Go back

Material expands Data Protection to shared files with support for Google Drive

We’re introducing a new product to our Cloud Office Security Suite – Data Protection for Google Drive. Google Workspace customers can now leverage Material to illuminate blind spots and block exfiltration paths across your entire Google Drive footprint – swiftly, and with precision at scale.

Product
February 20, 2024
m read
m read
m listen
m watch
m watch
a sheets file with some descriptive text above
speakers
speakers
speakers
authors
Material Team
participants
No items found.
share

We’re introducing a new product to our Cloud Office Security Suite – Data Protection for Google Drive. Google Workspace customers can now leverage Material to illuminate blind spots and block exfiltration paths across your entire Google Drive footprint – swiftly, and with precision at scale.

By design, documents in Google Drive are meant to contain private information, encourage collaboration, and be shared with others. However, this doesn’t take long to become a messy sprawl of highly sensitive and regulated data. The right way to protect the environment isn’t always obvious as it’s difficult to answer fundamental questions around “What’s in my Drive?” and “Where is it shared?”

One of our specialties at Material is our unique method of identifying and safeguarding sensitive data. We've done this for email unlike anyone else, protecting the treasure trove of confidential information that exists across all employee mailboxes over time. We're thrilled to extend this effort to a new domain in shared file repositories by offering support for Google Drive.

‍

The key to protecting Google Drive is to find and fix toxic combinations

Mitigating the risk of shared file repositories lies in detecting the toxic combinations of confidential data, excessive permissions, and improper sharing that are prevalent in daily use. What happens if trade secrets leak, earnings statements are seen too soon, or personal health information is exposed? When looking at data, permissions, and sharing in isolation, it’s difficult to infer what’s risky versus what’s normal business behavior. Adding it up is where one can start to identify patterns that are worthy of attention, but to do so typically involves a heavy lift. Material makes this automatic.

‍

Discover sensitive data across My Drive and Shared Drive contents

Material connects to your Google Workspace environment via native APIs, and syncs your historical file repositories with our underlying data platform. We model the environment to enable in-depth visibility across file metadata, contents, permissions, and sharing settings across selected My Drives and Shared Drives. File contents are scanned against our ML-based detection rule set that covers a wide range of sensitive content across PII, PCI, PHI, and other confidential classifications.

With our powerful data platform as the foundation, you gain an intuitive search interface that guides you through your Google Drive footprint to identify toxic combinations. We designed this search interface specifically for Google Drive—nothing else comes close to this level of depth and focus.

Material expands Data Protection to shared files with support for Google Drive - content image

‍

Calculate permission sets and sharing settings

To ensure files have the right levels of access, both internally and externally, it’s important to understand how permissions are modeled and inherited. This can be a challenge with Google Drive as there’s more than one way to grant someone access – you can share files and folders by email, by domain, or with a link, and assign Viewer, Commenter, or Editor rights. The inevitable sprawl of files is only compounded with the inevitable sprawl of permissions.

To break it down in a manner that makes actionable sense, we calculate the total access outcomes for files within our data platform and present a unified view so you can better visualize who can access what under which conditions. We also distinguish external access by domain so you can quickly see where select files are being shared.

A unified access model makes it easier to search by permissions and sharing settings. For example, you can search for all files shared externally to freemail accounts, or for all files accessible by a single user. More precise search leads to more precise automation, so you can ensure your security policies are being adhered to in practice, not just written down for good measure.

Material expands Data Protection to shared files with support for Google Drive - content image 2

‍

Automatically revoke external access across files in bulk

The primary remediation mode to fix toxic combinations in Google Drive is to revoke access. Easy on the surface, but when you consider the conditions of the whole space, it becomes a multi-dimensional puzzle. When is external sharing valid and when is it not? Are there users that belong to groups that they shouldn’t? Which settings should change when a document is modified to add confidential information?

The first step to solving this puzzle is to get precise with search-based filtering. The next step is to build policies around search results that trigger automation. From a file detail or search results view, you can choose to revoke access across one or more files. As there may be cases where some external sharing is valid and others are not, you can explicitly select which domains you wish to revoke.

Material expands Data Protection to shared files with support for Google Drive - content image 3

‍

Keep your productivity suite productive with Material Security

At Material, we focus our efforts on the productivity suite because we believe that, as the cloud office, it’s critical infrastructure to any organization. And as critical infrastructure, in-depth security defenses that can effectively stop attacks and reduce risk are paramount – but depth is what’s missing from what’s built-in and what’s typically offered up by others who treat the environment like just another SaaS application.

Expanding our unique approach to data protection to shared file repositories is a natural step in our product evolution. We’ve spent years building and improving our sensitive data classification engine, working closely with customers of all shapes and sizes, so we know what it takes to become a force multiplier to your organization.

The new capabilities with Data Protection for Google Drive solve hard data discovery, governance, and access problems that you won’t get from traditional DLP tools that only inspect what’s moving around on the surface.

‍

Want to see it for yourself? Schedule a personal demo with our team today.

We're hosting a Product Showcase webinar on Feb 28th at 10 am PT / 1pm ET to dive into the product, give a demo, and share highlights around the upcoming roadmap. Reserve your seat today!

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m read
Read post
Podcast

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen to episode
Video

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m watch
Watch video
Downloads

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Watch video
Webinar

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen episode
blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
blog post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m read
Read post
Podcast

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen to episode
Video

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m watch
Watch video
Downloads

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Watch video
Webinar

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen episode
blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New