Continue to surf
the wave in peace

SOC-as-a-Service (SOCaaS) is BSOC
cybersecurity in expert hands

Event monitoring, alerts and Incident management service.

Find out what BSOC can do for your business.

Gain insight from in-depth analysis of security events and breaches. Our team will find the root cause and create customized workflows to fill security gaps.

Visibilize your company's cyber risks
your company's cyber risks
simple and in real time

BSOC’s real-time dashboards make it easy for executives to understand the status of cybersecurity risk, making the entire remediation chain visible and manageable. It also provides event correlation for intelligent alerts and behavioral learning via artificial intelligence. Take advantage of the opportunity to have much more than a SOC and the full support of CAMEL 360.

Learn about the big advantages of BSOC versus a traditional cybersecurity service

  1. Focus on devices
  2. Reactive monitoring
  3. Weekly or monthly reports
  4. Focus on infrastructure
  5. Server criticality
  6. Technology specialists
  1. Focus on your business
  2. Zero Day Monitoring 
  3. Real-time 7×24 dashboards
  4. Focus on Assets 
  5. Business Service Criticality
  6. Specialists + Artificial Intelligence
  7. Autonomous management of vulnerability analysis.
  8. Online access for BSOC management
  9. Customer industry benchmark
  10. Remediation efficiency status

No matter the complexity or size of your business. We deliver expert-level resources because we understand that a cybersecurity incident can affect everyone equally.

An on-demand BSOC service delivers resources and platforms at very high costs, for a monthly paid subscription only.

BSOC is scalable for your business. As your business grows, we grow with you in demand and maturity of cybersecurity processes.

BSOC enables great time savings, improved efficiency in dealing with cyber threats and world-class platform.

Unsurpassed and totally on-demand service

The BSOC (Business Cybersecurity Operation Center) service offers an advanced service, no matter the size of your company.  With our on-demand growth system, we deliver visibility of cyber threats to executive management in a clear and simple way for efficient decision making and subsequent control of the assignment, progress and resolution of threats, all this in a granular way by areas (IT, OT, industrial networks), either with internal or external personnel.

Full remote operation of your SOC, at any time and from any location

Switch to camel

The purpose of this service is the early detection and management of cybersecurity incidents or alerts, these incidents will be raised from the integration of the client’s technological infrastructure and the analysis of logs delivered by each component integrated to Camel’s SIEM, these CI can exist on premises or in the cloud and should only point their logs or integrations to the servers delivered by Camel to the client.

Ready to get started?
Our team is ready to help you

Schedule a meeting with one of our security experts and find out how Camel’s managed detection and response capabilities can help you. Have Camel’s SOC-as-a-Service (SOCaaS) team transform security operations from cost to value-generating assets.

Camel specialists, involved in the process of assisting or protecting against external or internal attacks, will all be developed with Camel 360 technology and its event correlators, human behavior pattern emulation or API-like integrations. The great differentiators of this service with the traditional vision, is that the client will have the ability to obtain the risk of each process or critical service, calculate the risk in real time and visualize the business as a whole and not as isolated technological islands.

SIEM y Log Management

- Event Correlation
- Log Management
- 12 months log retention

Asset Discovery

- API-powered asset discovery
- Network asset discovery
- Software and services discovery

Extension Of Your Team

- Constant communication
- Guided team response
- Expert security recommendations

Integration With Existing Systems

- Accept logs from most devices
- Powerful integration with many brands
- Supports cloud services and enterprise tools

Vulnerability Assessment

- Network Vulnerability Scanning
- Cloud Vulnerability Scanning
- Host-based Intrusion

Intrusion Detection

- loud Intrusion Detection
- Host-based Intrusion Detection (HIDS)
- Edge-to-end user tracking

Behavioral Analysis

- Asset access logs - Cloud access and activity logs - AWS VPC Flow monitoring - VMware ESXi Access logs

Endpoint Detection And Response

- File Integrity monitoring
- Continuous endpoint monitoring
- Proactive querying and threat detection

Elige el que más se acomoda a tus necesidades y sin restricciones para cambio de plan

Plan Estándar

Servicio / mes

  • Up to 100 assets
  • Up to 4 integrations (Linux, Windows, Fortinet, Palo Alto, Cisco, etc.)
  • 5 correlation rules
  • Up to 2 Cases
  • Up to 4 business services
  • 7×24 automatic alerts

Plan Silver

Servicio / mes

  • Up to 300 assets
  • Up to 6 integrations (Linux, Windows, Fortinet, Palo Alto, Cisco, etc.)
  • 10 correlation rules
  • Up to 4 Cases
  • Up to 6 business services
  • 7×24 automatic alerts

Plan Gold

Servicio / mes

  • Up to 1000 assets
  • Up to 8 integrations (Linux, Windows, Fortinet, Palo Alto, Cisco, etc.)
  • 20 correlation rules
  • Up to 8 Cases
  • Up to 10 business services
  • 7×24 automatic alerts

Hacemos que lo complejo parezca simple con nuestros especialistas en ciberseguridad y una suite corporativa empresarial que te protege ante cualquier ciberataque y además es increíble.

Would you like to schedule a demonstration?

Schedule an appointment
with a specialist

Contáctanos a través de nuestro correo

Plano Ouro

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

10
Criação de serviços comerciais
51-75
Gama de ativos
4
Descoberta de ativos
4
Número de varreduras de rede
2
Número de varreduras na web
Sim
Alertas enviados por e-mail
8
Configuração das regras SIEM
Sim
Gerenciamento de quebra de segurança
2
Criação de matrizes de risco
4
Reuniões com o gerente de serviços
75
Integração com plataformas externas SIEM

Plano Prata

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

4
Criação de serviços comerciais
26-50
Gama de ativos
2
Descoberta de ativos
2
Número de varreduras de rede
Sim
Alertas enviados por e-mail
Sim
Gerenciamento de quebra de segurança
2
Reuniões com o gerente de serviços

Plano Padrão

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

2
Criação de serviços comerciais
0-25
Gama de ativos
1
Descoberta de ativos
1
Número de varreduras de rede
Sim
Alertas enviados por e-mail
Sim
Gerenciamento de quebra de segurança
Sim
Reuniões com o gerente de serviços

Gold Plan

Enrich and analyze tracking, logging and real-time metrics with auto-generated application topology.

10
Creating Business Services
51-75
Asset Range
4
Asset discovery
4
Number of network scans
2
Number of web scans
Yes
E-mail alerts
8
SIEM rules configuration
Yes
Security breach management
2
Risk matrix creation
4
Meetings with service manager
75
Integration with external SIEM platforms

USD 1.900/month

Silver Plan

Enrich and analyze tracking, logging and real-time metrics with automatically generated application topology.

4
Creating Business Services
26-50
Asset Range
2
Asset discovery
2
Number of network scans
Yes
E-mail alerts
Yes
Security breach management
2
Meetings with service manager

USD 1.300/month

Standard Plan

Enrich and analyze tracking, logging and real-time metrics with auto-generated application topology.

2
Create Business Services
0-25
Asset Range
1
Asset discovery
1
Number of network scans
Yes
E-mail alerts
Yes
Security breach management
Yes
Meetings with service manager

Plan Enterprise 3

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

Ilimitado
Creación de Servicio de Negocio
1001-3000
Rango de Activos
Ilimitado
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
MITRE
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
8
Creación de matrices de riesgos
6
Reuniones con gestor del servicio
3000
Integración con plataformas externas SIEM

Plan Enterprise 2

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

20
Creación de Servicio de Negocio
301-1000
Rango de Activos
20
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
20
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
6
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
1000
Integración con plataformas externas SIEM

Plan Enterprise 1

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

15
Creación de Servicio de Negocio
76-300
Rango de Activos
10
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
12
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
4
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
300
Integración con plataformas externas SIEM

Plan Gold

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

10
Creación de Servicio de Negocio
51-75
Rango de Activos
4
Descubrimiento de Activos
4
Cantidad de scanneo de red
2
Cantidad de scanneo de web
Envío de alertas email
8
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
2
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
75
Integración con plataformas externas SIEM

Plan Silver

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

4
Creación de Servicio de Negocio
26-50
Rango de Activos
2
Descubrimiento de Activos
2
Cantidad de scanneo de red
Envío de alertas email
Gestión de Brechas de seguridad
2
Reuniones con gestor del servicio

Plan Standard

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

2
Creación de Servicio de Negocio
0-25
Rango de Activos
1
Descubrimiento de Activos
1
Cantidad de scanneo de red
Envío de alertas email
Gestión de Brechas de seguridad
Reuniones con gestor del servicio