Go back

Triage at Speed: Easier Investigation and Hands-Off Remediation

Material is delivering faster security triage and hands-off remediation by offering clearer visual context in the Analysis Card and Timeline view, and introducing a new option to automatically close resolved issues.

Product
March 31, 2026
5m read
5m read
5m listen
5m watch
5m watch
Triage at Speed: Easier Investigation and Hands-Off RemediationTriage at Speed: Easier Investigation and Hands-Off Remediation
speakers
speakers
speakers
authors
James Juran
participants
No items found.
share

Material is delivering faster security triage and hands-off remediation by offering clearer visual context in the Analysis Card and Timeline view, and introducing a new option to automatically close resolved issues.

Security operations usually suffer from one of two problems: not enough information or way too much of it. Most legacy tools, and even the native dashboards in your cloud workspace, tend to lean toward the latter, burying the why under a mountain of what.

At Material, we spend a lot of time thinking about the analyst's workflow. If you have to click five times to understand why a message was flagged, we’ve failed you. Our latest updates are focused on removing that friction, giving you better visual context, and finally letting you automate the "paperwork" of closing resolved issues.

Defining trust without the headache

Managing "trusted entities" shouldn’t feel like configuring a firewall in 1998. Whether you’re dealing with a persistent phishing campaign or just trying to ensure a specific file-sharing service doesn’t trigger a false positive, the interface should be intuitive.

We’ve overhauled the Trusted Entities UI to make it easier to understand and even easier to configure. We’ve streamlined how you define these entities across both phishing and file-related issues, ensuring that your team spends less time tweaking settings and more time actually investigating real threats.

A clearer view of the "why"

The Analysis Card is the heart of an investigation in Material. It’s where you go to see why we flagged something and decide what to do about it. We’ve given this entire experience a facelift to improve "scannability."

  • Explainability improvements: We’ve made it much more obvious why an issue was created. No more hunting for the specific signal that triggered the detection.
  • Above the fold IA: We’ve reorganized the information architecture so the most critical details and actions are visible immediately. You shouldn’t have to scroll to find the "remediate" button.
  • Similarity Matching rebrand: We’ve renamed this feature to be more descriptive. It does exactly what it says on the tin—finds things that look like the threat you're looking at.
  • UI fit and finish: General polish to make the workspace feel faster and more cohesive.

The goal here is simple: see the full story, understand the context, and make a decision. Fast.

Visualizing the attack timeline

Phishing attacks are rarely isolated events. They have a sequence—a beginning, a middle, and (hopefully) a quick end.

Our updated Timeline view for phishing issues provides a robust, chronological look at detections and system actions. This makes it significantly easier for analysts to understand the scope of an attack and see exactly how it unfolded across your cloud office. When you can see the sequence of events visually, the blast radius becomes much easier to define.

Closing the loop (automatically)

For a long time, Material kept resolved issues open for 30 days. We did this for the sake of visibility—we wanted to make sure you saw that the platform was doing its job.

But as our customers have grown to trust our automations, that 30-day window started to feel like a chore. It’s mental overhead that high-velocity teams don't need.

You can now add "automatically close issue" as a final remediation step. Once Material resolves the threat, the issue closes itself. This keeps your queue clean and allows your team to focus exclusively on the critical, open issues that actually require a human pair of eyes. It turns out that when you trust the math, you don't need to double-check the homework every single time.

Want to see these improvements live? Reach out for a demo to see how we’re simplifying security for the cloud workspace.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
blog post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m read
Read post
Podcast

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen to episode
Video

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m watch
Watch video
Downloads

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Watch video
Webinar

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen episode
blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
blog post

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Nate Abbott
6
m read
Read post
Podcast

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen to episode
Video

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m watch
Watch video
Downloads

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Watch video
Webinar

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New