AnnouncementCase StudyCheckmarkcustomer-story-iconData Sheethow-to-logoposts
skip to Main Content
X

Q2 Threat Report. SOC trends to take action on | Gartner Report: Emerging Technologies and Trends Impact Radar

X

Resources

All resources, Release notes, Events

Read more

Expel Quarterly Threat Report - Q2 2022

Read more

Gartner® Emerging Technologies and Trends Impact Radar: Security

Read more

Great eXpeltations 2022

Explore our resources

Analyst report

Frost Radar™, Global MDR Market, 2022

Leader in the Frost Radar™ for MDR, 2022 report and recipient of the Frost & Sullivan 2022 MDR Enabling Technology Leader Award...

Whitepaper

MITRE ATT&CK in GCP: A defender’s cheat sheet & mind map kit

A handy resource to help you identify potential attacks in GCP and map them to MITRE ATT&CK tactics....

Analyst report

Gartner® Emerging Technologies and Trends Impact Radar: Security

Per Gartner®, “The goal of this Emerging Technologies and Trends Impact Radar research is to track some of the more impactful emerging technologies driving innovation in the security market.”...

Infographic

12 revealing questions any MSSP or MDR should be able to answer

Ask predictable questions and you get predictable answers. Try these 12 atypical prompts to gain insights from your MSSP or MDR vendor....

Infographic

SOC SNAPSHOT #1: Q1/2022 What we’re seeing: Business email compromise (BEC) trends

Is business email compromise (BEC) still on the rise? Here’s answers to what our SOC saw and when. ...

Infographic

SOC SNAPSHOT #2: Q1/2022 What we’re seeing: Phishing trends

A phishing lowdown visual extracted from our Q1 2022 Threat Report. ...

Customer story

Auth0 selects Expel for super cloud coverage and transparent, reliable partnership

The identity platform uses Expel to help increase overall efficiency and monitor complex cloud environments, 24x7....

Customer story

Daylight Transport chooses Expel’s 24x7 managed detection and response (MDR) for better visibility and faster response

Transportation company gains full coverage of cloud and on-prem environment, cuts time spent on alerts by 66%....

Analyst report

KuppingerCole Market Compass for Security Operations Center as-a-Service (SOCaaS)

This report is a great “go to” if you want an overview of the SOC-as-a-Service (SOCaas) market and an analysis of the top vendors....

KuppingerCole

Customer story

FIA Tech selects Expel’s “APIs not agents” approach for 24x7 managed detection and response (MDR)

Fintech company saves 40 hours a week, shrinks response time with Expel....

Video

A message from our Expel founders

We’ve reached a valuation over $1 billion thanks to our Series E fundraising round, led by CapitalG. Check out what our founders have to say about this exciting news and what’s next for Expel....

Analyst report

IDC Workbook

Download this report to explore the benefits of an MDR along with a checklist to use as your org evaluates providers....

Analyst report

Gartner® Market Guide for Managed Detection and Response Services

This report is a guide for buyers considering Managed Detection and Response (MDR) service providers....

Gartner

Video

Expel Detecting And Defending Against Ransomware

In this on-demand webcast, independent information security expert and author of the best-selling book Hacking For Dummies, Kevin Beaver, joins Expel to discuss this critical aspect of your information security program and what’s likely one of your greatest IT-related risks....

Analyst report

Gartner Report: How to Prepare for Ransomware Attacks

Ransomware continues to pose significant risk to orgs and attacks continue to increase. Time to look beyond just the endpoints to help protect your org....

Whitepaper

Expel for Microsoft

You’re heavily invested in Microsoft and its security tools, now it’s time you get the most value out of it. ...

Analyst report

Forrester Wave

Expel is recognized as a leader in The Forrester Wave™: Managed Detection And Response, Q1 2021 report. And our CEO – along with the whole Expletive crew – are pretty excited about it....

Video

Why hunting is more than looking for threats

Expel’s Matt Peters, Chief Product Officer, and Bryan Geraldo, Senior Detection and Response Engineer, explain what we mean when we say hunting....

Datasheet

Expel third-party assessment questionnaire and email templates

We’ve developed a third-party assessment process. We think it's lightweight but still achieves the objective – determining if a vendor can be trusted....

Whitepaper

How to get started with the NIST Privacy Framework

What’s this new framework and how should you use it? Our CISO’s got all the details plus a FREE downloadable self-scoring tool to help you assess where your org’s at when it comes to privacy....

Tool

How to get started with the NIST CSF

We give you a quick tour of the NIST Cybersecurity framework and describe how you can baseline your efforts in a couple of hours. So check it out....

Whitepaper

Azure guidebook: Building a detection and response strategy

If you’re new to Microsoft Azure – or you want to pour some “Go Fast” on the process of setting up your security monitoring in this popular cloud platform – we’ve got your back....

Whitepaper

MITRE ATT&CK in AWS: A defender’s cheat sheet & mind map kit

With our new cheat sheet, you can quickly identify the paths an attacker might take – all mapped to ATT&CK tactics – once they’ve broken into your AWS environment....

Video

Stories from the SOC: Investigating a phishing attack

Expel’s Ray Pugh walks through a phishing investigation. Learn how our analyst determines if it was malicious, who has been compromised and how to get left of the threat. ...

Video

Inside an investigation: compromised AWS access keys

Hear how we caught an attacker that used a developer’s machine to gain access to AWS....

Video

Fighting the Good Fight: Your 30min Guide to Threat Hunting

Expel’s Matthew Hosburgh and VMware Carbon Black’s Greg Foss, demystify threat hunting and chat about what you can do to keep your org secure....

Video

How to leverage security automation to identify malicious activity

Expel’s Anthony Randazzo and Exabeam’s Andrew Skrei talk about how you can gain visibility to determine what’s malicious and not - all while getting time back in your day....

Video

BEC all grown up: What you need to know now

Bruce Potter and Tyler Fornes chat about best practices to minimize BEC for your business....

Customer story

GreenSky phishing story

Fintech company selects Expel to manage anti-phishing efforts — reduces time spent on phishing investigations by 75 percent...

Video

EXE Live | How to get started with a multi-cloud strategy

Expel's Andrew Pritchett and Lacework's Chris Pedigo help make sense of the gigantic security signals from the clouds and chat about some best practices....

Video

EXE Live | Finding contrails: How to track data access in the cloud

Mary Singh and Andrew Pritchett will walk through different ways to track data access in the cloud and share configuration tips....

Video

Conquering GCPs IAM hierarchy: Where to get started with Service Accounts

Andrew Pritchett and Peter Silberman walk through GCP Service Accounts best practices....

Video

Following the CloudTrail: Where to get started with AWS security monitoring

Expel's Matt Peters and Peter Silberman walk through how to use AWS capabilities as part of your detection and response strategy....

Customer story

Ivanhoe Cambridge customer story

Ivanhoé Cambridge shrinks alert-to-fix time to minutes and saves $150K by optimizing security signal...

Customer story

Qlik customer story

Qlik selects Expel for 24x7 cloud monitoring for Qlik Sense — freeing themselves from tuning, creating space to focus on other security work...

Customer story

GreenSky customer story

Expel’s native integration with GreenSky’s security stack allows firm to turn on managed detection and response (MDR) service in a single day...

Customer story

Scale Venture Partners customer story

Venture capital firm gets “peace of mind” with Expel’s 24x7 managed detection and response service...

Video

ISMG Interview: Beyond the Black Box of MSSPs

Expel CTO Matt Peters talks to ISMG about the questions businesses should ask as they're evaluating MSSPs, and how MSSPs can be more proactive about making their customers more resilient....

Customer story

Pharmaceutical customer story

Pharmaceutical company selects Expel MDR — making it possible to detect and respond to incidents during the first 10 minutes of the “golden hour”...

Customer story

Relativity customer story

Rapidly growing software company selects Expel as transparent managed security partner...

Video

How to get started with the NIST CSF

Newsflash! The NIST Cybersecurity Framework was never intended to be something you could “do.” It’s supposed to be something you can “use.”...

Video

Getting a grip on your cloud strategy

Cloud security today looks a lot like where “traditional” on-prem security was 10 or 15 years ago. Most people are still figuring it out. The first step in coming up with a strategy is understanding how it's different. ...

Whitepaper

A beginner’s guide to getting started in cybersecurity

Our list of five things you can do to take the first steps to an entry-level technical cybersecurity career....

Video

Connecting network and endpoint data to find attackers

Watch this recorded webinar to see how to piece together evidence from endpoint & network detection and response tools -- like CarbonBlack and ProtectWise -- to tell the complete story of an incident....

Video

How to build a detection and response program

Listen in as Endgame and Expel chat about what an effective detection and response program looks like, key metrics to measure whether your program is effective, and how a managed endpoint detection and response program can help you....

Video

Investigating with Darktrace

Expel analysts get to use a lot of really cool network and endpoint technologies. In this video, we highlight some of our favorite investigative features of Darktrace....

Datasheet

Expel 24x7 for Endgame | Managed Endpoint Detection Response

Expel analysts monitor your environment around the clock using Endgame’s comprehensive coverage across the MITRE ATT&CKTM matrix to stop threats and minimize damage and loss....

Whitepaper

How to get started with the NIST Cyber Security Framework CSF

We give you a quick tour of the NIST CSF framework and describe how you can baseline your efforts in a couple of hours. So check it out....

Whitepaper

Five ways to keep your security nerds happy

Hiring and keeping good IT / security practitioners can be tough, so once you’ve got good talent you’ll need to work to keep them. Here are five ways to make them happy and keep them coming back....

Whitepaper

How much does it cost to build a 24x7 SOC?

Not all 24x7 SOCs are created equal. We outline four possible security operations centers and an estimate of your costs....

Whitepaper

Ready. Set. Go. Welcome to Expel.

We’ve been heads-down over the past year and change, building tech and working with customers, it seems crazy to think we’re here. Today, we’re announcing the first completely transparent managed security service....

Datasheet

Expel overview

Check out this brochure to learn what we do (transparent managed security) and what you get from Expel and our team of analysts...

Whitepaper

Warning signs that your MSSP isn’t the right fit

Look out for these five indicators that it's probably time to start considering alternatives to your managed security services provider...

Whitepaper

Get your security tools in order: seven tactics you should know

Do you have the equipment and material needed to get your work right? Here are seven things to keep in mind to bring harmony to your toolchain...

Whitepaper

Budget planning: determining your security spend

Guidance and a short list of things you can do to help you answer the common question "how much should I spend on cybersecurity?"...

Whitepaper

Mistakes to avoid when measuring SOC performance

Discover the three most common mistakes companies make when developing their first set of operational metrics...

Whitepaper

A cheat sheet for managing your next security incident

Tactical advice on how to survive a security incident when you don’t have an incident response plan...

Review Expel on G2

© 2022 Expel, Inc. All Rights Reserved

Back To Top