Go back

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

Product
November 26, 2024
4m read
4m read
4m listen
4m watch
4m watch
New in Material: Detections, Remediations, Reports & More HeaderNew in Material: Detections, Remediations, Reports & More Thumbnail
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm. 

More Control Over Google Drive

Drive file labeling - Label your files like a pro

You can now configure remediations to add, edit, or remove labels on files in Google Drive. It's like giving your files their very own wardrobe — organized and ready for action.

Permission updates — Less is more (granularity edition)

Control freaks, rejoice! Now you can set file permissions at a granular level. Instead of just slamming the door on access, you can now set users to "viewer" — like letting them peek through the keyhole, but not quite invite them in. 

Improved Impersonation Detections

Netflix impersonation — Now with more suspicious links

We’ve beefed up our Netflix impersonation detection to catch even sneaky emails that don’t spoof display names but do trick you into clicking password reset links. Spoiler alert: They’re phishing. Don't stream that scam!

AWS impersonation — Precision like a scalpel

Our AWS impersonation detection just got an upgrade, with improved accuracy by promoting and excluding domains. It’s like having a bouncer at your security club, making sure only the legit crowd gets in.

DHL impersonation — No more false positives

We’ve fine-tuned the DHL impersonation detection, so no more mistakenly marking harmless emails as threats. Because when it comes to logistics, we know you’d rather avoid mix-ups — and so would we.

Mailgun impersonation — Time to clear the inbox

Mailgun impersonation detection now excludes reply emails and Mailgun subdomains found in the Message ID. Translation: fewer false alarms, more actual threats detected. Sounds like a win-win.

VIP impersonation — Keeping it fancy

We’ve updated VIP impersonation detection to spot alternate display names and flag messages with "[External]" in the subject. Because your CEO deserves a VIP treatment… without the phishing drama.

Signal & Reporting Updates

Message signals UI — For the data junkies

We've revamped the Message Signals UI to include category descriptions on the cards and subcategory details in the tooltip. Now you’ll know exactly what’s going on behind the scenes without breaking a sweat. More info, less confusion.

Detection report — We’ve got it all now

The Detection Report now includes every available category and subcategory in Material. It's like getting the full menu, not just the appetizers. Who doesn’t like options?

Export your search results — Because spreadsheets are your friend

You can now export file search results to a .csv. Yes, we know. You’ve been waiting for this. Go ahead and import those search results like the spreadsheet wizard you are.

More to come

And, of course, all of this comes along with the usual polish we’re continuing to put in to make our platform shine. This update also brings some fresh HTML updates to match our latest design standards and improve accessibility, along with some minor UI bug fixes and improvements.

Much, much more to come, so as we creep deeper into winter doldrums, keep checking back with Material for the latest and greatest in email and productivity suite security.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen to episode
Video

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m watch
Watch video
Downloads

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Watch video
Webinar

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen episode
blog post

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

Material Team
3
m read
Read post
Podcast

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen to episode
Video

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m watch
Watch video
Downloads

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Watch video
Webinar

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen episode
blog post

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
10
m read
Read post
Podcast

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Listen to episode
Video

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m watch
Watch video
Downloads

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Watch video
Webinar

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Listen episode
blog post

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

Material Team
10
m read
Read post
Podcast

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen to episode
Video

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m watch
Watch video
Downloads

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Watch video
Webinar

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New