Specifications include, but are not limited to: full installation, configuration, and deployment of the selected system. The proposed (EDR) solution and its successful deployment should return the benefits of real-time security threat reporting, threat detection, adaptive security, dynamic data protection, and automated incident response to potential cybersecurity threats. The solution should be capable of detecting file-less exploits and “living off the land” style attacks and incorporate machine learning for identifying new or uncategorized exploits or malicious behavior. The system should employ multiple additional controls, detection, and remediation methods aligning with a standard attack method framework such as MITRE ATT&CK. The subscription or licensing model should be scoped for at least 2,200 assets.