24/7 SOC

CYBER SECURITY EXPERTS

SME FOCUSED

CERTIFIED CONSULTANTS

CYBERSHIELD MANAGED THREAT DETECTION & RESPONSE MATRIX

Below are the MDR packages offered by Wizard Cyber which explains the services, features and benefits of each MDR package. Highlight over the description to view more details about the particular feature or benefit.

MANAGEMENT

ASSET MANAGEMENTCYBERSHIELD includes Asset management as its important to track who and what is on the network
CHANGE CONTROLCYBERSHIELD CHANGE CONTROL is our change control management module which is included in all MDR packages.
CYBERSHIELD APPCYBERSHIELD Mobile App is available on Android and Apple App Store
CYBERSHIELD PORTALCYBERSHIELD PORTAL offers single pane of glass view of your security posture
REPORTING MODULECYBERSHIELD PORTAL includes the reporting module where reports are genearated and stored.
SECURITY TICKETSCYBERSHIELD TICKETING SYSTEM is our internal system for tracking and logging events. Customer has full visibility on all tickets.

SECURITY FUNCTIONS

ACTIVE/PASSIVE ASSET DISCOVERYActive and Passive methods of scanning for assets.r
--
--
--
ADVANCED THREAT HUNTINGContinous 24/7 threat hunting by our security analysts searching for abnormal behaviour
--
--
--
APPLICATION WHITELISTINGApproved software only allowed to run.
--
--
--
--
BACKUPBackup plan strategy check.
--
--
--
--
BEHAVIOURAL MONITORING (SYSTEM)Behavioural anaylsis is performed at the Network level to hunt for anomalies
--
--
--
BEHAVIOURAL MONITORING (USER)Identify and eliminate insider threats
--
--
--
--
CLOUD SECURITYAzure Threat Detection will be configured and setup and a security review of Amaazon Web Services and Office 365.
--
--
--
--
DARK WEB MONITORINGMonitor entire corporate domain emails to see if account compromised on Dark Web + 10 Personal Emails.
--
--
--
DNS HEALTHCHECKDNS Check service to ensure email records, SPF, DKIM, DMARC are all correctly set. Monitoring is constant./span>
--
--
--
EMAIL PROTECTIONEmail Filtering service to filter out spam and other malicous content before it arrives in your inbox
--
--
--
EVENT MANAGEMENT (SIEM)Security information is collected and analysed centrally.
--
--
--
HOST INTRUSION DETECTION (HIDS)Detecting intrusion events by analysing endpoint traffic
--
--
--
LOG MANAGEMENTSecurity information is collected and analysed centrally.
--
--
--
MOBILE DEVICE MANAGEMENTCentrally manange mobile devices such as phones and tablets.
--
--
--
NETWORK INTRUSION DETECTION (NIDS)Detecting intrusion events by analysing network traffic
--
--
--
NEXT GENERATION ANTI VIRUS (NGAV)Superior NGAV Protection for malware and non-malware based attacks
--
--
PATCH MANAGEMENTOS & 3rd party patch management for all major applications
--
PENETRATION TEST (EXTERNAL)External penetraion test - up to 8 IP's maximum
--
--
--
--
SECURITY POLICIESPredefined security policies available for download via the portal for Active Directory/Group Policy controlled endpoints
--
--
--
VULNERABILITY SCANNING (EXTERNAL)External vulnerabiliy scanning to ensure weaknesses are identified immedaitely
--
--
--
--
VULNERABILITY SCANNING (INTERNAL)Continous internal vulnerabiliy scanning to ensure weaknesses are identified immedaitely
--
--
--
WEB FILTERINGBlocks access to unapproved websites with objectionable content, spyware and viruses.
--
--

SECURITY OPERATIONS CENTRE

FULL-SOCArtifical Inteillgence + Security analyst combined Security Operating Centre
--
SOC-AIArtifical Inteillgence Security Operating Centre has very little security analyst input
--
--
--
--

SUPPORT

EMAIL SUPPORTUnlimited email support
SECURITY ACCOUNT MANAGERDedicated Account manager is assigned to you to oversee your security posture
--