24/7 SOC

CYBER SECURITY EXPERTS

SME FOCUSED

CERTIFIED CONSULTANTS

CYBERSHIELD MANAGED THREAT DETECTION & RESPONSE MATRIX

Below are the MDR packages offered by Wizard Cyber which explains the services, features and benefits of each MDR package. Highlight over the description to view more details about the particular feature or benefit.

MANAGEMENT

ASSET MANAGEMENTCYBERSHIELD includes Asset management as its important to track who and what is on the network
CHANGE CONTROLCYBERSHIELD CHANGE CONTROL is our change control management module which is included in all MDR packages
CYBERSHIELD APPCYBERSHIELD Mobile App is available on Android and Apple App Store
CYBERSHIELD PORTALCYBERSHIELD PORTAL offers single pane of glass view of your security posture
REPORTING MODULECYBERSHIELD PORTAL includes the reporting module where reports are generated and stored
SECURITY TICKETSCYBERSHIELD TICKETING SYSTEM is our internal system for tracking and logging events. Customer has full visibility on all tickets

SECURITY LAYERS

ACTIVE/PASSIVE ASSET DISCOVERYActive and Passive scanning of IT assets
--
--
--
ATTACKER BEHAVIOUR ANALYTICS (ABA)Threat intelligence crafted into Attacker Behaviour analytics detections
--
--
--
ADVANCED THREAT HUNTINGContinous 24/7 threat hunting by our security analysts searching for abnormal behaviour
--
APPLICATION WHITELISTINGApproved software only allowed to run
--
--
BACKUPBackup plan strategy check
--
O
O
--
BEHAVIOURAL MONITORING (USER)Identify and eliminate insider threats
--
--
--
--
CLOUD SECURITYAzure Threat Detection will be configured and setup and a security review of Amazon Web Services and Office 365
O
O
O
--
DARK WEB MONITORING (ATO)Monitor entire corporate domain emails to see if account compromised on Dark Web + 10 Personal Emails
O
O
--
DNS HEALTHCHECKEnsures Domain Name System records for email, SPF, DKIM, DMARC are all correctly set
O
O
O
--
EMAIL PROTECTIONEmail Filtering service to filter out spam and other malicous content before it arrives in your inbox
O
O
O
--
ENCRYPTIONDisk encryption applied to all endpoints where possible
O
O
O
--
ENDPOINT DETECTION & RESPONSEMonitors endpoint system-level events to identity early signs of attack
--
--
EVENT MANAGEMENT (SIEM)Security information is collected and analysed centrally
--
--
--
INTRUDER TRAPS (DECEPTION TECHNOLOGY)Honeypot Traps, Honey files and Honey users are all deployed
--
--
--
LOG MANAGEMENTSecurity information is collected and analysed centrally
--
--
--
MOBILE DEVICE MANAGEMENTCentrally manange mobile devices such as phones and tablets
O
O
--
NETWORK INTRUSION DETECTION (NIDS)Detecting intrusion events by analysing network traffic
--
--
--
NEXT GENERATION ANTI VIRUS (NGAV)Superior NGAV Protection for malware and non-malware based attacks
--
--
PATCH MANAGEMENTOS & 3rd party patch management for all major applications
O
SECURITY POLICIESPredefined security policies available for download via the portal for Active Directory/Group Policy controlled endpoints
O
O
O
--
TWO FACTOR AUTHENTICATION/MFA2FA/MFA will be applied to all critical systems and services and can be applied to the entire infrastructure if required
O
O
O
--
USER BEHAVIOUR ANALYTICS (UBA)Gathering insight into the network events that users generate every day
--
--
--
VULNERABILITY SCANNING (INTERNAL)Internal vulnerabiliy scanning to ensure weaknesses are identified immedaitely
--
--
--
WEB FILTERINGBlocks access to unapproved websites with objectionable content, spyware and viruses
O
--

SECURITY OPERATIONS CENTRE

FULL-SOCArtificial Intelligence Security Operations Centre with full security analyst support
--
SOC-AIArtificial Intelligence Security Operations Centre with minimal security analyst input
--
--
--
--

SUPPORT

EMAIL SUPPORTUnlimited email support
SECURITY ACCOUNT MANAGERDedicated Account manager is assigned to you to oversee your security posture
--

PROFESSIONAL SERVICES

PENETRATION TEST (INTERNAL & EXTERNAL)Evaluates the ability of a system to withstand a real cyber attack
O
O
O
O
SECURITY ASSESSMENTAudit the cyber security posture of your organisation
O
O
O
O
VCISOVirtual Chief Information Security Officer to ensure alignment of security and business objectives
O
O
O
O
O
VULNERABILITY SCAN (EXTERNAL)Automatically search and identify new and known threats quickly
O
O
O
O

= INCLUDED
O = OPTIONAL
-- = NOT INCLUDED