Skip to content
Primary Menu
Demos & Tours
Blog
Partners
Customers
Search for:
Primary Menu
Why Expel?
Overview
Tech integrations
Pricing
What others say
Products
Overview
Security Operations Platform
Managed Detection and Response (MDR)
Phishing
Threat Hunting
Vulnerability Prioritization
I want to
Overview
Protect the cloud
Protect my cloud
Protect AWS
Protect Microsoft
Protect SaaS apps
Protect against common threats
Protect against BEC
Protect against ransomware
Protect against supply chain attacks
Protect against cryptojacking
Enable auto remediation
Get a SOC overnight
Make every security investment count
Replace my MSSP
Secure Kubernetes
Company
Overview
Equity, Inclusion & Diversity
Careers
Newsroom
Resources
All resources
Infosecurity Europe 2023
Off Script webcast series
vSOC Tour
Free Trial
Contact Us
Search for:
Why Expel?
Overview
Tech integrations
Pricing
What others say
Products
Overview
Security Operations Platform
Managed Detection and Response
Phishing
Threat Hunting
I want to
Overview
Enable auto remediation
Get a SOC overnight
Make every security investment count
Replace my MSSP
Secure Kubernetes
Protect my cloud
Protect AWS
Protect Microsoft
Protect SaaS apps
Protect against common threats
Protect against BEC
Protect against ransomware
Protect against supply chain attacks
Protect against cryptojacking
Company
Overview
Equity, Inclusion & Diversity
Careers
Newsroom
Resources
Overview
Infosecurity Europe 2023
Off Script webcast series
vSOC Tour
Customers
Partners
Demos & Tours
Blog
Free Trial
Contact
✕
Go Off Script with Expel. Check out our new webcast.
Learn more
Cloud security
‹ Back to Resources
Customer identity and access management platform selects Expel for cloud coverage and transparent, reliable partnership
Finding and plugging security gaps in the cloud
CSO Perspectives
MITRE ATT&CK in GCP: A defender’s cheat sheet & mind map kit
What Does Good Detection and Response Look Like in the Cloud? Insights from Expel MDR
MITRE ATT&CK in AWS: A defender’s cheat sheet & mind map kit
Inside an investigation: compromised AWS access keys
Azure guidebook: Building a detection and response strategy
EXE Live | How to get started with a multi-cloud strategy
EXE Live | Finding contrails: How to track data access in the cloud
Following the CloudTrail: Where to get started with AWS security monitoring
Qlik selects Expel for 24×7 monitoring for Qlik Sense