Specifications include, but are not limited to:. The intent of this proof of concept is to identify a vendor that scans the internet, including but not limited to electronic media, the Dark Web, and social media sites to identify threats (potential or actual) to the State of Michigan, including but not limited to cyber security threats and or threats to State infrastructure. The vendor would also be required to provide a software solution that provides the following: All threats are documented via electronic dashboard and/or similar format. Potentially, if available, offer a records/document retention solution for historical reference of cybersecurity threats. The vendor’s criteria used to develop the identification of the security threats will be reviewed and evaluated by the State. Customization of threat identification criteria will be required based on state agency criteria The key components the State is looking for are as follows: Vendors collects the data and provides analysis Vendor provides electronic alerts that will allow the State agencies to be proactive in protecting the Michigan critical infrastructure from known threats (email)