Go back

Protecting Zendesk Against Email Threats Using Material Security

Material Security and Tines extend email threat detection and response to third-party cloud applications like Zendesk with platform API workflow automation.

Engineering
July 22, 2025
6m read
6m read
6m listen
6m watch
6m watch
ThumbnailProtecting Zendesk Against Email Threats Using Material Security Thumbnail
speakers
speakers
speakers
authors
Chris Scott
participants
No items found.
share

Material Security and Tines extend email threat detection and response to third-party cloud applications like Zendesk with platform API workflow automation.

Introduction

If you’re a security practitioner, you know the real-world email attack surface isn't just your Google or Microsoft inbox: it’s the entire ecosystem of cloud applications linked to support and other accounts your company uses. 

In particular, support platforms like Zendesk are often fed by widely-publicized email addresses like support@yourcompany.com. Since these addresses are public, they’re a ripe target for attackers. 

One of the most common integration methods for these platforms is a simple email forward, and that by itself should set off a few alarm bells. Forwarding rules can create a significant visibility gap, routing potentially malicious emails around your primary mailbox security controls. This isn’t a theoretical problem; it’s a practical one that demands a practical solution.

We came up with a simple, repeatable automation for extending threat detection and response into these third-party applications combining Material's protections, a SOAR or workflow automation tool, and the platforms' own APIs.

The challenge: Forwarding breaks the security chain

Like all modern email security solutions, Material uses Google Workspace and Microsoft 365 APIs to analyze and remediate messages shortly after they are delivered to a mailbox. Zendesk, like other support platforms, typically uses email forwarding to get mail from a company’s support email address into their platform. 

This presents two main challenges: messages are typically forwarded and not retained in the support mailbox so there is nothing for Material to analyze. Even if messages are retained, Zendesk doesn't pick up any updates. Note that while Zendesk supports using an OAuth integration (instead of forwarding) for smaller volumes, this only solves for the first problem, but the second remains.

The solution: An API-driven security workflow

To solve this, we need to let Material inspect the email and then programmatically extend our remediation actions into the support platform. The "glue" for this is a perfect use case for a SOAR (e.g., Tines, Torq, Palo Alto XSOAR) or an iPaaS/automation tool (e.g., Okta Workflows, Workato). Material provides an event notification system and a robust API, and Zendesk has its own APIs: all we need is a workflow to connect them.

The pattern is straightforward and adaptable for almost any platform with an API:

  1. Retain the Message: First, configure the support mailbox (such as support@yourcompany.com) to retain a copy of all forwarded mail. This gives Material a message to analyze.
  2. Detect and Alert: Material analyzes the message upon delivery. If a threat is found, our platform emits a detailed event notification, which can be sent to a webhook.
  3. Trigger the Playbook: Your SOAR platform ingests this webhook, triggering a specific playbook for what is now a new malicious ticket in Zendesk.
  4. Execute Remediation via API: The playbook uses Zendesk's API to find the ticket created by the forwarded email and take direct action on it.

In practice: Executing remediation via the Zendesk API

We used Tines to build the workflow automation between Material and Zendesk for this exact scenario and have published the story in the Tines Library. Even if you aren’t using Tines, it’s a great reference for the necessary API calls and logic.

Let's walk through an example. Material flags an email containing a credential phishing link that was sent to support@yourcompany.com. The SOAR playbook kicks off and executes a series of API calls to Zendesk to:

  • Add a private warning comment. The first action should be to add a private comment to the top of the ticket. This immediately alerts the support agent to a potential threat and can provide context on what’s being done automatically.
  • Redact the malicious link. We use Zendesk's comment redaction API endpoint to redact any links in the ticket. The original link text remains but the link will be inactive.
  • Flag malicious attachments. If the email contained malware, a separate API call can flag the specific attachment, visually warning the agent not to open it.

The result is a ticket that is triaged and largely neutralized by automation before a human agent even sees it.

This interactive shows the full automation: 

That the workflow can also restore the ticket to its original state if an analyst determines that the message was legitimate and marks the case “Safe” in Material.

  • A message sent to Zendesk is detected as malicious in Material
  • The Zendesk ticket is protected
  • An analyst marks the message as safe in Material
  • The Zendesk ticket is restored 

Finally, note that this Detect -> Notify -> Orchestrate -> Remediate recipe is not a point solution for Zendesk. It's a flexible pattern you can adapt for other business-critical tools that ingest data via email. In Hubspot and Salesforce, for example, you would follow the same pattern above, searching for email engagements in Hubspot to protect. This is especially useful for users that email directly from the CRM platform instead of their email client.

The principle remains the same: use APIs to bridge the security gap and enforce policy wherever your data flows.

Build resilient, automated security

You don't have to accept the security gaps created by essential business applications. Material already delivers robust security automations across the cloud office, and by leveraging event-driven automation and the APIs you already have access to, you can build resilient security workflows that protect your colleagues and your data across many of the platforms you use every day. This approach is not only more effective at hardening your security posture but it reduces manual toil for your security team at the same time.

Want to see how Material can fit into your security automation stack? Request a demo.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

Nate Abbott
4
m read
Read post
Podcast

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen to episode
Video

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m watch
Watch video
Downloads

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Watch video
Webinar

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen episode
blog post

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

Material Security Team
12
m read
Read post
Podcast

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Listen to episode
Video

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m watch
Watch video
Downloads

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Watch video
Webinar

Beyond the Inbox: Unifying Cloud Workspace Security

Material offers a modern, comprehensive strategy that unifies cloud workspace protection across email, files, and user accounts. The platform leverages the rich APIs and audit logs available in Google Workspace and Microsoft 365 to create a cohesive security solution that connects the dots between what traditional point solutions often miss.

12
m listen
Listen episode
blog post

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

Nate Abbott
5
m read
Read post
Podcast

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen to episode
Video

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m watch
Watch video
Downloads

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Watch video
Webinar

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen episode
blog post

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

Josh Donelson
3
m read
Read post
Podcast

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen to episode
Video

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m watch
Watch video
Downloads

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Watch video
Webinar

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.