Integrations portfolio

You’ve invested in technology that’s right for your environment. We make it work harder. Here are the products we have integrations with and we’re continually adding to the list.

Cloud integrations

We’ve got you covered in the cloud. We ingest signal from your cloud infrastructure and SaaS apps and watch for signs of suspicious activity and unusual user behavior. We’ll also let you know about possible policy violations.

Expel uses API integrations to connect directly to the AWS platform like GuardDuty, Amazon Inspector and CloudTrail. We apply our detection strategy to identify and chase down security risks unique to AWS.

Expel uses built-in APIs to connect to your Azure environment. We collect to a number of Microsoft services like Security Center, ATP and MCAS to detect and chase down alerts.

We leverage an API integration to collect data from GCP services like Event Threat Detection and Admin Activity Audit Logs. Applying our detection strategy we connect the dots from suspicious alerts back to the root cause.

Expel ingest alert signal from Lacework through it’s direct integration to triage alerts and provide you with answers.

Endpoint integrations

We’ll ingest the alert signal from your endpoint solution, add context and surface up the alerts that matter so our analysts can quickly chase them down. We also exercise endpoint products’ investigative capabilities so we can give you answers.

Expel provides 24×7 monitoring and response with our direct integration of CrowdStrike Falcon endpoint platform. Our analysts leverage CrowdStrike Falcon to investigate and determine what happened … providing you with answers, not alerts.

Expel ingests your alerts from CyberArk via Splunk into Workbench to detect suspicious activity

Expel integrates directly with Cylance Protect AV. We ingest the alerts from Cylance and investigate suspicious activity.

Expel analysts monitor your environment 24×7 with our direct integration to Elastic Endpoint Security (formerly Endgame). We ingest your alerts, apply enrichment and investigate suspicious activity.

Expel direct integration with FireEye HX takes the existing alerts and provides 24×7 monitoring and response. Our analysts leverage FireEye HX to investigate and determine what happened … providing you with answers, not alerts.

Expel directly integrates with Microsoft Defender for Endpoint. Our analysts leverage the signal from Defender to triage alerts and provide you with answers.

Expel integrates directly with Palo Alto Network Cortex XDR Pro to provide 24×7 monitoring and response. We ingest the alerts from Cortex XDR Pro and investigate suspicious activity … reducing the workload for your security team.

Expel consumes alerts generated by SentinelOne to Workbench where our analysts leverage the signal from SentinelOne to triage alerts and provide you with answers.

Expel consumes alerts generated by Symantec Endpoint Protection via your SIEM. Our analysts leverage the signal from SentinelOne to triage alerts and provide you with answers.

Expel integrates directly with Tanium Core to provide 24×7 monitoring and response. We ingest the alerts from Tanium Core and investigate suspicious activity … reducing the workload for your security team.

Expel integrates directly with and CB Defense, Carbon Black EDR and Carbon Black Cloud. We ingest the alerts from these products and investigate suspicious activity … reducing the workload for your security team.

Expel consumes alerts generated by Wazuh to Workbench where our analysts leverage the signal from Wazuh to triage alerts and provide you with answers.

Kubernetes integrations

Expel monitors your Kubernetes clusters, enabling you to adopt Kubernetes at scale without security concerns. Our platform generates answers, not alerts, working with your Amazon Elastic Kubernetes Service (EKS) and Google Kubernetes Engine (GKE) infrastructure.

Network integrations

We sift through all of the noise coming from your network devices, find suspicious activity and follow the investigative trail to determine what happened. We’ll provide context about the incident and what actions to take.

We pull alerts from Attivo BOTSink via Sumo Logic or Splunk to detect suspicious activity in your environment.

Expel ingests your alerts from Check Point AV, Anti-bot, IPS and SandBlast via Sumo Logic into Workbench to detect suspicious activity.

Expel ingest the alerts from Cisco FirePower, Cisco Meraki and Cisco Umbrella. Our analysts use Cisco ASA and Umbrella to investigate suspicious activity to determine what happened.

Expel integrates with ExtraHop via API to identify interesting events such as searching for a specific user in a given time range.

Expel integrates with Forcepoint Web Filter via Exabeam. We ingest the alerts and investigate suspicious activity … reducing the workload for your security team.

We pull alerts from FortiGate via the SIEM to detect and investigate suspicious activity.

Expel ingest your iBoss alerts via Splunk into Workbench to detect suspicious activity.

We pull alerts from McAfee IDS via Exabeam Data Lake to detect suspicious activity in your environment.

We pull alerts from Netskope SWG to detect suspicious activity in your environment.

Expel integrates directly with Palo Alto Networks firewall and Prisma Access. We ingest the alerts and investigate suspicious activity … reducing the workload for your security team.

Expel’s direct integration with Protectwise allows our analyst team to take existing rules that come off of Protectwise and determine what events serve as investigative leads, supporting evidences, and events that should be dropped all together.

Via its direct integration with Signal Sciences Web Application Firewall (WAF), our analysts leverage Signal Sciences to investigate and determine what happened … providing you with answers, not alerts.

Expel integrates with Zscaler via Sumo Logic or Splunk. We ingest the alerts and investigate suspicious activity … reducing the workload for your security team.

SaaS integrations

We ingest signal from your SaaS apps and watch for signs of suspicious activity and unusual user behavior. We’ll also let you know about possible policy violations.

Expel uses built-in APIs to connect to your Azure environment. We collect to a number of Microsoft services like Security Center, ATP and MCAS to detect and chase down alerts.

Expel uses built-in APIs to connect to your Box environment. We’ll triage alerts and provide you with answers.

Our direct integration to Dropbox enables us to ingest activity events and alerts in order to monitor and secure your environment.

Expel’s direct integration with Duo enables us to ingest activity events and alerts in order to monitor your environment, provide investigative support and keep your devices secure.

Expel directly integrates with GiHub and provides 24×7 monitoring. We apply our detection strategy to identify and chase down suspicious activity.

Our partnership with Google Workspace leverages APIs to consume and querying data from the Admin APIs. We apply our cloud detection methodology to detect and investigate threats in your environment.

Expel integrates with Microsoft Intune via API to monitor audit events and alerts.

Expel collects data via direct API integrations with the Office 365 platform. We leverage alerts and audit logs from Microsoft to provide you 24×7 detection and response.

Expel uses the admin and user activity data produced by Okta to augment the product during our own detections and gather more context on user authentication activity.

The OneLogin direct integration with Expel enables us to investigate standard activity logs and identify any malicious uses of the OneLogin application.

Expel’s integration with Ping Identity enables us to ingest events to monitor your environment, provide investigative support and keep your devices secure.

Expel integrates with Slack via API to protect against suspicious IP address, time range and location-based authentication requests.

Expel integrates directly with Varonis. Our analysts leverage the signal to triage alerts and provide you with answers.

SIEM integrations

We’ll connect directly to your SIEM whether it lives on-prem or in the cloud. We ingest data, and run ad-hoc queries to detect suspicious activity and gather investigative data to uncover attackers’ footprints.

Our analysts leverage our direct integration with Azure Log Analytics (ALA) to dig deeper when performing investigations.

Expel integrates directly with Azure Sentinel. Our analysts leverage the signal from Sentinel to triage alerts and provide you with answers.

Expel direct integration with DarkTrace takes the existing alerts and provides 24×7 monitoring and response. Our analysts leverage DarkTrace to investigate and determine what happened … providing you with answers, not alerts.

Expel direct integration with DEVO enables our analysts to query log data when performing investigations.

Expel integrates directly with Elastic SIEM. Our analysts leverage the signal from Elastic to triage alerts and provide you with answers.

Expel’s integration with Exabeam Advanced Analytics (UBA) and Exabeam Data Lake enables our analysts to run automated
and ad-hoc queries against your Exabeam data to detect suspicious activity.

Our analysts leverage our direct integration with IBM Qradar and QRadar on the Cloud (QRoc) to detect suspicous activity and dig deeper when performing investigations.

Expel uses built-in APIs to connect to Netskope CASB. We ingest alerts to identify unusual activity.

Expel consumes alerts generated by Proofpoint Insider Threat Management to Workbench where our analysts leverage the signal to triage alerts and provide you with answers.

Expel consumes alerts generated by Securonix to Workbench where our analysts leverage the signal to triage alerts and provide you with answers.

Expel integration Splunk’s Core and Enterprise Security enables our analysts to gather additional information when performing an investigation, providing you with answers … not alerts.

Expel directly integrates with Sumo Logic. When an alert turns into an investigation, our analysts run automated and ad-hoc queries against your Sumo Logic data to gather additional information, providing you with answers … not alerts.

Expel consumes alerts generated by Wazuh to Workbench where our analysts leverage the signal from Wazuh to triage alerts and provide you with answers.