3 Cloud In Forms A Saas Containing An Additional Training Platform. The Scope Of The Subject Of The Contract Also Includes A License For The Abovementioned Software Created As Part Of The Contract For A Period Of Not Less Than 5 Years. 2. The Order Characteristics Include The Performance And Implementation Of The Software And Guaranteeing The Provision Of The Necessary Equipment And License Of Software That Are Fully Integrated, Configured And Compatible With Created Software That Performs The Subject Of The Order And Taking Into Account The Possible Use Of The Elements Of The Infrastructure Already Possessed. 3. The Above -Mentioned Assumptions Of The Performance Of The Subject Of The Contract For The Contractor Should Include As Part Of Its Implementation. Data Exports; 2) Audit And Securing All Devices, Including: Workstations (Windows, Macos, Linux), Servers (Windows, Macos, Linux), Internet Domains, Ip Addressing, Employees And Their Identities, Mailboxes, Printers, Network Devices, Personal Data Sets, File Servers, Backups, Backups, Microsoft Clouds And Clouds Google.3) Graphic Presentation In The Form Of A Security Score Of Individual Elements Of Systems And Configuration Possible Presentation Of Collective, Grouped And Detailed Views; 4) Audit In 24/7 Mode Containing A Minimum Of 300 Audit Controls; 5) Reacting Service To Incidents, Including Incident Recognition, Insulation Of Devices And Networks, Authorization Blocking, Communication With Cert And Uodo; 6) Verification Of Backup Copies, Adopted Schedule (E.G. Gfs), Disaster Recovery Documentation, Supports Business Continuity, Rpo, Rto; 7) Automation And Monitoring (Siem And Soar) .8) Integration With The Implemented Edr/Xdr/Mdr/Mdr Solution, Anti -Virus, Utm, Log Server; 9) Integration With New Or Already Implemented Security Solutions; 10) An Advanced Device For Scanning Vulnerabilities, Networks, Configuration; 11) Access To The E-Learning Platform With Profiled Training In The Area Of Cyber Security Assisted By Al, Ended With Test, Knowledge Base, Threats Database That May Apply To A Specific Workstation And Services To Which The User The Contracting Authority Will Require Additional Support Services From The Contractor, Which Will Apply At Least Until 31.05.2026.:1) A Safety Newsletter, At Least Once Every Two Months; 2) Profiled Information About Current Trends In Hacker Attacks, At Least Once A Quarter; 3) At Least 3 Stationary Training In The Area Of Cyber Security For All Employees Of The Office; 4) Consultations With Vciso In Terms Of Raising Security, Implementing Services, Creating Procedures, Supporting Incidents, Reporting Reports, Training In The Mythigration Of Current Threats; 5) Monthly Verification By An Internal Auditor Ended With A Security Report In Accordance With The National Interoporatory Framework Report (Kri); 6) Standing Monitoring Of Visibility In The Public Network From The Level Of Tools Available To A Potential Hacker, Including Bases, Leaks, Search Eng