketing System Integration (Service Now) • API Access (or other security tool integration) • SAAS (Cloud-based Infrastructure) • Remote Deployment Capabilities • Unknown File Analysis Capabilities • Availability for Faculty, Staff, and Students Home or Work Systems • Ability for custom blocklist (Adding hashes) • Threat Hunting Capabilities (i.e Can we search for file hashes, file names) • Automated File Investigation and Response • Endpoint Isolation • Professional Services Availabilty • IOC Investigation Capabilities (File Hashes, Software Inverntory) • Single Sign On Integration (SAML or O365)