Go back

Democratizing Security Signals

In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.

Engineering
October 4, 2023
4m read
4m read
4m listen
4m watch
4m watch
okta plus material in a solid background
speakers
speakers
speakers
authors
Material Security Team
participants
No items found.
share

In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.

Find us at Oktane 2023 at the Moscone Center in San Francisco from Oct 3rd-5th at booth EM9 to meet the team and learn more!

Data Architecture Matters

Material was founded by three data analytics nerds (their words!), and the product architecture reflects that. Material syncs an organization’s entire email history and current activity into a data warehouse and uses it to power security controls, while giving security teams unprecedented insight into email data and risk.

The promise of the data warehouse architecture is to bring together large, complex data sets like Material’s to create actionable insights, or for security teams, actionable signals. Material believes in this promise, but we recognize it brings a new set of challenges.

Much of the data pulled from different systems comes in different formats. Direct API integrations make connections seamless, but a user, session, and action can still look different from system to system. Without consistency across events and data, it’s difficult to give your security operations team actionable signals that will make a meaningful difference in an investigation.

Architecture matters. So does consistency.

Consistent Signals For Continuous Security

The Shared Signals and Events Framework (SSE) is an initiative within the OpenID Foundation that aims to standardize the sharing of events, signals, and other information between distributed security platforms, to more easily identify identity-based threats and prevent lateral movement in the case of an incident. SSE supports a streaming architecture that enables participating vendors to broadcast and receive events that indicate a risk-state change.

We are excited to partner with Okta to share risk signals via this framework. Material’s unique visibility into Microsoft 365 and Google Workspace environments lets us provide security signals directly from inside the Cloud Office, such as tracking access to sensitive email and attachments, changes in collaboration behaviors, insight on email-based attacks like phishing, and tons of other interactions. By surfacing these over time into Identity Threat Protection alongside other great security partners in a standards-based way, customers can detect and respond to risk events, such as by changing their authorization or session policies, more quickly and with better visibility across the security estate.

This new initiative builds on our strong partnership with Okta to bring greater access controls for mailboxes. We approach any new standard with a healthy balance of hope and humility. Given the strength of our teams and dedication to solving hard challenges for our customers, we expect great things to come. Stay tuned!

*Any products, features, or functionality referenced in this announcement that are not currently generally available, may not be delivered on time or at all. Product announcements do not represent a commitment, obligation, or promise to deliver any product, feature, or functionality, and customers should not rely on them to make purchase decisions.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

James Juran
7
m read
Read post
Podcast

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen to episode
Video

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m watch
Watch video
Downloads

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Watch video
Webinar

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen episode
blog post

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

Abhishek Agrawal
7
m read
Read post
Podcast

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen to episode
Video

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m watch
Watch video
Downloads

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Watch video
Webinar

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen episode
blog post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen to episode
Video

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m watch
Watch video
Downloads

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Watch video
Webinar

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen episode
blog post

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

Material Team
3
m read
Read post
Podcast

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen to episode
Video

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m watch
Watch video
Downloads

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Watch video
Webinar

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New