Deployment and Security

Security that is easy to deploy, run, and trust

Material integrates in minutes via Microsoft 365 and Google Workspace APIs with zero downtime. Customers get a single-tenant, isolated instance and complete control over the underlying infrastructure.

Learn more

Fast, flexible deployment

We designed Material for the most painless and straightforward rollouts. Material deploys instantly, and you can implement features selectively for specific users or teams.

API integration

Material connects to Microsoft 365 and Google Workspace in minutes via native APIs, with no network changes and zero downtime.

Default opt-in

Implement protections and controls at your own pace for just the users or teams that need them. Material syncs groups from Active Directory, Google, or your IdPs for targeted deployments and staged rollouts.


No agents, plug-ins, or other end-user installs are required. Enable features directly via the admin console.

Your data, owned by you

Material deploys into an isolated, single-tenant instance in the cloud.

Have it managed by Material or exclusively by your team for complete privacy and control. Pick the model that works for you and switch any time.

Fully Managed

Operated by Material like traditional SaaS.


Operated by Material, but your team has full access to and ownership of the underlying infrastructure.

Customer Managed

We provide updates and support, but can't access your data.

Security you can verify

We built Material with the most security-conscious IT and Security teams in mind.

We provide a robust set of in-product security controls, and our architecture sidesteps traditional sources of vendor risk—while keeping Material easy to set up and operate.


Built-in roles for different types of admins to prevent abuse.

Audit Logs

Immutable audit logs of all admin activity and application events.


Gate access to the Material admin console with your existing identity provider via Single Sign-On (SSO).

Infrastructure Control

Material gives you full access to its underlying infrastructure. In addition to the built-in controls we provide, you can audit usage, manage data and access, and deploy additional security tooling.

SOC 2 Type II

Material has received a SOC 2 Type II Report through an independent third-party auditor on the design and operation of our security controls.

Penetration Testing and Bug Bounty

Material undergoes regular external pentests by highly regarded providers. We also run a private bug bounty program through HackerOne.

Protecting accounts at organizations of all shapes and sizes