Demo Video: Automated File Detection & Response for Google Drive thumbnail

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2m listen
2m read
2m watch
2m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
waves in a green background
Blog Post

New in Material: Enhanced Detections, Improved Triage UX, and Added Insight Reports

With email-based attacks on the rise in both volume and sophistication, Material Security continues to innovate in key areas of cloud office security to better protect your critical Microsoft 365 and Google Workspace environments. We’re pleased to showcase new and enhanced capabilities in our Phishing Protection product to accelerate your threat detection & response workflows.

Ivan Dwyer
5
m watch
m watch
m listen
m read
m read
Product
one headshot of one person in a purple background
Podcast

Risky Biz Podcast: Why M365 and Google Workspace are a security liability

In this Risky Business interview, Patrick Gray talks to Material Security’s CEO and co-founder Abhishek Agrawal about the security problems inherent to modern productivity suites.

Material Team
Abhishek Agrawal
m watch
m watch
m listen
m read
m read
Industry Insights
arrows inside a circle in a blue background
Blog Post

What Constitutes Material Impact? The SEC Needs You To Know.

Join us for a live ask me anything (AMA) session on January 25th around this topic. RSVP and submit your questions here.

Ivan Dwyer
5
m watch
m watch
m listen
m read
m read
Industry Insights
circles and arrows in a red background
Blog Post

File Access Monitoring with Osquery: Weaponize your entire macOS fleet into a filesystem-based honeypot

Protecting the security and privacy of our customers' data is our top priority at Material Security. We are constantly improving our ability to detect and respond to increasingly sophisticated threats, and in this scenario we saw an opportunity to contribute an incredibly powerful capability to osquery, a widely used open-source security utility. This new capability greatly improves defenders' ability to detect initial access and reconnaissance activity on macOS endpoints, slowing down a potential attacker. With our open source contribution, this capability is now available to all osquery users.

Chris Long
7
m watch
m watch
m listen
m read
m read
Engineering
circles in a blue background
Blog Post

How to Manage Shadow IT in your Cloud Office

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Tina Jiang
8
m watch
m watch
m listen
m read
m read
Engineering
okta plus material in a solid background
Blog Post

Democratizing Security Signals

In security, we’re constantly trying to make sense of data – in real-time and with high stakes. That means turning data into strong, actionable signals that can be used across silos and platforms. And strong partnerships help make this a reality. In that spirit, we’re pleased to join several security industry leaders as a launch partner for Identity Threat Protection with Okta AI (Identity Threat Protection), further extending our technical integration with Okta by providing our unique Cloud Office security signals into Okta to empower security teams assessing the risk profile of users and sessions.

Matt Muller
4
m watch
m watch
m listen
m read
m read
Engineering
lines creating a rectangle in a green background
Blog Post

A Comprehensive Approach to Securing Email

In the last two decades, email has evolved to become much more than a messaging application. Workplace email accounts have become data repositories, de-facto identities for other SaaS applications, and collaboration tools. It’s no longer sufficient to approach email security solely from the perspective of securing data in transit.

Material Team
10
m watch
m watch
m listen
m read
m read
Product
rectangles in a yellow background
Blog Post

Reimagining Access Management: Part 1

Here's a non-controversial take: access management is hard. You want to provide people with just enough access to do their jobs, but no more and no less. By granting them too much access, you put your resources at risk. Over-provisioned access is a common misconfiguration which can give attackers the ability to do more damage. Limiting access is an important way to limit the blast radius of an account compromise, which is why least privilege is one of the core pillars of information security. On the other hand, with too little access, your users can’t get their work done.

Joe Portner
10
m watch
m watch
m listen
m read
m read
Engineering
circles in a purple background
Blog Post

How a Trust-Based Culture Supports Parents

Balancing parenthood and work is no small feat. We chatted with some parents here at Material Security to learn about the trials and triumphs of this journey. They've got stories, advice, and a dash of humor to share. We're hoping their stories can make the whole juggling act feel a little less overwhelming for our fellow parents out there.

Material Team
9
m watch
m watch
m listen
m read
m read
People
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material: Security and Architecture Overview

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
one headshot of one person in a blue background
play button
video

ESG360 Video: Abhishek Agrawal

Listen and watch our CTO Abhishek chat email security with ESG senior analyst, Dave Gruber, for an ESG360 Video. Their conversation ranged from mapping the evolving email threat landscape facing enterprises and individuals, to shining light on the countless ways a hacker can inflict pain after successfully infiltrating an inbox, to exploring how Material takes a novel approach to delivering inside-out security through APIs.

Material Team
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.