The scope of work for the selected vendor includes the following but not limited: 1. Resource,Asset,Data protection and tracking 2. Forensic and Incident Response 3. Data File security Hardware/ Software 4. Endpoint, network and cloud security 5. Monthly Services(Review and monitor for Lancaster ISD systems) 6. Blockout hours(Standard hands on hands beyond Monthly monitoring 7. Training and Awareness 8. Electronic and Information Resources Accessibility 9. Data Back up 10. System recovery 11. Spam protection 12. Manage hardware and software security vulnerabilities 13. Prevent and mitigate loss or breach classified information 14. Asset discovery 15. Identify and manage Configuration of hardware and software 16. Incident reporting 17. Malicious code protection 18. Virtual Private Networks 19. Data leak protection 20. CMDB Configuration Management Database 21. Endpoint protection 22. Cloud Security 23. Authentication and Authorization 24. Threat Detection and Security Monitoring 25. Cloud compliance with cybersecurity framework standards