Our Customers

“I think it’s important to look at the cloud office at a wider holistic level and not just at the point of entry. Understanding its whole life cycle and even what’s being done with it when resting is critical to protecting that platform. Material does that very well.”

“I think it’s important to look at the cloud office at a wider holistic level and not just at the point of entry. Understanding its whole life cycle and even what’s being done with it when resting is critical to protecting that platform. Material does that very well.”

“With Material, we have a mightier team because automation takes away the toil. The security team doesn’t need to check every email and do all the data mapping across multiple tools. It’s so much easier.”

“With Material, we have a mightier team because automation takes away the toil. The security team doesn’t need to check every email and do all the data mapping across multiple tools. It’s so much easier.”

“We're seeing much better adoption because Material allows us to tailor our phishing campaigns to what we're actually seeing in the industry. And it takes a lot of that burden off the end user, which is fantastic for us.“

“We're seeing much better adoption because Material allows us to tailor our phishing campaigns to what we're actually seeing in the industry. And it takes a lot of that burden off the end user, which is fantastic for us.“

“The Material team is highly engaged. They're in our real time communication channels with us. They go above and beyond in terms of delivery. And we see that time and time again. I mean, I can't say enough good things about them.”

“The Material team is highly engaged. They're in our real time communication channels with us. They go above and beyond in terms of delivery. And we see that time and time again. I mean, I can't say enough good things about them.”

“I've seen amazing improvements in our ability to react, relying on well-trusted mechanisms from Material. With just one click, we can disable phishing emails and remove them from people’s inboxes.”

“I've seen amazing improvements in our ability to react, relying on well-trusted mechanisms from Material. With just one click, we can disable phishing emails and remove them from people’s inboxes.”

“The thing I care the most about is how long it takes to protect people from malicious emails. Once I get that done, an investigation can take more time because the urgency is gone. So (with Material) I can now focus on the more interesting threats like targeted malware delivery instead of spending time on common impersonations.”

“The thing I care the most about is how long it takes to protect people from malicious emails. Once I get that done, an investigation can take more time because the urgency is gone. So (with Material) I can now focus on the more interesting threats like targeted malware delivery instead of spending time on common impersonations.”

“If someone gets access to the inbox, they have keys to the kingdom and can reset passwords for all sorts of other apps. With Material, they can’t get into our file store and other applications, because there is this additional layer of protection. This is such a game-changer to prevent a hacker from getting into other accounts.”

“If someone gets access to the inbox, they have keys to the kingdom and can reset passwords for all sorts of other apps. With Material, they can’t get into our file store and other applications, because there is this additional layer of protection. This is such a game-changer to prevent a hacker from getting into other accounts.”

“Normally, getting analytics on email sucks. We were making decisions about email security, but we didn’t have all the data. Material gave us visibility so we can get to the root and solve the problem instead of brute-forcing it. We didn’t know we needed Risk Analytics until we saw it, but now it has become an invaluable part of what we do.”

“Normally, getting analytics on email sucks. We were making decisions about email security, but we didn’t have all the data. Material gave us visibility so we can get to the root and solve the problem instead of brute-forcing it. We didn’t know we needed Risk Analytics until we saw it, but now it has become an invaluable part of what we do.”

“Material is now the solution that I talk about most with enterprise security folks. I tell them: you should know that Material is the Coca Cola of email security. We love this product and benefit from every feature of it.”

“Material is now the solution that I talk about most with enterprise security folks. I tell them: you should know that Material is the Coca Cola of email security. We love this product and benefit from every feature of it.”

“Having our own instance and isolating the data was huge for us. We could control behavior and access to our account. We know exactly what’s going on and have a higher level of confidence because we control our own data.”

“Having our own instance and isolating the data was huge for us. We could control behavior and access to our account. We know exactly what’s going on and have a higher level of confidence because we control our own data.”

“Material’s solution is brilliant and simple. It enables you to protect the long tail of email while still keeping it available to employees. It helps protect us from day zero to whenever.”

“Material’s solution is brilliant and simple. It enables you to protect the long tail of email while still keeping it available to employees. It helps protect us from day zero to whenever.”

“The plan was to find something more holistic for email security. We always consider how to best maintain security and privacy while improving usability across our entire tech stack. Material balances both.”

“The plan was to find something more holistic for email security. We always consider how to best maintain security and privacy while improving usability across our entire tech stack. Material balances both.”

“The greatest success right now is seeing increased involvement from people across the company. We’ve seen people say that this type of phishing defense is pretty cool. It’s nice to be able to get their thoughts and thank them for proactive behavior.”

“The greatest success right now is seeing increased involvement from people across the company. We’ve seen people say that this type of phishing defense is pretty cool. It’s nice to be able to get their thoughts and thank them for proactive behavior.”

“When it comes to filtering phishing attempts, Google is a good start. But as a fintech company that handles sensitive data, we wanted a more robust tool. With Material, Carta has increased its phishing awareness posture.”

“When it comes to filtering phishing attempts, Google is a good start. But as a fintech company that handles sensitive data, we wanted a more robust tool. With Material, Carta has increased its phishing awareness posture.”

“Material Security was a force multiplier for us. It allowed our security team to enhance our identity layer program and gain visibility —all while being able to enforce a second factor on top of everything.”

“Material Security was a force multiplier for us. It allowed our security team to enhance our identity layer program and gain visibility —all while being able to enforce a second factor on top of everything.”

“Amplitude employees love the idea of being a superhero. People want to help their teammates and make a difference in protecting the company from a disastrous event. Material empowers our users to be our best defenders.”

“Amplitude employees love the idea of being a superhero. People want to help their teammates and make a difference in protecting the company from a disastrous event. Material empowers our users to be our best defenders.”

“I can sleep better knowing that my teammates are being protected while Material is automatically doing the backend work to say whether something looks suspicious, legitimate, or is a full stop.”

“I can sleep better knowing that my teammates are being protected while Material is automatically doing the backend work to say whether something looks suspicious, legitimate, or is a full stop.”

“Slowing down the attacker gives me more time to respond. Those speed bumps are the things that allow us to breathe at night.”

“Slowing down the attacker gives me more time to respond. Those speed bumps are the things that allow us to breathe at night.”

“There's been advancements in security technologies such as Material Security that use machine learning and AI to enable organizations to better detect and prevent those email-based threats in real time.”

“There's been advancements in security technologies such as Material Security that use machine learning and AI to enable organizations to better detect and prevent those email-based threats in real time.”

“We started to replace incumbent partners with those that give a broader lens into what's actually going on within the organization. Moving to Material has been a huge win for us. We gained visibility and curbed some of the risks within our environment.”

“We started to replace incumbent partners with those that give a broader lens into what's actually going on within the organization. Moving to Material has been a huge win for us. We gained visibility and curbed some of the risks within our environment.”

“Something that really stuck out to us was posture management as an element of the tool – there's a lot of really good context that would be hard to find in Google otherwise.“

“Something that really stuck out to us was posture management as an element of the tool – there's a lot of really good context that would be hard to find in Google otherwise.“

“Material in contrast is, at least for me, very much plug and play. It works well for a very lean team to make sure you're still covering your bases and making sure your email suite is secure.”

“Material in contrast is, at least for me, very much plug and play. It works well for a very lean team to make sure you're still covering your bases and making sure your email suite is secure.”

“One of the big things that makes Material unique in this space is their team, which is professional to an extraordinary degree.”

“One of the big things that makes Material unique in this space is their team, which is professional to an extraordinary degree.”

“Visibility is my number one driver for implementing Material. You can’t protect what you don’t know. Now, we have visibility, we can audit at any time, and we have the metrics. No more guessing that something is risky when we can quickly measure it.”

“Visibility is my number one driver for implementing Material. You can’t protect what you don’t know. Now, we have visibility, we can audit at any time, and we have the metrics. No more guessing that something is risky when we can quickly measure it.”

“Material was simple to operate and trust even at our scale. There was no complex implementation and no disruption to go into production, and we had full access to our own cloud instance throughout. Within a couple of hours of deployment, we could analyze all the email data for all our domains across North America. It was remarkable.”

“Material was simple to operate and trust even at our scale. There was no complex implementation and no disruption to go into production, and we had full access to our own cloud instance throughout. Within a couple of hours of deployment, we could analyze all the email data for all our domains across North America. It was remarkable.”

“If we review the last 5 years of incidents across multiple industries, both sophisticated and wide-spread attacks started with a successful intrusion through phishing. Material gives us an extra layer of protection when it matters most—and accelerates our detection and response time by delivering a strong workflow.”

“If we review the last 5 years of incidents across multiple industries, both sophisticated and wide-spread attacks started with a successful intrusion through phishing. Material gives us an extra layer of protection when it matters most—and accelerates our detection and response time by delivering a strong workflow.”

“It used to take me 20-30 mins to investigate a single phishing email. Today I received 5 or 6 phishing emails and spent only 2-5 minutes in Material.”

“It used to take me 20-30 mins to investigate a single phishing email. Today I received 5 or 6 phishing emails and spent only 2-5 minutes in Material.”

“At Gusto, every employee is serious about protecting our customers and ecosystem. We are using Material to take full advantage of the underlying APIs in our cloud email to protect against phishing, reduce ATO attacks, prevent sensitive data leakage, and more.”

“At Gusto, every employee is serious about protecting our customers and ecosystem. We are using Material to take full advantage of the underlying APIs in our cloud email to protect against phishing, reduce ATO attacks, prevent sensitive data leakage, and more.”

How top security teams use Material

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Nico Waisman - Former CISO, Lyft
Nico Waisman - Former CISO, Lyft

“If we review the last 5 years of incidents across multiple industries, both sophisticated and wide-spread attacks started with a successful intrusion through phishing. Material gives us an extra layer of protection when it matters most—and accelerates our detection and response time by delivering a strong workflow.”

View Case Study

Ridesharing Giant Lyft’s Journey to a More Efficient Phishing Response

View Case Study
Lyft
IT & Software
Automate user report response
Dan Ayala
Dan Ayala - Chief Security & Trust Officer

“I think it’s important to look at the cloud office at a wider holistic level and not just at the point of entry. Understanding its whole life cycle and even what’s being done with it when resting is critical to protecting that platform. Material does that very well.”

View Case Study

Dotmatics scales security across portfolio

View Case Study
Dotmatics
IT & Software
Automate user report response
Detect and secure sensitive data
Fix misconfigurations and risky behaviors
Stop sophisticated email attacks
Devdatta Akhawe
Devdatta Akhawe - Head of Security, Figma

“I've seen amazing improvements in our ability to react, relying on well-trusted mechanisms from Material. With just one click, we can disable phishing emails and remove them from people’s inboxes.”

View Case Study

Figma Effectively Designed a Global Security Team with Material

View Case Study
Figma
IT & Software
Automate user report response
Fix misconfigurations and risky behaviors
Stop sophisticated email attacks
Jake Bilyak, IT DevSecOps Engineer
Jake Bilyak - IT DevSecOps Engineer

“The plan was to find something more holistic for email security. We always consider how to best maintain security and privacy while improving usability across our entire tech stack. Material balances both.”

View Case Study

HackerOne’s holistic approach to securing email

View Case Study
HackerOne
IT & Software
Automate user report response
Contain account takeovers
Detect and secure sensitive data
Jason Morrow headshot
Jason Morrow - Vice President of Cybersecurity

“The Material team is highly engaged. They're in our real time communication channels with us. They go above and beyond in terms of delivery. And we see that time and time again. I mean, I can't say enough good things about them.”

View Case Study

Asurion Strengthens, Scales, and Speeds Email Security with Material

View Case Study
Asurion
IT & Software
Automate user report response
Stop sophisticated email attacks
Chris Ulrich headshot
Chris Ulrich - Director of Security & Compliance

“We're seeing much better adoption because Material allows us to tailor our phishing campaigns to what we're actually seeing in the industry. And it takes a lot of that burden off the end user, which is fantastic for us.“

View Case Study

Instabase Fights Phishing and Super-charges the Human Layer of Security

View Case Study
Instabase
IT & Software
Automate user report response
Stop sophisticated email attacks
Lisa Hall
Lisa Hall - CISO

“With Material, we have a mightier team because automation takes away the toil. The security team doesn’t need to check every email and do all the data mapping across multiple tools. It’s so much easier.”

View Case Study

SafeBase extends protection across Google Workspace and makes security operations proactive

View Case Study
SafeBase
IT & Software
Automate user report response
Detect and secure sensitive data
Fix misconfigurations and risky behaviors
Stop sophisticated email attacks
Thomas Brittain, Director of InfoSec, Mariner Wealth Advisors
Thomas Brittain - Director of InfoSec, Mariner Wealth Advisors

“One of the big things that makes Material unique in this space is their team, which is professional to an extraordinary degree.”

View Case Study

A Sea Change Towards Zero Trust for Email at Mariner Wealth Advisors

View Case Study
Mariner Wealth Advisors
Finance
Automate user report response
Stop sophisticated email attacks
Vince Parras - Corporate Security & Audit, Carta

“When it comes to filtering phishing attempts, Google is a good start. But as a fintech company that handles sensitive data, we wanted a more robust tool. With Material, Carta has increased its phishing awareness posture.”

View Case Study

Automating phishing workflows at Carta

View Case Study
Carta
Finance
Automate user report response
Stop sophisticated email attacks
Contain account takeovers
JJ Agha, Chief Information Security Officer, Compass
JJ Agha - Chief Information Security Officer, Compass

“Slowing down the attacker gives me more time to respond. Those speed bumps are the things that allow us to breathe at night.”

View Case Study

Compass accelerates phishing remediation while reducing on-call burden

View Case Study
Compass
IT & Software
Automate user report response
Detect and secure sensitive data
David Cook, CISO, Databricks
David Cook - CISO, Databricks

“Having our own instance and isolating the data was huge for us. We could control behavior and access to our account. We know exactly what’s going on and have a higher level of confidence because we control our own data.”

View Case Study

Securing sensitive data in mailboxes at Databricks

View Case Study
Databricks
IT & Software
Stop sophisticated email attacks
Contain account takeovers
Detect and secure sensitive data
Allen Cox, Sr Director, IT & Security, MyFitnessPal
Allen Cox - Sr Director, IT & Security, MyFitnessPal

“Something that really stuck out to us was posture management as an element of the tool – there's a lot of really good context that would be hard to find in Google otherwise.“

View Case Study

Achieving Alert Budget Fit at MyFitnessPal

View Case Study
MyFitnessPal
Healthcare
Stop sophisticated email attacks
Detect and secure sensitive data
Contain account takeovers
No results found.
Please try different keywords.
Get a live demo

Ready to secure what your business is made of?

Get a demo
A computer screen with a picture of a woman's face.
Fredrick "Flee" Lee, CSO, Gusto
Fredrick "Flee" Lee
CSO, Gusto

“At Gusto, every employee is serious about protecting our customers and ecosystem. We are using Material to take full advantage of the underlying APIs in our cloud email to protect against phishing, reduce ATO attacks, prevent sensitive data leakage, and more.”

Alex Bynum, Information Security Manager, Color
Alex Bynum
Information Security Manager, Color

“It used to take me 20-30 mins to investigate a single phishing email. Today I received 5 or 6 phishing emails and spent only 2-5 minutes in Material.”

Nico Waisman - Former CISO, Lyft
Nico Waisman
Former CISO, Lyft

“If we review the last 5 years of incidents across multiple industries, both sophisticated and wide-spread attacks started with a successful intrusion through phishing. Material gives us an extra layer of protection when it matters most—and accelerates our detection and response time by delivering a strong workflow.”

Matt Pecorelli, Director Cybersecurity Operations, Mars
Matt Pecorelli
Director Cybersecurity Operations, Mars

“Material was simple to operate and trust even at our scale. There was no complex implementation and no disruption to go into production, and we had full access to our own cloud instance throughout. Within a couple of hours of deployment, we could analyze all the email data for all our domains across North America. It was remarkable.”

Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.