24/7 SOC




You are here:


360° Protection from Advanced Cyber Attacks

Every organisation in the UK faces the difficult challenge of mitigating against the ever-increasing risks associated with cyber crime. Cyber attacks use advanced technology to exploit the vulnerabilities in your IT system to steal confidential information and disrupt your essential operational activity.

Effective cyber security requires a holistic, integrated approach that involves the identification, detection and removal of cyber threats. It requires the continual update of preventive measures (controls) and regular testing to ensure that these measures are working correctly.

Effective cyber security also requires skilled IT professionals to install, manage and report to senior managers. Outsourcing your cyber security to a trusted Managed Security Service Provider (MSSP) delivers the security expertise and technology required, with minimal impact and a reduced cost to your organisation.

Advanced Threat Prevention, Detection and Incident Response

CYBERSHIELD MDR-COMPLETE is designed to deliver effective and comprehensive cyber security for an organisation of any size. Functioning as your company’s own 24/7 cyber security operations centre, CYBERSHIELD MDR-COMPLETE monitors critical network infrastructure and endpoint assets, proactively hunting for threats and providing actionable remediation when required. It also includes protection for all laptop and mobile devices which are used remotely away from the office.

This fully managed service combines the benefits of the CYBERSHIELD MDR-ENDPOINT & MDR-NETWORK packages with additional email protection, cloud security, security policies, external vulnerability scanning, penetration testing and application whitelisting.

  • Next Generation Antivirus
  • Endpoint Detection and Response
  • Behavioural Monitoring
  • Cloud Security
  • Patch Management
  • Asset Discovery
  • Vulnerability Assessment
  • Intrusion Detection
  • SIEM Management
  • Mobile Device Management
  • Email Protection
  • Penetration Testing
  • Web Filtering
  • Security Policies
  • Application Whitelisting

CYBERSHIELD MDR-COMPLETE is deployed in minutes and is continually monitored by our analysts who report on and mitigate any potential attacks immediately. Routine scanning and penetration tests are used to identify system vulnerabilities. The results of testing together with our recommendations for remedial activity are delivered in reports at regular intervals.

For a full list of package features, see the MDR-MATRIX product comparison.

The average cost of a cyber breach in 2017 was £600,000.


Asset Discovery

Active and Passive Network Asset Discovery is performed as its vital that we understand what is on your network, how it is performing and communicating.


Vulnerability Assessment

Vulnerability Assessment is achieved by our inbuilt vulnerability scanner that performs a full scan periodically. The Vulnerability scanning is a vital part of our managed service as it allows us to identify and hunt for new and known threats instantly. Once a new vulnerability is discovered we can build a specific scan to identify all hosts that are vulnerable and set about patching and remediation

Intrusion Detection

Intrusion Detection is achieved at the Network level (NIDS) and Endpoint (HIDS) in our solution as this gives us complete insight. Network Intrusion is achieved by listening in on your network switches which a small agent is deployed to all hosts in order to pickup information direct from the endpoints.


Behavioural Monitoring

Behavioural monitoring for your network & systems is essential for spotting unknown threats. It’s also useful in investigating suspicious behaviour and policy violations. When it comes to identifying threats in your environment, the best approach is a multi-layered one. Intrusion detection systems (network and host IDS) identify known threats, and network behaviour analysis can help you identify anomalies and other patterns that signal new, and unknown threats.


CYBERSHIELD MDR-NETWORK goes beyond traditional SIEM software with all-in-one security essentials and integrated threat intelligence so you can accelerate threat detection in your cloud, hybrid cloud, and on-premises environments.

Unlimited Scalability

Next Generation Antivirus (NGAV)

Cyber attacks have grown more advanced and traditional signature-based antivirus software is no longer effective. Today’s attackers use fileless malware, zero-day exploits and advanced persistent threats. Our Next Generation Antivirus software continuously monitors the processes occurring on an endpoint device and blocks attacks before they compromise your system.

Endpoint Detection and Response (EDR)

All endpoint system-level behaviours and events are monitored and recorded. Using known indicators of compromise (IOC) and behaviour analytics techniques, our Advanced Threat Hunting Engine continually searches the data to identify early signs of attacks.

Endpoint Detection and Response (EDR)
Penetration Testing

Penetration Testing

A penetration test or “ethical hack” evaluates the ability of a network or application to withstand a real cyber attack. Vulnerabilities first identified by routine scanning are exploited manually in an approved and controlled manner. This detailed ‘attack methodology’ is then used to recommend appropriate remediation and control measures for the future.

Patch Management

All software that runs on a computer device contains security flaws. When discovered, these vulnerabilities are used by cyber criminals to attack the device and its connected network. Product software vendors provide fixes for vulnerabilities and it is essential that all software is updated on a regular basis.

Patch Management
Email Protection

Email Protection

Email is involved with over 65% of the cyber attacks on UK businesses. Our cloud-based email security solution delivers industry leading threat and anti-spam protection for Office 365, Google Suite and Microsoft Exchange. This includes advanced protection from spear phishing, ransomware, and Business Email Compromise attacks.


The CYBERSHIELD Portal is the central hub of this service and provides a full overview of all information that can be viewed both by you and our cyber security management team. Multiple dashboards are used to view ticket information and events, change control, status reports and a full overview of all assets and their status.

To find out how Wizard Cyber can help you, enter your details in the form and we’ll get in touch.