Go back

Connecting the Dots: Better Context for Faster Triage

Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.

Product
January 30, 2026
7m read
7m read
7m listen
7m watch
7m watch
Connecting the Dots: Better Context for Faster TriageConnecting the Dots: Better Context for Faster Triage
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

Material's January updates simplify security investigations by making search simpler and connecting disparate risks across the cloud workspace for faster triage.

Far too often, security teams are forced to choose between power and speed. The more powerful a tool is, the more specialized knowledge it requires to actually operate. You end up with a team of highly-paid staff who are experts at managing a tool: spending their days wrestling with proprietary syntax or clicking through fourteen tabs to see if a specific user has been targeted by more than one campaign.

At Material, we think that’s a failure of design.

We know that email security is a cloud workspace problem. A malicious message is often just the catalyst for broader risks involving account takeovers, third-party app permissions, and sensitive data exposure. If your security platform makes it difficult to see those connections quickly, it isn't really solving the problem; it's just giving you a different place to be busy.

Our January updates are focused on removing that friction. We’ve overhauled how you search, how you pivot between related incidents, and how we communicate risk severity so you can get out of the console and back to actual security work.

Search without syntax - or losing your place

If you’ve spent any time in the modern security ecosystem, you’ve likely been asked to learn a proprietary query language. Every new tool seems to come with its own unique syntax, forcing analysts to become part-time linguists just to find a specific message or event.

We think that’s an unnecessary tax on your time.

We’ve overhauled the search experience in Material so you can now search using natural language. Search functions more like a standard wizard and less like a coding exercise. Our Material Query Language (MQL) is still doing the heavy lifting under the hood, but you don’t have to write a single line of it if you don't want to.

  • How it works: Instead of parsing out a long string of variables in a single search bar, you’re prompted to fill in specific fields.
  • The benefit: It drastically reduces the learning curve for new team members and speeds up the investigation process for veterans. You shouldn't need a cheat sheet taped to your monitor just to run a search.

We’re keeping the power and precision of MQL available for those who want it, but we’ve removed the barrier to entry. We’ll handle the translation; you just find what you need.

And not only is our search easier to use, it’s easier to find. CMD/CTRL-K from anywhere within Material brings up the search interface, so you can look up that message or user without losing your place in the investigation.

Seeing the full blast radius: Recipient filtering across all issues

When an account is potentially compromised, your first question isn't just "What emails did they send?" It’s "What else is happening with this person?"

We’ve expanded our recipient filter to work across all issues in the platform, not just email-specific ones. This might sound like a small UI tweak, but for an analyst in the heat of an investigation, it’s a massive context builder.

By selecting a specific recipient, you can now see every issue associated with them across your entire cloud workspace. This allows you to group together disparate indicators of compromise—like a suspicious login followed by a sensitive file share—into a single, coherent timeline.

It’s about moving away from isolated incidents and toward understanding the total blast radius of an event. When you can see the whole story in one view, you make better decisions, faster.

Connecting the dots with related issues

A security event rarely happens in a vacuum. A malicious app often targets specific accounts, which then send specific messages. Until now, managing these moving parts could feel a bit fragmented.

Our latest update enhances issue management by allowing multiple entities (messages, accounts, and apps) to be associated with a single issue. We’ve introduced two key features to make this visibility more actionable:

  1. "Related To" filters: In your issue list view, you can now filter by a specific entity to surface every related issue. A new column explicitly displays how that entity is connected to the issue, removing the guesswork.
  2. Related issues table: We’ve updated the tables throughout the app to more clearly highlight when an entity you’re looking at is involved in other open issues.

This is part of our broader commitment to visibility across the cloud workspace. By tying these risk surfaces together in a single view, we’re helping you see the connective tissue between an app permission and a potential data leak.

Transparency through severity adjustments

"Severity" shouldn't be a black box. If a platform tells you an incident is "High" or "Critical," you deserve to know exactly why that determination was made, based on logic you actually recognize.

We’ve adjusted how Material defines the severity of detected issues to bring our platform more in line with industry-standard security best practices. We aren't interested in making up our own definitions of risk just to sound unique.

  • Better alignment: Severity levels now reflect commonly understood standards used by most SOCs and compliance frameworks.
  • Clearer documentation: We’ve updated our internal guides to explain the specific triggers for each severity level.

These changes make Material more transparent and easier to integrate into your existing workflows. When our platform flags something, you can trust that the "why" is grounded in the same logic your team uses every day.

Moving forward

These updates are all focused on the same core principle: security tools should work for the person using them, not the other way around. Whether it’s removing the friction of a query language or providing a clearer view of an account's blast radius, we want to make your time in the cloud workspace as efficient as possible.

To learn more or see how Material's latest updates can simplify your day-to-day, contact us for a demo today.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New