Go back

New in Material: Unified Detections and Automated Responses

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

Product
December 12, 2024
2m read
2m read
2m listen
2m watch
2m watch
New in Material: Unified Detections and Automated Responses HeaderNew in Material: Unified Detections and Automated Responses Thumbnail
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

Bundle up and get cozy—our latest update is packed with frosty new features and cool improvements to keep your security sleigh running smoothly.

New: Features and Detections

Unified Detection and Response: Risk Reports have transformed into actionable detection rules, bringing you real-time alerts in the Material UI. Like snowflakes, no two alerts are the same. We've taken the same depth and breadth of insight into risk across your productivity suite you've come to expect from Material and made it easier to operationalize.

Issue Remediations: Configure automatic or manual steps to clean up Issues—think of it as shoveling your digital driveway.

Detection and Issue Event Subscriptions + APIs: Receive notifications when Unified D&R Issues or Detections occur. Use APIs to share the full evidence payload across your tools, building a snow fort of integration.

Tenant Analyst Role: A new role that lets users view metadata for all Issue types for assigned Tenants—your snow globe just got clearer.

New Detections: Files shared with personal email accounts. Phishing attempts like Intuit Callback and emails with sender names as long as a winter’s night.

Detection and Issue Feedback Button: Send feedback to the Material research team about detection performance or share ideas for new detections. Perfect for spreading cheer and insights!

(Beta) Automatically classify user-reported emails: Material investigates and categorizes user reports, explain results in the UI, and remediate threats—like salting icy paths.

Changed: Smoother Sledding Ahead

Role Updates: The Triage Admin role is now called Global Analyst. This role can view all Unified D&R Issues and metadata across Tenants, but searching requires Content Admin permissions.

Phishing Protection Refinements: Detection rules fine-tuned to reduce false positives for DocuSign, Wells Fargo, AWS, HelloSign, Twitter, and more. Legitimate senders and domains are no longer left out in the cold.

Fixed: Bugs Melted Away

Minor UI fixes to ensure your workflow is smooth and efficient, like freshly fallen snow.

Happy winter from the Material team! Stay secure and enjoy the season. 

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m read
Read post
Podcast

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen to episode
Video

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m watch
Watch video
Downloads

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Watch video
Webinar

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen episode
blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
blog post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m read
Read post
Podcast

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen to episode
Video

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m watch
Watch video
Downloads

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Watch video
Webinar

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen episode
blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New