Go back

Beyond the Noise: Material Security's Pragmatic Approach to AI

Material’s use of AI is focused on security, pragmatism, responsibility, and transparency. This is the first in a series of blogs outlining how Material’s ML models work, and why we use them.

Product
July 8, 2025
7m read
7m read
7m listen
7m watch
7m watch
Beyond the Hype: Material Security's Pragmatic Approach to AI HeaderBeyond the Hype: Material Security's Pragmatic Approach to AI Thumbnail
speakers
speakers
speakers
authors
Gian Gonzaga
Nate Abbott
participants
No items found.
share

Material’s use of AI is focused on security, pragmatism, responsibility, and transparency. This is the first in a series of blogs outlining how Material’s ML models work, and why we use them.

The state of enterprise and consumer AI

Whether detecting patterns in otherwise-unremarkable enterprise data, summarizing meeting notes, or identifying those weird plants growing in your backyard, AI in all its various manifestations has permeated our professional and personal lives with incredible speed. Blink too long or too often and you can miss staggering developments in technology and capability.

The promise and potential of AI are well-understood at this point. But whether or not it’s currently useful and secure right now in all of its various forms is a very different question. Depending on the application and the specific model being used, AI can be anything from mind-blowingly helpful to laughably inept. 

That is to say: contemporary AI – taken as a clumsy aggregate approximation of the entire market – exists in something of a quantum state across the entire hype cycle. It is simultaneously riding the peak of inflated expectations, sitting comfortably atop the plateau of productivity, and wallowing in the trough of disillusionment.

Anyone who’s attended any cybersecurity or tech professional conferences or sat through more than a few vendor pitches over the last 12 months can be forgiven for being stuck in the trough. Playing an “agentic AI” drinking game at RSA would have been deadly several times over. 

But growing pains and naked opportunism aside, there remain abundant opportunities for safe and effective use of ML models right now. And the potential for future growth in the short- and long-term completely justifies lingering inflated expectations. In fact, given the uncertainty of the ceiling for AI and ML development, it can be hard to tell exactly which expectations are inflated and which are completely justified.

Material Security’s approach to AI

Material Security has been using artificial intelligence and machine learning models under the hood of our cloud office security platform for some time. It plays a critical role in our phishing detection and other elements of our platform. While not a panacea unto itself, when combined with expert human threat research, organizational context, and other layers of defense, it is an incredibly powerful tool. 

But as a security company, our primary goal is to deliver solutions to our customers that increase their security posture and harden their environments pragmatically–without introducing any new flaws or vulnerabilities. To that end, we’ve always been very deliberate about how and where we deploy ML models.

Material's approach to AI focuses on building and using effective, trustworthy machine learning models in a way that is secure, transparent, in compliance with all applicable regulatory requirements and best practices. 

Our use of AI and ML center around several key tenets:

  • Security - Our customers rely on us to protect their critical digital assets and most sensitive data. This demands that any system we build or deploy within our production environment is built with security top of mind. 
  • Competence - ML models can introduce significant complexity to software–to justify this potential, those models must deliver results above and beyond what can be accomplished with traditional programming methods. We only deploy our proprietary models and use third party models if they display high competence: in other words they perform above and beyond other methods we could use to achieve the same goals.
  • Reliability - It’s not enough to build something that’s occasionally great at what it does–for systems that support the security and availability of critical data for our customers, they need to be continually great. Incorporating AI into our platform in a way that is safe and reliable is critical. 
  • Alignment - We build our models and use machine learning in alignment with our goals as a company and the needs of our customers–to enable a pragmatic platform that delivers effective security while saving security teams time and reducing user friction. We aren’t wasting resources deploying AI for tangential use cases or simply tacking an aftermarket LLM on to our product just so we can toot the AI horn.
  • Transparency - Our customers trust us with their most sensitive data, they deserve to know how it’s being handled and processed. They deserve to know what’s going on behind the scenes, and have choice and control over their own decisions based on that knowledge.

As a security company, we have a responsibility to our customers to ensure everything we put into production is safe, secure, and reliable first and foremost.

To that end, Material's AI applications currently focus on improving detection capabilities across the cloud office environment, improving the accuracy and speed of phishing detection, streamlining user report triage, employing natural language classifiers to understand complex content, and more.

Material classifies its use of AI as "Limited Risk or Minimal Risk" under the EU AI Act, emphasizing transparency in AI deployment. We have established internal compliance measures, including AI governance and risk management procedures, AI ethics protocols, and clear roles and responsibilities for various teams involved in AI development and customer interaction. Material obtains customer consent before deploying ML/AI, maintains thorough model development processes for explainability, and adheres to data protection regulations like GDPR.

Conclusion

AI is an incredibly exciting tool, and its effective use unlocks powerful use cases, capabilities, and time-saving efficiencies. But for the time being, it remains just one among many tools at our disposal for securing our customers’ email, data, and accounts. 

In the interest of fulfilling one of our central tenets and providing transparency into our use of ML models, this is the first of a series of blog posts outlining some of the ways we use AI in our platform, why we use the models we use, how we ensure their competency and reliability, and more. 

And if you’d like to see what it looks like in practice, contact us for a demo today.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

Nate Abbott
4
m read
Read post
Podcast

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen to episode
Video

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m watch
Watch video
Downloads

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Watch video
Webinar

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen episode
blog post

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

Material Security Team
12
m read
Read post
Podcast

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Listen to episode
Video

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m watch
Watch video
Downloads

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Watch video
Webinar

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Listen episode
blog post

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

Nate Abbott
5
m read
Read post
Podcast

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen to episode
Video

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m watch
Watch video
Downloads

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Watch video
Webinar

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen episode
blog post

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

Josh Donelson
3
m read
Read post
Podcast

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen to episode
Video

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m watch
Watch video
Downloads

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Watch video
Webinar

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.