Cybersecurity
of tomorrow, today.

Know in real time the technological risk of your company.

Schedule a meeting with a specialist 

Agenda una reunión con un especialista 

Cybersecurity platform for the operation and management of risk management

Different needs, a comprehensive vision.
Although not everyone is looking for the same thing, everyone wants efficient results.
At Camel we know that each role requires different solutions.

Executive management

Visibility

Visualize in real time which of your business services is most affected or most exposed to risk. Be in control and improve decision making.

Leaders in Cybersecurity

Management

Manage and minimize IT risk in your critical processes, all in a single platform. Take control and save the most valuable resource, your time.

Cybersecurity Specialists

Technology

We know that technology moves you. With Camel 360 you can unify, visualize, correlate, detect and automatically respond to all attack activities.

When we tell you that
Camel 360 will make your life
simpler, it's true.

Efficient management of
your cyber risks starts
with CAMEL 360

We give you complete and continuous visibility
continuous visibility of your operational risk.

Visualize the technological risks of your business services and manage the assignment and remediation of threats plus an artificial intelligence component that learns from patterns and automates responses, all from a centralized 24/7 online dashboard.

With CAMEL 360
Close your risk gap
with total visibility

Camel SIEM

Allows agnostic integration with different infrastructure components, perform behavioral patterns or emulate a hacker attack. Camel SIEM belongs to a new and exclusive generation of “SIEM event correlation”, oriented to visualize the technological risk from the perspective of your business, leaving behind the traditional way of monitoring risk depending on the criticality of the events of your infrastructure.

Correlation strategies

Our correlation rules are based on MITRE ATT & CK®. Which is a globally accessible knowledge base of adversarial tactics and techniques based on real-world observations. The ATT & CK knowledge base is used as the basis for the development of specific threat models and methodologies in the private sector, government and the cybersecurity products and services community.

Camel 360, the cybersecurity suite with the most advanced technology in technology risk management.


Classify, organize and manage your business services, with Camel SIEM, Incident, Vulnerability manager, CMDB and Document Risk IA. All with an approach close to the business.

We modernize the
Infrastructure analysis

Maximize your efficiency by mapping your
business services on the infrastructure
infrastructure and assets.

Maximiza tu eficiencia mapeando
tus servicios de negocios sobre la
infraestructura y activos.

CAMEL 360 identifies, manages and calculates technology risk with a modern approach that will change your life.

The benefits
of modern
modern management of
cyber risk management

Services focused on your business

CAMEL 360 is the most suitable tool for organizations and security consultants.

Link the threats with the impact to platforms and platforms and operations.
Visibilize the impact to your company’s lines of business.
Centralizes the entire infrastructure and associates to the different business services, whether IT or OT.
Allows you to generate customized risk customized risk maps for each company.

Ready to get started?

Get advice from our specialists.

..

Schedule a meeting with a specialist 

Contact us through our mail

Plano Ouro

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

10
Criação de serviços comerciais
51-75
Gama de ativos
4
Descoberta de ativos
4
Número de varreduras de rede
2
Número de varreduras na web
Sim
Alertas enviados por e-mail
8
Configuração das regras SIEM
Sim
Gerenciamento de quebra de segurança
2
Criação de matrizes de risco
4
Reuniões com o gerente de serviços
75
Integração com plataformas externas SIEM

Plano Prata

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

4
Criação de serviços comerciais
26-50
Gama de ativos
2
Descoberta de ativos
2
Número de varreduras de rede
Sim
Alertas enviados por e-mail
Sim
Gerenciamento de quebra de segurança
2
Reuniões com o gerente de serviços

Plano Padrão

Enriqueça e analise o rastreamento, registro e métricas em tempo real com a topologia de aplicação gerada automaticamente.

2
Criação de serviços comerciais
0-25
Gama de ativos
1
Descoberta de ativos
1
Número de varreduras de rede
Sim
Alertas enviados por e-mail
Sim
Gerenciamento de quebra de segurança
Sim
Reuniões com o gerente de serviços

Gold Plan

Enrich and analyze tracking, logging and real-time metrics with auto-generated application topology.

10
Creating Business Services
51-75
Asset Range
4
Asset discovery
4
Number of network scans
2
Number of web scans
Yes
E-mail alerts
8
SIEM rules configuration
Yes
Security breach management
2
Risk matrix creation
4
Meetings with service manager
75
Integration with external SIEM platforms

USD 1.900/month

Silver Plan

Enrich and analyze tracking, logging and real-time metrics with automatically generated application topology.

4
Creating Business Services
26-50
Asset Range
2
Asset discovery
2
Number of network scans
Yes
E-mail alerts
Yes
Security breach management
2
Meetings with service manager

USD 1.300/month

Standard Plan

Enrich and analyze tracking, logging and real-time metrics with auto-generated application topology.

2
Create Business Services
0-25
Asset Range
1
Asset discovery
1
Number of network scans
Yes
E-mail alerts
Yes
Security breach management
Yes
Meetings with service manager

Plan Enterprise 3

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

Ilimitado
Creación de Servicio de Negocio
1001-3000
Rango de Activos
Ilimitado
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
MITRE
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
8
Creación de matrices de riesgos
6
Reuniones con gestor del servicio
3000
Integración con plataformas externas SIEM

Plan Enterprise 2

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

20
Creación de Servicio de Negocio
301-1000
Rango de Activos
20
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
20
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
6
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
1000
Integración con plataformas externas SIEM

Plan Enterprise 1

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

15
Creación de Servicio de Negocio
76-300
Rango de Activos
10
Descubrimiento de Activos
Ilimitado
Cantidad de scanneo de red
Ilimitado
Cantidad de scanneo de web
Envío de alertas email
12
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
4
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
300
Integración con plataformas externas SIEM

Plan Gold

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

10
Creación de Servicio de Negocio
51-75
Rango de Activos
4
Descubrimiento de Activos
4
Cantidad de scanneo de red
2
Cantidad de scanneo de web
Envío de alertas email
8
Configuracion de reglas del SIEM
Gestión de Brechas de seguridad
2
Creación de matrices de riesgos
4
Reuniones con gestor del servicio
75
Integración con plataformas externas SIEM

Plan Silver

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

4
Creación de Servicio de Negocio
26-50
Rango de Activos
2
Descubrimiento de Activos
2
Cantidad de scanneo de red
Envío de alertas email
Gestión de Brechas de seguridad
2
Reuniones con gestor del servicio

Plan Standard

Enriquezca y analice seguimientos, registros y métricas en tiempo real con topología de aplicaciones generadas automáticamente.

2
Creación de Servicio de Negocio
0-25
Rango de Activos
1
Descubrimiento de Activos
1
Cantidad de scanneo de red
Envío de alertas email
Gestión de Brechas de seguridad
Reuniones con gestor del servicio