Product design thumbnail

Designing a Clearer, Faster, More Connected Material

Laying the groundwork for a more powerful, customizable, and trustworthy Material

Laura Gallisa
7m listen
7m read
7m watch
7m watch

All Posts

This is some text inside of a div block.
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
three circles in a blue background
Blog Post

Global Observability in a Single-Tenant Architecture

At Material Security, our unique optional deployment model allows us to uphold rigorous standards for security and reliability by dedicating a separate Google Cloud Platform (GCP) instance for each of our customers. This total isolation of customer data and infrastructure establishes trust with our customers while also granting us the flexibility to customize features and deployment configurations on a per-tenant basis.

Bridget Went
7
m watch
m watch
m listen
m read
m read
Engineering
two headshots of two people in a grape background
Podcast

Risky Biz Podcast Interview with Patrick Gray

Abhishek speaks with Patrick Gray from Risky Biz as a feature for this week's podcast. They also discuss how non-phishing resistant MFA is basically dead, how email content is very useful to security programs, and about how the gen AI won’t really change much on the defensive control side.

Abhishek Agrawal
No items found.
1
m watch
m watch
m listen
m read
m read
Industry Insights
green background and text saying The Case for Email Security Posture Management (ESPM)
Blog Post

The Case for Email Security Posture Management (ESPM)

Following an action packed week at the recent Gartner Security & Risk Management Summit, I’m all full of acronym soup – but amidst the growing number of XSPM categories, and a timely seed planted in a conversation, it got me thinking – can we make a valid case for Email Security Posture Management (ESPM)? I’m not a Gartner analyst, nor do I play one on TV, so consider this a thought experiment.

Ivan Dwyer
5
m watch
m watch
m listen
m read
m read
Industry Insights
two headshots of two people in a yellow background
Podcast

Smashing Security Podcast Interview with Carole Theriault

Abhishek speaks with Carole Theriault from Smashing Security as a feature for this week's podcast. They discuss the inception of Material Security, why we should treat email as critical infrastructure, and how the content in your email is a target to move laterally across other accounts.

Abhishek Agrawal
No items found.
1
m watch
m watch
m listen
m read
m read
Industry Insights
circles inside a blue-green background
Blog Post

How to Control External Access to Offboarded Users’ Shared Files

Employee offboarding is a task that HR, IT, and Security teams handle today more often than ever before. As worker mobility continues to increase–both in the form of voluntary job changes and what NIST gently terms “unfriendly” terminations–the ability to seamlessly and securely offboard employees is critical, and failing to do so has serious security implications.

Nate Abbott
5
m watch
m watch
m listen
m read
m read
Product
exclamation symbols in a red background
Blog Post

Why Unsanctioned Apps Complicate ATO Attacks–And How to Protect Against Them

Account takeover (ATO) attacks are notoriously difficult to detect. The presence of unsanctioned apps and services within an environment exacerbates the problem. Material’s unique approach to email and data security prevents and streamlines the response to these threats.

Nate Abbott
3
m watch
m watch
m listen
m read
m read
Industry Insights
two headshots of two people in a blue background
Podcast

Unsupervised Learning Podcast Interview with Daniel Miessler

Abhishek sat down with Daniel Miessler from Unsupervised Learning to talk through:

Abhishek Agrawal
No items found.
1
m watch
m watch
m listen
m read
m read
Industry Insights
Blog Post

Material is Secure by Design in Practice

Chris Long
8
m watch
m watch
m listen
m read
m read
Engineering
one headshot of one person in a red background
Video

John Hammond Video: What Secrets Are in Your Email?

John Hammond, the host of a YouTube channel focused on cybersecurity education and ethical hacking, dug into Material Security’s product suite. We’re encouraged to know that security practitioners realize the importance of protecting sensitive data, other SaaS applications, all in either Google Workspace and Microsoft 365.

Material Team
3
m watch
m watch
m listen
m read
m read
Product
No results found.
Please try different keywords.

Whitepapers & Research

Dive into our extensive library of whitepapers to gain in-depth insights and comprehensive analysis on the latest trends and technologies. Explore expert research and stay informed with valuable knowledge to drive your projects forward.

download

Material: Security and Architecture Overview

m read
Get your copy

Video Library

Explore our diverse collection of videos, featuring expert insights, tutorials, and industry updates. Dive into detailed analyses and practical demonstrations that bring the latest tech trends to life. Stay informed and inspired with our engaging video content.

TLDR Sec Demo Video Deep Dive with Clint Gibler
play button
video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m watch
Demo Video: Automated File Detection & Response for Google Drive thumbnail
play button
video

Demo Video: Automated File Detection & Response for Google Drive

Take a deeper look at Material's automated detection and response features for Google Drive.

Nate Abbott
2
m watch
Fed Gov Today Interview: Adopting the Zero Trust Mindset Thumbnail
play button
video

Fed Gov Today Interview: Adopting the Zero Trust Mindset

Abhishek joined the Fed Gov Today show with Francis Rose to explore how Federal agencies are utilizing a zero trust approach to build a resilience framework.

Material Team
5
m watch
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.