Kim Mahoney
Posts by Kim Mahoney
Threat intel | 4 min read
Beyond alert management: How threat intelligence actually helps your SOCWe're expanding our dedicated threat intel function to provide our customers with smarter, faster, threat intelligence they can use.
Product | 2 min read
Email coverage expansion: Sublime Security integration now liveExpel MDR for Email now integrates with Sublime Security for enhanced threat visibility across your inboxes.
MDR | 3 min read
Getting real value from your Palo Alto investment: how Expel MDR transforms security operationsExpel MDR reduces Palo Alto alert noise by 87% with 17-minute response times. Expert 24x7 analysis maximizes your security investment ROI.
Product | 3 min read
Unlocking more from your CrowdStrike investmentExpel cuts through the flood of CrowdStrike alerts by 91% on average to maximize your security tools with strong API connections.
MDR | 5 min read
Insights on the MDR market from the Gartner® Security & Risk SummitExpel attending the Gartner Security & Risk Summit. Here are the insights we gathered on the MDR market post-conference.
MDR | 2 min read
Simplifying Microsoft security with Expel MDRExpel MDR seamlessly integrates with all the Microsoft security tools in your tech stack, from Microsoft Azure to Microsoft 365 and more.
Product | 2 min read
Expel MDR customers benefit from expanded threat intel experienceThreat Bulletins are now available in Expel Workbench™, including details on any threat hunting completed to resolve the issue.
Company news | 3 min read
Expel again recognized in the Gartner Market Guide for Managed Detection and Response ServicesThe report provides an overview of the MDR services market for buyers considering service providers. Here’s a peek at some of the insights.
MDR | 3 min read
AI and security: hype or hope?Now that the dust is settling and the AI picture is getting clearer, it's time to separate fact from fiction.
MDR | 2 min read
Risk-based prioritization is the key to your vulnerability management challengesInstead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.
MDR | 2 min read
Threat hunting complements MDR for a stronger defensive strategyLearn how an elite MDR operation works with threat hunting to rapidly uncover critical insights and stop threats faster.
MDR | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?Prioritize vulnerabilities effectively. Learn how management covers the full lifecycle and why prioritization is key to reducing your risk.
