speakers
speakers
speakers
authors
Chris Long
Chris Long
No items found.
participants
Chris Long
Chris Long
Chris Long
share

“Sky’s the limit with how you can transform your email”

David Spark speaks with Material’s Director of Security, Chris Long, on why a single-tenant model offers companies the most effective way to protect sensitive data that stored in your cloud office suite, like Google Workspace or Microsoft 365. They also cover the two biggest “wow factors” for customers:

  • Big Query data warehouses to support email security solutions and solve other business problems.
  • GCP cloud functions to execute arbitrary code against any incoming or outgoing email in your environment.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New