● Endpoint Detection & Response (EDR) ○ Centrally monitored and managed dedicated EDR agents for Mac, Chrome and Windows endpoints. ○ Agents must automatically detect and respond to Ransomware, Malware, Zero-Day Exploits, and Viruses. ● Immutable Backup & Restore ○ Create and preserve backup copies of data, preventing unauthorized modification, deletion, or tampering. ○ Ensure data integrity and protection against ransomware attacks and data manipulation attempts. ● Phishing Awareness and Training ○ Educate users about phishing risks and equip them with the knowledge and skills to recognize and respond to phishing attempts effectively. ● Patch Management ○ Proactive approach to maintaining system security and stability. ○ Automatically apply updates, fixes, and patches to software, operating systems, applications, and firmware. ● Infrastructure Security Monitoring ○ 24/7 continuous monitoring, detection, and response to security threats and incidents on all physical and virtual servers, switches, routers, firewalls, email servers, and web servers. ● Cloud Security Monitoring ○ Comprehensive support for popular cloud platforms, including Azure, AWS, and Google. ○ Platform integration with public clouds to send events to the SOC manager for analysis and classification. ○ Security dashboards covering platforms, users, and activities, with the ability to identify anomalous behavior. ○ Autonomous response to isolate and eliminate potential attacks quickly. ● Office 365 Security Monitoring & Remediation ○ Ingest Office 365 security data and provide alerts based on customer-specific requirements.