Identity Protection

Secure legacy identity workflows

Cloud email accounts are the unofficial identity layer of the web and the key to many other apps. Material Identity Protection discovers and protects legacy authentication workflows, limits the impact of compromised identities, and contains new tools to govern Shadow IT.

”If someone gets access to the inbox, they usually have keys to the kingdom. This is such a game-changer.”
Ryan Donnon
Director of IT, First Round Capital
Uncover SSO gaps
Stop lateral account takeovers
Block unwanted apps
Brad Chivukula, VP of Engineering
Brad Chivukula
VP of Engineering, Collective Health
“Identity Protection was a force multiplier for us. It allowed our security team to enhance our identity layer program and gain visibility —all while being able to enforce a second factor on top of everything.”
View Case Study
Lisa Hall, Director - Former Head of Information Security, PagerDuty
Lisa Hall
Former Head of Information Security, PagerDuty
"Visibility is my number one driver for implementing Material. You can’t protect what you don’t know. Now, we have visibility, we can audit at any time, and we have the metrics. No more guessing that something is risky when we can quickly measure it."
View Case Study

A compromised account shouldn't compromise all accounts

Someone with access to an email account can break into other apps tied to that email by initiating password resets—a common form of Account Takeover (ATO). Material limits lateral account takeovers by adding a simple authentication step to access password resets and other identity verification messages.

Intercept

Material blocks delivery of identity verification emails such as password resets or signup approvals and sends users a challenge message instead.

Challenge

Users confirm messages they requested by verifying their identity via an existing identity provider or custom workflow.

Unlock

After verification, Material delivers blocked messages to the user's mailbox so they can continue their workflow as usual.

Limit the impact of compromised accounts

Find and address SSO gaps

Discover unfederated and misconfigured apps that still use legacy authentication. Material provides a list of third-party apps used at your organization and the accounts using them by detecting signup confirmations, password resets, and other automated messages.

Block unwanted apps

Users can bypass SSO or OAuth restrictions by signing up for apps with their email. Material intercepts signup emails from blocked apps so users have to go through proper channels for authorization.

Explore more ways to protect your organization

Phishing Protection

Stop email attacks with intelligent threat detection & response tools.

Learn more

Data Protection for Email

Classify and protect sensitive content with right-sized access controls.

Learn more

Data Protection for Google Drive

Safeguard the sprawl of confidential data throughout your shared files.

Learn more

Data Protection for Google Drive

Safeguard the sprawl of confidential data throughout your shared files.

Learn more

Data Protection for Email

Classify and protect sensitive content with right-sized access controls.

Learn more
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.