(yes, these are the actual prices)
Our pricing is simple. It’s based on how many endpoints and accounts you’re trying to protect. You choose one of our three service levels and we provide service in yearly increments (or monthly for the first year if you choose). We don’t nickel and dime you with add-ons. And there’s no extra charge for us to monitor more security applications or cloud services.
Expel monitors your environment around the clock.
Includes all standard features
24 hours a day
365 days a year
Includes all standard features
24 x 7 x 365
plus threat hunting
Even our pricing is transparent
(if you’re from the procurement department click here)
We’re as tired as you are with the time-wasting back-and-forth that’s required to get to a “real” price for most security products. These are our actual prices. If you love a good negotiation you can check out our negotiation-friendly prices.
Tell us what you’d like us to monitor:
*We currently only hunt on your infrastructure
- Expel Night Shift
- Expel 24x7
- Expel 24x7 with Hunting*
What do you consider endpoints?
When we talk about endpoints, we mean laptops, workstations and servers. We’re not including mobile devices or things like printers, thermostats and other things with an IP address.
How should I calculate my total number of user accounts?
When we talk about users we mean how many user accounts you have for apps like O365 and G suite. Our pricing is based on the largest number of users for an application we monitor. For example, if you have 5,000 user accounts for O365 and 3,000 user accounts for Okta, the total cost is based on 5,000 users.
What technology do you integrate with?
We’re constantly adding to our list of integrations but below are a few examples. You can find a more detailed list here.
Network: Palo Alto Networks and Darktrace
Endpoint: Carbon Black and Crowdstrike
SIEM: Sumo Logic and IBM QRadar
Cloud infrastructure: AWS, Azure, and GCP
Cloud applications: O365 and G Suite
What do you mean by “hunting”?
Good question. We use data from your existing SIEM, network, endpoint and cloud infrastructure to apply advanced investigative technique to find evidence of malicious activity.
People use the term “hunting” in lots of different ways, and one thing we’re trying to do is demystify it so it’s more accessible and understandable to our customers. Check out our blog to learn more.
All of our service levels include:
- Monitoring by Expel analysts
- Unlimited security device monitoring
- Unlimited cloud application monitoring
- Alert triage performed by Expel analysts
What resources should I count?
When we talk about resources we’re referring to three areas.
- Compute: your servers or processors in the sky, like AWS EC2, Lambda, or Azure virtual machines
- Storage: your standard disk like AWS S3, Blob storage and *SQL
- Containers: how you approach scaling computer power up and down like Docker and Microservices
We get all resources aren’t created equally and weigh them a bit differently. We’re working on an easy way to estimate the cost based on your resources, in the meantime contact us for pricing.