Security that is easy to deploy, run, and trust
Material integrates in minutes via Microsoft 365 and Google Workspace APIs with zero downtime. Customers get a single-tenant, isolated instance and complete control over the underlying infrastructure.
Fast, flexible deployment
We designed Material for the most painless and straightforward rollouts. Material deploys instantly, and you can implement features selectively for specific users or teams.
API integration
Material connects to Microsoft 365 and Google Workspace in minutes via native APIs, with no network changes and zero downtime.
Default opt-in
Implement protections and controls at your own pace for just the users or teams that need them. Material syncs groups from Active Directory, Google, or your IdPs for targeted deployments and staged rollouts.
Agent-free
No agents, plug-ins, or other end-user installs are required. Enable features directly via the admin console.
Your data, owned by you
Material deploys into an isolated, single-tenant instance in the cloud. Have it managed by Material or exclusively by your team for complete privacy and control. Pick the model that works for you and switch any time.
Security you can verify
We built Material with most security-conscious IT and Security teams in mind. We provide a robust set of in-product security controls, and our architecture sidesteps traditional sources of vendor risk—while keeping Material easy to set up and operate.
RBAC
Built-in roles for different types of admins to prevent abuse.
Audit Logs
Immutable audit logs of all admin activity and application events.
SSO
Gate access to the Material admin console with your existing identity provider via Single Sign-On (SSO).
Infrastructure Control
Material gives you full access to its underlying infrastructure. In addition to the built-in controls we provide, you can audit usage, manage data and access, and deploy additional security tooling.
SOC 2 Type II
Material has received a SOC 2 Type II Report through an independent third-party auditor on the design and operation of our security controls.
Penetration Testing and Bug Bounty
Material undergoes regular external pentests by highly regarded providers. We also run a private bug bounty program through HackerOne.