Deployment and Security
Security that is easy to deploy, run, and trust
Material integrates in minutes via Microsoft 365 and Google Workspace APIs with zero downtime. Customers get a single-tenant, isolated instance and complete control over the underlying infrastructure.
Fast, flexible deployment
We designed Material for the most painless and straightforward rollouts. Material deploys instantly, and you can implement features selectively for specific users or teams.
Your data, owned by you
Material deploys into an isolated, single-tenant instance in the cloud. Have it managed by Material or exclusively by your team for complete privacy and control. Pick the model that works for you and switch any time.
Operated by Material like traditional SaaS.
Operated by Material, but your team has full access to and ownership of the underlying infrastructure.
We provide updates and support, but can't access your data.
Having our own instance and isolating the data was huge for us. We could control behavior and access to our account. We know exactly what’s going on and have a higher level of confidence because we control our own data.”
Security you can verify
We built Material with the most security-conscious IT and Security teams in mind. We provide a robust set of in-product security controls, and our architecture sidesteps traditional sources of vendor risk—while keeping Material easy to set up and operate.
Built-in roles for different types of admins to prevent abuse.
Immutable audit logs of all admin activity and application events.
Gate access to the Material admin console with your existing identity provider via Single Sign-On (SSO).
Material gives you full access to its underlying infrastructure. In addition to the built-in controls we provide, you can audit usage, manage data and access, and deploy additional security tooling.
SOC 2 Type II
Material has received a SOC 2 Type II Report through an independent third-party auditor on the design and operation of our security controls.
Penetration Testing and Bug Bounty
Material undergoes regular external pentests by highly regarded providers. We also run a private bug bounty program through HackerOne.
Protecting accounts at organizations of all shapes and sizes
Explore our products
Detect and remediate inbound threats, automate response to user reports, and train users with real attacks