AnnouncementCase StudyCheckmarkcustomer-story-iconData Sheethow-to-logoposts
skip to Main Content

Welcome partners

Kickoff Expel support and get priority for your opportunity

Your Channel Team

You’re going to have questions and we want to make sure you know who can give you the answers. Meet your channel team, the people you can reach out to when you need … well, anything.

Stu Saffer

Channel Account Manager
stu.saffer@expel.io
917-620-3410

Liz Cook

Partner Marketing Manager
liz.cook@expel.io
443-386-4430

We’re here to help

We want you to feel supported from day one. Your partner manager, Liz Cook, is here to answer questions, walk you through onboarding and set up training as your key point of contact.

Blog

Lessons learned from a CISO’s first 100 days

In this guest post, Amanda Fennell, CSO at Relativity reflects on what she’s learned.
read more

Blog

12 revealing questions to ask when evaluating an MSSP or MDR vendor

We’ve heard lots of interesting Qs as prospective customers evaluate which solution's right for them... here are the 12 you should be asking.
read more

Blog

This is how you should be thinking about cloud security

Your IT team isn’t racking and stacking servers like they used to, but cracking the cloud security code is easier than you think. Get our pro tips for doing just that.
read more

Blog

3 must-dos when you’re starting a threat hunting program

So you decided you want to build a threat hunting program ... but where do you start? Here are our three must-dos when you’re planning your hunt.
read more

Blog

Here’s what you need to know about business email compromise (BEC)

How often does a business email compromise actually happen? And what should you do about it? Our infographic answers those questions and more.
read more

Blog

MFA is not a silver bullet to secure your cloud email

Think MFA will be your web mail’s knight in shining armor when a crafty attacker strikes? Think again, and do these four things to make sure your org’s protected.
read more

Blog

5 tips for writing a cybersecurity policy that doesn’t suck

All good cybersecurity policies share some similar traits. Here are our pro tips for creating a solid policy for your own org.
read more

Blog

7 habits of highly effective SOCs

Wondering what it takes to build an effective SOC full of motivated, happy analysts? We’ve got some thoughts on that.
read more

Blog

How to get started with the NIST Privacy Framework

What’s this new framework and how should you use it? Our CISO’s got all the details plus a FREE downloadable self-scoring tool to help you assess where your org’s at when it comes to privacy.
read more

Blog

NIST CSF: A new interactive tool to track your progress

There’s lots to like about the NIST CSF. Here are our practical tips for how to use it, plus a preview of a new NIST feature we introduced in Expel Workbench™.
read more

Blog

7 habits of highly effective (remote) SOCs

Security ops is a team sport … but how do you “play” together when your company’s working 100% remotely? Jon’s got some advice.
read more

Blog

Spotting suspicious logins at scale: (Alert) pathways to success

Find out how our SOC analysts used automation to reduce the time it takes to investigate and report a suspicious login by 75%. The team outlines the process and shares a case study of it in action.
read more

Blog

6 things to do before you bring in a red team

Red team engagements are essential to helping your SOC analysts stay battle ready. But before screaming, “CHARGE,” here are six things you should do to prepare for taking on a red team.
read more

Blog

The myth of co-managed SIEMs

Think you can get a co-managed SIEM and then step away to let the magic happen? Not so fast. Our CISO shares some common myths and the realities you should consider before making a decision.
read more

Blog

3 steps to figuring out where a SIEM belongs in your security program

How can a SIEM help you address your business needs? Do you even need a SIEM? Finding the right answer isn’t easy. Here are some tips to help you make a decision that works best for you.
read more

Blog

Why don’t you integrate with [foo]?

You’ve heard that Expel integrates with your tech. But not YOUR tech. What gives? Well, sometimes it doesn’t always make sense. Expel’s COO explains why and what this means when working with us.
read more

Blog

Performance metrics, part 1: Measuring SOC efficiency

How do you establish metrics for SOC efficiency? This first post in a three-part series shares our team’s approach to setting SOC goals, creating a strategy and measuring success.
read more

Blog

Performance metrics, part 2: Keeping things under control

In this second post in our three-part series on all things metrics and SOC leadership, our team dives into details of what metrics and techniques are used to protect the SOC against volatility.
read more

Blog

Introducing a mind map for AWS investigations

We’ve been doing a lot of investigations in AWS using CloudTrail logs and have been noticing some interesting things along the way. So we created an AWS mind map for our team (and you). Check it out!
read more

Blog

Supply chain attack prevention: 3 things to do now

What do you do when you can’t trust the internet? Supply chain attacks like the SolarWinds Orion breach are not new. Here are some things you can do to help prepare and guard against similar attacks.
read more

Blog

How to create (and share) good cybersecurity metrics

Establishing metrics is vital. But how do you report progress and have a conversation about what you’re seeing? Are you even looking at the right things? Here are some tips on measuring cybersecurity.
read more

Page

How to get started with the NIST CSF

We give you a quick tour of the NIST Cybersecurity framework and describe how you can baseline your efforts in a couple of hours. So check it out.
read more

Page

Azure Guidebook: Building a detection and response strategy

Got Microsoft Azure? Running Microsoft products in your org? Then you might want to get a free copy of our all-new Azure guidebook.
read more

Page

MITRE ATT&CK in AWS: A defender’s cheat sheet & mind map kit

We’ve been doing a lot of investigations in AWS using CloudTrail logs and have been noticing some interesting things along the way. So we created an AWS mind map for our team (and you). Check it out!
read more

Page

Market Guide for Managed Detection and Response Services

MDR services offer turnkey threat detection and response via modern, remotely delivered, 24/7 security operations center capabilities and technology. Security and risk management leaders should use this research to determine whether MDR is a good fit with their operational security requirements.
read more

Page

Forrester Wave

Expel is recognized as a leader in The Forrester Wave™: Managed Detection And Response, Q1 2021 report. And our CEO – along with the whole Expletive crew – are pretty excited about it.
read more

Page

What you can buy

With our SOC analysts chasing down your alerts 24x7, your team can focus on security risks unique to your business
read more

Page

Our customers

See what our customers are saying about Expel
read more

Page

What we do

Discover what we do (hint: managed security) and what you get (answers) with the combination of the Expel Workbench and Expel analysts
read more

Page

Managed Security Demo

See what it’s like to work with Expel (it won’t even cost you an email address)
read more

Whitepaper

How much does it cost to build a 24x7 SOC?

Not all 24x7 SOCs are created equal. We outline four possible security operations centers and an estimate of your costs.
read more

Datasheet

Expel overview

Check out this brochure to learn what we do (transparent managed security) and what you get from Expel and our team of analysts
read more

Datasheet

Where Expel fits in your security operations

Whether you’ve got a team of one, a team of 10 or a team of none here’s our take on how Expel can help
read more

Whitepaper

Getting started with Expel

A step-by-step overview of how to get your security products connected to Expel and login to the Expel Workbench.
read more
Back To Top