Expel. has filed a patent for a system and method that automates the verification of cybersecurity events. The technology involves constructing response-enabled verification communications based on event features, allowing subscribers to escalate or de-escalate threat severity levels, and routing events accordingly based on subscriber input. GlobalData’s report on Expel gives a 360-degree view of the company including its patenting strategy. Buy the report here.
According to GlobalData’s company profile on Expel, AI-assisted threat classification was a key innovation area identified from patents. Expel's grant share as of January 2024 was 53%. Grant share is based on the ratio of number of grants to total number of patents.
Automated verification system for cybersecurity threat handling

The patent application (Publication Number: US20240028714A1) describes a method for verification-informed handling of cybersecurity activity. The method involves attributing distinct threat activity types to a target cybersecurity event, constructing a cybersecurity threat verification communication based on an automated verification workflow, and transmitting this communication to a specific destination. Based on the response received, the method selectively routes the cybersecurity event for further action, such as escalation or disposal. Additionally, the method includes executing automated cybersecurity investigation workflows to accelerate threat mitigation based on the threat activity type.
Furthermore, the patent application details the association of threat severity levels to cybersecurity events, updating these levels based on verification responses. It also outlines the routes for cybersecurity event handling, including escalation and disposal routes. The method involves transmitting verification communications based on cybersecurity policies and threat activity types, utilizing distinct templates for different threat types. The communication includes selectable interface objects to indicate whether the event is a cybersecurity threat or not. Additionally, the method includes time-based triggers for executing automated investigations and deriving threat intelligence data. Overall, the method aims to streamline cybersecurity event verification, investigation, and response processes for efficient threat mitigation.
To know more about GlobalData’s detailed insights on Expel, buy the report here.
Data Insights
From
The gold standard of business intelligence.
Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.