24/7 SOC

CYBER SECURITY EXPERTS

SME FOCUSED

CERTIFIED CONSULTANTS

You are here:

CYBERSHIELD MDR-COMPLETE

360° Protection from Advanced Cyber Attacks

Every organisation in the UK faces the difficult challenge of mitigating against the ever-increasing risks associated with cyber crime. Cyber attacks use advanced technology to exploit the vulnerabilities in your IT system to steal confidential information and disrupt your essential operational activity.


Effective cyber security requires a holistic, integrated approach that involves the identification, detection and removal of cyber threats. It requires the continual update of preventive measures (controls) and regular testing to ensure that these measures are working correctly.


Effective cyber security also requires skilled IT professionals to install, manage and report to senior managers. Outsourcing your cyber security to a trusted Managed Security Service Provider (MSSP) delivers the security expertise and technology required, with minimal impact and a reduced cost to your organisation.

Advanced Threat Prevention, Detection and Incident Response

CYBERSHIELD MDR-COMPLETE is designed to deliver effective and comprehensive cyber security for an organisation of any size. Functioning as your company’s own 24/7 cyber security operations centre, CYBERSHIELD MDR-COMPLETE monitors critical network infrastructure and endpoint assets, proactively hunting for threats and providing actionable remediation when required. It also includes protection for all laptop and mobile devices which are used remotely away from the office.

This fully managed service combines the benefits of the CYBERSHIELD MDR-ENDPOINT & MDR-NETWORK packages with additional email protection, cloud security, security policies, external vulnerability scanning, penetration testing and application whitelisting.

  • Next Generation Antivirus
  • Endpoint Detection and Response
  • Behavioural Monitoring
  • Cloud Security
  • Patch Management
  • Encryption
  • Asset Discovery
  • Vulnerability Assessment
  • Intrusion Detection
  • SIEM Management
  • Mobile Device Management
  • Intruder Traps (Deception)
  • Email Protection
  • Penetration Testing
  • Web Filtering
  • Security Policies
  • Application Whitelisting
  • 2FA/MFA

CYBERSHIELD MDR-COMPLETE is deployed in minutes and is continually monitored by our analysts who report on and mitigate any potential attacks immediately. Routine scanning and penetration tests are used to identify system vulnerabilities. The results of testing together with our recommendations for remedial activity are delivered in reports at regular intervals.

For a full list of package features, see the MDR-MATRIX product comparison.

The average cost of a cyber breach in 2017 was £600,000.

Key Features of CYBERSHIELD MDR-COMPLETE

Asset Discovery

Automated active and passive asset discovery to fully identify all network hardware and software resources

Vulnerability Assessment

Vulnerability Assessment

Automated scans are performed at regular intervals to identify, quantify and prioritise vulnerabilities in a network.

Penetration Testing

A penetration test or “ethical hack” evaluates the ability of a network or application to withstand a real cyber attack. Vulnerabilities first identified by routine scanning are exploited manually in an approved and controlled manner. This detailed ‘attack methodology’ is then used to recommend appropriate remediation and control measures for the future.

SIEM

CYBERSHIELD MDR-COMPLETE goes beyond traditional SIEM software with all-in-one SIEM and log management that quickly correlates and analyses security event data across your network.

Network Intrusion Detection

Data from sensors located at strategic network locations is used to monitor traffic to and from all devices and to detect malicious activity or policy violations.

Attacker Behaviour Analytics

Modern attackers constantly change IP addresses, processes and domains as they attempt to breach an IT system. This evolving attacker behaviour is constantly monitored and compared in real-time to a known database of global attack strategies.

User Behaviour Analytics

User activity across assets, accounts and cloud services is recorded and correlated to potential risky behaviour. This is particularly relevant for identifying compromised passwords and login credentials.

Email Protection

Cyber attacks have grown more advanced and traditional signature-based antivirus software is no longer effective. Today’s attackers use fileless malware, zero-day exploits and advanced persistent threats. Our Next Generation Antivirus software continuously monitors the processes occurring on an endpoint device and blocks attacks before they compromise your system.

Next Generation Antivirus

Cyber attacks have grown more advanced and traditional signature – based antivirus software is no longer effective. Today’s attackers use file less malware, zero-day exploits and advanced persistent threats. Our Next Generation Antivirus software continuously monitors the processes occurring on an endpoint device and blocks attacks before they compromise your system.

Endpoint Detection and Response

CYBERSHIELD MDR-ESSENTIALS employs an Endpoint Detection and Response (EDR) application to record endpoint system-level behaviours and events. Using known indicators of compromise (IOC) and behaviour analytics techniques, the EDR software continually searches the data to identify early signs of attacks.

Patch Management

All software that runs on a computer device contains security flaws. When discovered, these vulnerabilities are used by cyber criminals to attack the device and its connected network. Product software vendors provide fixes for vulnerabilities and it is essential that all software is updated on a regular basis.

Application Whitelisting

Protect endpoint devices and networks from potentially harmful software with an index of approved applications. Centrally managed to ensure undesirable programs do not execute on selected machines.

Web Filtering

Designed to block access to specific websites, web filtering uses rules which prevents employees from accessing unapproved sites that might include objectionable advertising, spyware, viruses and other unacceptable content.

Intruder Traps (Deception Technology)

Intruder traps including honeypots, honey users and honey credentials are crafted to identify malicious behaviour earlier in the attack chain.

Dark Web Monitoring

Secure and centrally manage large-scale deployments of corporate and personal mobile devices. Fully automated configuration and enforcement of corporate BYOD (bring your own device) security policies to all mobile devices.

Mobile Device Management

Secure and centrally manage large-scale deployments of corporate and personal mobile devices. Fully automated configuration and enforcement of corporate BYOD (bring your own device) security policies to all mobile devices.

Backup Management

Routine backup and test recovery remain an essential cyber security best practice. In the event of a cyber breach which has deleted or locked data, restoring a backup may be the only option for a successful recovery. CYBERSHIELD-COMPLETE delivers a regular review of all data stores, backup protocols and recommendations for more effective backup solutions in the future.

Multi/Two Factor Authentication

Multi-factor authentication (MFA) improves cyber security by ensuring that a user is granted access to an IT system only after providing two or more pieces of evidence. Two-factor authentication (2FA) is a type of MFA where users are asked for something they know and something they have (card or token).

Encryption

Microsoft Windows endpoint and server machines will be encrypted using the Encrypting File System (EFS) and/or BitLocker disc encryption as required.

Cloud Security Management

Poorly configured access for the use of cloud-based servers, applications and databases is a common vulnerability exploited by cyber criminals. CYBERSHIELD-COMPLETE provides a regular review of the cloud policies, technologies, and controls deployed in an organisation.

Update Security Policies

A security policy is a set of rules defining access to your network, including permitted services, users and time periods. Updated policies are essential to control the ‘shape’ of your network traffic as it passes through the firewall, or to log specific network events. They are also essential in defining the rules required for the creation and use of strong secure passwords.

WIZARD-CYBER-PORTAL-MACBOOK-SMALL

CYBERSHIELD Portal

The CYBERSHIELD Portal is the central hub of this service and provides a full overview of all information that can be viewed both by you and our cyber security management team. Multiple dashboards are used to view ticket information and events, change control, status reports and a full overview of all assets and their status.

To find out how Wizard Cyber can help you, enter your details in the form and we’ll get in touch.

Loading