Go back

Announcing Our Series B

I’m happy to be the bearer of a very small piece of good news in the midst of what’s been a rough year for everyone. Today, we’re finally announcing our Series B led by legendary solo capitalist Elad Gil with participation from existing investor Andreessen Horowitz and a host of top-tier executives and security experts. Elad is a uniquely gifted thinker and investor who’s been involved with our company since near the beginning and it was a fairly obvious choice to work more closely with him as we grow. Our Series B adds an additional $40M of funding to our $22M Series A led by Andreessen Horowitz in 2018.

Industry Insights
April 27, 2021
4m read
4m read
4m listen
4m watch
4m watch
lines in a red background
speakers
speakers
speakers
authors
participants
No items found.
share

I’m happy to be the bearer of a very small piece of good news in the midst of what’s been a rough year for everyone. Today, we’re finally announcing our Series B led by legendary solo capitalist Elad Gil with participation from existing investor Andreessen Horowitz and a host of top-tier executives and security experts. Elad is a uniquely gifted thinker and investor who’s been involved with our company since near the beginning and it was a fairly obvious choice to work more closely with him as we grow. Our Series B adds an additional $40M of funding to our $22M Series A led by Andreessen Horowitz in 2018.

We’re also unveiling our case study with Lyft and a batch of other new public reference customers including Roblox, Databricks, Collective Health, and Iterable. The past year was a busy one with taking care of each other and our families during the pandemic, adding many talented new faces to the team, and growing our business by 472%. Material now partners with everyone from large international conglomerates all the way to high-risk individuals. We’re honored to serve some of the finest Security and IT teams on the planet and we’re grateful to learn from them every day.

What is Material?

Material Security is a group of people and a software company dedicated to the idea that it takes just as much creativity to make a technology safe as it does to invent it. Or, as a customer put it recently: “you’re trying to make tech into a single-edged sword.” We know that just because a technology is old and/or ubiquitous doesn’t mean it’s safe (the example we gave in our original manifesto was the 70 year gap between the invention of the automobile and the modern seatbelt). We believe that cybersecurity is a fundamental challenge to open societies in the 21st century and that to combat this, software vendors in our industry should reform to embrace pragmatism, productivity, and interdisciplinary thinking.

Our mission began after the 2016 US elections with protecting email and the increasingly dire state of this problem has demanded our continued focus there. As a technology, email is downright antediluvian, but that didn’t stop state-sponsored hackers from unprecedented attacks that compromised the email of hundreds of thousands of organizations and governments in the recent SolarWinds and Hafnium incidents. Moreover, the pandemic’s rapid and unexpected shift to WFH broke traditional infosec assumptions for millions of workers. This required leading-edge “Zero Trust” software vendors like Material to bring new techniques to bear in diverse environments at an accelerated pace. It’s been the most rewarding work of my life, but like so many others we’re emerging from this year wiser, more thankful, and extremely hungry to rebuild and rekindle human relationships.

The Future

Fundraises are just a milestone: the future is built by people, not capital. I want to thank each of our customers for placing your trust in us and for your collaboration, creativity, and evangelism. You are what gets us out of bed and onto Zoom in the morning. Our new funding will make it easier to grow with you and support your needs as you face all of the unexpected infosec challenges of the next ten years. I also want to thank all of our early investors, advisors, and friends who believed that email security could mean more than just overgrown spam detectors—and who we’ve missed terribly this year.

After this year we all have great challenges in front of us, and we all have a role in overcoming them. At Material our work is clear to us, and we wish you the very best in yours.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m read
Read post
Podcast

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen to episode
Video

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m watch
Watch video
Downloads

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Watch video
Webinar

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen episode
blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
blog post

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Nate Abbott
6
m read
Read post
Podcast

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen to episode
Video

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m watch
Watch video
Downloads

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Watch video
Webinar

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen episode
blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New