Expel. Vulnerability Prioritization.
Expel Vulnerability Prioritization is a SaaS enterprise application that helps companies focus on fixing the most important security issues in their systems. Large organizations often face thousands of potential system vulnerabilities. Instead of overwhelming security teams with raw data, this tool analyzes that information, filters out low-risk issues, and highlights the threats that are most likely to be exploited and could cause real damage.
It takes into account how dangerous each issue is, how critical the affected system is to the business, and whether attackers are actively using that type of weakness elsewhere. The result is a smart, prioritized to-do list that helps companies take action quickly and protect themselves more effectively.

Competitive Analysis and User Research
A new project in scope means a vast amount of research and understanding needs to happen to have full understanding of the project or problem. Reading and analyzing the competitive analysis from marketing was a good starting point. I then reached out to stakeholders to confirm our top five competitors and began to research them and create a spreadsheet of comparable features. I scoured the internet in search of demos, product screen shots, you tube videos and investigating the company websites to see what visuals and product features that already existed. We would also be ingesting our vulnerability data from existing scanners, so using an existing product to poke around and use an existing product was invaluable to help me learn about a new space.
Sending out a quick email survey to some of our existing customers helped gauge important key feaures we would want to include as we built our vulnerability product. Getting about a 20% return on response was very exciting! I also created a detailed script and reached out to 5 customers who expressed interest in having a vulnerability management product as part of their Expel product experience. Uncovering what their major paint points and struggles where with their current service, the most important goal they had with having a vulnerability product and who was all involved in addressing patches and fixing vulnerabilities was just the begining of the questions I was out to answer.
Idenitfying the problem and our focus
The direction we started with was to add vulnerability mangement to our product to increase more sales deals for MDR. With such an large problem space of adding vulnerability management to our existing product and minimal direction from stakeholers, we had to take all the things we knew to be customer problems and organize and prioritize them. Product management, engineering and myself collaborated for hours. We identified all the problems and painpoints we had gathered from our customer survey as well as feedback from user interview sessions. We then organized all that information into major buckets and identified which areas were largest and would being the most value to addressing customers needs. By the end of the workshop, our focus became how to prioritize a few vulnerabilities to fix out of hundreds of thousands.
Wireframing begins
Having completed a heauritistic evalutaion and working with the stakeholders and product team, we decide what is priority to work on first. The Enterprise platform was top priority and I began a complete redesign of the existing product. It is truly exciting to have the opportunity to redesign a product to make all necessary enhancements and users flows. Taking a prodcut that was built by engineers and developers, this was a huge undertaking to redesign. The team was amazing and we worked well together to implement new concepts and establish new processes.
PRODUCT FEATURES
Allow user to connect with their own tech. VP integrates with the customers existing Tenable or Rapid7 scanner to understand their vulnerability landscape; no need to set up new technology, no lengthy onboarding.
Customers can improve their visibility and decision-making. They receive investigation support, prescriptive guidance, and shareable reports to ensure stakeholder alignment. With our MDR as an added input, we inform them of real-world exploits that their scanner hasn’t identified yet.
Users improve their threat detection and response with clear traceability across their environment with context on which machines are impacted and which are at risk.
Dedicated vulnerability prioritation analyst who helps detect and add vulnerabilities to the customers individually curated Expel Prioritized list of vulnerabilities.
High Fidelity Mocks