24/7 SOC

CYBER SECURITY EXPERTS

SME FOCUSED

CERTIFIED CONSULTANTS

CYBERSHIELD MANAGED THREAT DETECTION & RESPONSE MATRIX

Below is all of the MDR packages offered by Wizard Cyber which breaks down features and benefits of each package. Highlight over the description to view more details about the particular feature or benefit.

MANAGEMENT

CYBERSHIELD PORTALCYBERSHIELD PORTAL offers single pane of glass view of your security posture
CYBERSHIELD APPCYBERSHIELD Mobile App is available on Android and Apple App Store
REPORTING MODULECYBERSHIELD PORTAL includes the reporting module where reports are genearated and stored.
CHANGE CONTROLCYBERSHIELD CHANGE CONTROL is our change control management module which is included in all MDR packages.
SECURITY TICKETSCYBERSHIELD TICKETING SYSTEM is our internal system for tracking and logging events. Customer has full visibility on all tickets.
ASSET MANAGEMENTCYBERSHIELD includes Asset management as its important to track who and what is on the network

SECURITY FUNCTIONS

PATCH MANAGEMENTOS & 3rd party patch management for all major applications
--
SECURE DNSCYBERSHIELD Secure DNS keeps you safe while browsing the internet
--
--
--
WEB FILTERINGBlocks access to unapproved websites with objectionable content, spyware and viruses.
--
--
--
--
BACKUPBackup plan strategy check.
--
--
--
--
SECURITY POLICIESPredefined security policies available for download via the portal for Active Directory/Group Policy controlled endpoints
--
--
--
EMAIL PROTECTIONEmail Filtering service to filter out spam and other malicous content before it arrives in your inbox
--
--
--
DNS HEALTHCHECKDNS Check service to ensure email records, SPF, DKIM, DMARC are all correctly set. Monitoring is constant./span>
--
--
--
NEXT GENERATION ANTI VIRUS (NGAV)Superior NGAV Protection for malware and non-malware based attacks
--
--
ADVANCED THREAT HUNTINGContinous 24/7 threat hunting by our security analysts searching for abnormal behaviour
--
--
--
NETWORK INTRUSION DETECTION (NIDS)Detecting intrusion events by analysing network traffic
--
--
--
HOST INTRUSION DETECTION (HIDS)Detecting intrusion events by analysing endpoint traffic
--
--
--
BEHAVIOURAL MONITORING (SYSTEM)Behavioural anaylsis is performed at the Network level to hunt for anomalies
--
--
--
BEHAVIOURAL MONITORING (USER)Identify and eliminate insider threats
--
--
--
--
VULNERABILITY SCANNING (INTERNAL)Continous internal vulnerabiliy scanning to ensure weaknesses are identified immedaitely
--
--
--
VULNERABILITY SCANNING (EXTERNAL)External vulnerabiliy scanning to ensure weaknesses are identified immedaitely
--
--
--
--
PENETRATION TEST (EXTERNAL)External penetraion test - up to 8 IP's maximum
--
--
--
--
SECURITY INFORMATION EVENT MANAGEMENT (SIEM)Security information is collected and analysed centrally.
--
--
--
LOG MANAGEMENTSecurity information is collected and analysed centrally.
--
--
--

SECURITY OPERATIONS CENTRE

SOC-AIArtifical Inteillgence Security Operating Centre has very little security analyst input
--
--
--
--
FULL-SOCArtifical Inteillgence + Security analyst combined Security Operating Centre
--

SUPPORT

EMAIL SUPPORTUnlimited email support
SECURITY ACCOUNT MANAGERDedicated Account manager is assigned to you to oversee your security posture
--