CTOs on the Move

Expel

www.expel.io

 
Expel is a managed detection and response (MDR) provider whose vision is to make great security accessible. The company offers 24x7 security monitoring and response for cloud, hybrid and on-premises environments. Expel uses the security signals customers already have so organizations can get more value from their existing security investments. And Expel connects to customer tech remotely through APIs, not agents, so its security operations center (SOC) can start monitoring a customer`s environment in a matter of hours, letting their internal teams get back to focusing on the most strategic security priorities that are unique to their business.
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million
  • www.expel.io
  • 12950 Worldgate Drive Suite 200
    Herndon, VA USA 20170
  • Phone: 844.397.3524

Executives

Name Title Contact Details
Peter Silberman
Chief Technology Officer Profile
David Stoicescu
Deputy CISO Profile
David Stoicescu
Deputy Chief Information Security Officer Profile
Greg Notch
Chief Information Security Officer Profile

Funding

Expel raised $20M on 04/10/2018
Expel raised $40M on 06/18/2019
Expel raised $50M on 05/13/2020

Similar Companies

CybelAngel

CybelAngel is a leading digital risk management platform providing enterprises with actionable threat intelligence that enables effective remediation and improved cybersecurity posture. By leveraging artificial intelligence and proven machine learning capabilities, to monitor, detect and manage digital risk across all layers of the Internet, CybelAngel helps organizations protect their intellectual property, brand, and reputation. Every day, CybelAngel detects data leaks that others don`t.

Xlcon

Xlcon is a Phoenix, AZ-based company in the Computers and Electronics sector.

Zatso

Zatso is a San Francisco, CA-based company in the Computers and Electronics sector.

Stellar One Consulting

Our mission is to simplify the implementation and execution of a platform from which your business can launch to new heights, and grow the way you always imagined. The chances are pretty good that your company can be described by at least one of the following: - You`re growing rapidly but your system, or lack thereof, is still holding you back. - There`s a clunky exchange of information with your trading partners, suppliers, and sales channels. - Fragmented, inefficient processes leave people on your team stretched-thin. - You don`t have a dedicated, internal IT team to support your technology needs. - You`re outsourcing some business functions like manufacturing, warehousing, logistics, financial operations or sales. What if you had a partner who could provide a simple, connected, reliable, easy-to-implement solution that allowed you to focus on running your business? Even better, what if your partner could predict the exact cost and timeline to implement the solution? Wouldn`t that be out of this world? We thought so too. That`s why we exist. Our team is a seasoned group of collaborative, adaptable people who relentlessly pursue excellence and who are obsessed with your growth. We are really nice people too, and we work best with companies who share the same values.

Advanced Cyber Security

Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.