Go back

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

Product
November 26, 2024
4m read
4m read
4m listen
4m watch
4m watch
New in Material: Detections, Remediations, Reports & More HeaderNew in Material: Detections, Remediations, Reports & More Thumbnail
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm. 

More Control Over Google Drive

Drive file labeling - Label your files like a pro

You can now configure remediations to add, edit, or remove labels on files in Google Drive. It's like giving your files their very own wardrobe — organized and ready for action.

Permission updates — Less is more (granularity edition)

Control freaks, rejoice! Now you can set file permissions at a granular level. Instead of just slamming the door on access, you can now set users to "viewer" — like letting them peek through the keyhole, but not quite invite them in. 

Improved Impersonation Detections

Netflix impersonation — Now with more suspicious links

We’ve beefed up our Netflix impersonation detection to catch even sneaky emails that don’t spoof display names but do trick you into clicking password reset links. Spoiler alert: They’re phishing. Don't stream that scam!

AWS impersonation — Precision like a scalpel

Our AWS impersonation detection just got an upgrade, with improved accuracy by promoting and excluding domains. It’s like having a bouncer at your security club, making sure only the legit crowd gets in.

DHL impersonation — No more false positives

We’ve fine-tuned the DHL impersonation detection, so no more mistakenly marking harmless emails as threats. Because when it comes to logistics, we know you’d rather avoid mix-ups — and so would we.

Mailgun impersonation — Time to clear the inbox

Mailgun impersonation detection now excludes reply emails and Mailgun subdomains found in the Message ID. Translation: fewer false alarms, more actual threats detected. Sounds like a win-win.

VIP impersonation — Keeping it fancy

We’ve updated VIP impersonation detection to spot alternate display names and flag messages with "[External]" in the subject. Because your CEO deserves a VIP treatment… without the phishing drama.

Signal & Reporting Updates

Message signals UI — For the data junkies

We've revamped the Message Signals UI to include category descriptions on the cards and subcategory details in the tooltip. Now you’ll know exactly what’s going on behind the scenes without breaking a sweat. More info, less confusion.

Detection report — We’ve got it all now

The Detection Report now includes every available category and subcategory in Material. It's like getting the full menu, not just the appetizers. Who doesn’t like options?

Export your search results — Because spreadsheets are your friend

You can now export file search results to a .csv. Yes, we know. You’ve been waiting for this. Go ahead and import those search results like the spreadsheet wizard you are.

More to come

And, of course, all of this comes along with the usual polish we’re continuing to put in to make our platform shine. This update also brings some fresh HTML updates to match our latest design standards and improve accessibility, along with some minor UI bug fixes and improvements.

Much, much more to come, so as we creep deeper into winter doldrums, keep checking back with Material for the latest and greatest in email and productivity suite security.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New