Secure email from every angle

Material is a multi-layered detection and response toolkit for email. It stops sophisticated email-based attacks and contains the blast radius of compromised accounts.

Flee, CSO at Gusto
Flee
CSO at Gusto

“I don't get paid to talk about security products I like. I'm not on any advisory boards. I'm not an investor in any of them. I just like telling other people at *good* security companies that deliver *real* value and stand by their promises.”

Ben Hagen, 2x Presidential Election & Emmy Award Winning Security Otter
Ben Hagen
2x Presidential Election & Emmy Award Winning Security Otter

Super excited to see the growth of non-snake oil security startups. Rare to see new entrants in the space actually improve the state of security with innovative approaches. @material_sec's mission is personal to me.

Alex Rice, HackerOne, Founder & CTO
Alex Rice
HackerOne, Founder & CTO

Really excited for what Ryan Noon and the team are up to over at Material Security. Email has become the center of so much of our digital lives and the blast radius of even a single email account compromise is one of those things that has always kept me up at night. "Zero Trust" for email is long overdue.

Adam Zollman
Adam Zollman
@azollman, Network defender. Threaty, buildy things @NBCUniversal. he/him

Stoked for @material_sec. It's seriously cool tech, and always nice to see what a genuinely novel approach to a hard problem in security looks like. (Congrats!)

cje @caseyjohnellis, founder/chair/cto @bugcrowd
cje
@caseyjohnellis, founder/chair/cto @bugcrowd

got a run-through of @material_sec earlier today... very novel and clean approach to solving a number of systemic email security challenges. worth a look... https://material.security

The status quo is incomplete

Complete email security requires understanding and addressing all forms of email attacks.

New flavors of sophisticated phishing, malware, fraud, BEC, and social engineering attacks require advanced detection techniques.

Compromised accounts enable elevated access to critical systems and apps, which require monitoring and lateral movement prevention.

Employee mailboxes are a treasure trove of confidential company data, which require added access governance and controls.

Email as an attack method

New flavors of sophisticated phishing, malware, fraud, BEC, and social engineering attacks require advanced detection techniques.

Email as an attack vector

Compromised accounts enable elevated access to critical systems and apps, which require monitoring and lateral movement prevention.

Email as an attack target

Employee mailboxes are a treasure trove of confidential company data, which require added access governance and controls.

One solution for all your email security needs

Material takes a holistic approach to addressing risk across your productivity suite — blocking malicious messages from the outside in and protecting accounts and data from the inside out.

INBOUND EMAIL DETECTION

Stop sophisticated email attacks

Leverage the combined power of AI, behavioral analysis, custom detections, and collective intelligence to thwart email attacks with precision and speed.

Learn more
EMAIL ACCOUNT PROTECTION

Contain email account takeovers

Detect compromised email accounts and reduce their blast radius via added layers of MFA when attempting to access data and applications.

Learn more
PHISHING HERD IMMUNITY

Automate user report response

Empower your user base as a valued line of defense by automating your abuse mailbox with flexible remediation workflows that quickly cover the whole workforce.

Learn more
SMART EMAIL DATA RETENTION

Enforce email data governance

Satisfy email data protection and compliance policies while keeping users productive by applying fine-grained access controls to sensitive messages.

Learn more
EMAIL DATA PROTECTION

Block data exfiltration paths

Prevent unauthorized access to sensitive data by applying fine-grained access controls directly to emails in the mailbox.

Learn more
EMAIL IDENTITY PROTECTION

Combat shadow IT scenarios

Leverage email for visibility and control over application usage to apply consistent policy enforcement across the workforce.

Learn more

Our products cover all the angles

Simplify cloud security operations with advanced phishing detection & response, modern data protection, and smart account & identity security.

Phishing Protection

Stop email attacks with intelligent threat detection & response tools.

Learn more
Phishing Protection

Data Protection for Email

Classify and protect sensitive content with right-sized access controls.

Learn more
Data Protection for Email

Identity Protection

Detect and contain account takeover scenarios with real-time alerts.

Learn more
Identity Protection

Posture Management

Address risky user behavior and vulnerabilities with in depth insights.

Learn more
Posture Management

Data Protection for Google Drive

Safeguard the sprawl of confidential data throughout your shared files.

Learn more
Data Protection for Google Drive

Phishing Protection

Stop email attacks with intelligent threat detection & response tools.

See more
Phishing Protection

Data Protection for Email

Classify and protect sensitive content with right-sized access controls.

See more
Data Protection for Email

Data Protection for Google Drive

Safeguard the sprawl of confidential data throughout your shared files.

See more
Data Protection for Google Drive

Identity Protection

Detect and contain account takeover scenarios with real-time alerts.

See more
Identity Protection

Posture Management

Address risky user behavior and vulnerabilities with in depth insights.

See more
Posture Management

Uniquely

Material

Yours

Material

API-based email security is table stakes. We go the extra mile to continuously sync and enrich your raw Microsoft 365 and Google Workspace content and events into a structured, historical data model that enables a heightened level of visibility, intelligence, and extensibility that would be difficult and costly to achieve otherwise.

Maniacally precise

Material’s threat detection and data classification engine has best-in-class precision to maximize true positives across a range of attack types and risk areas.

Unmatched depth

Material’s underlying data model combines contents, logs, and settings data to supercharge investigations.

Securely isolated

Every Material customer instance is deployed into a single-tenant cloud environment for flexible control over operations.

Loved by the

security community

Aaron Clukey, Director of Information Security & IT, Alto
Aaron Clukey - Director of Information Security & IT, Alto

“Material in contrast is, at least for me, very much plug and play. It works well for a very lean team to make sure you're still covering your bases and making sure your email suite is secure.“

View Case Study
Troy Wilkinson
Troy Wilkinson
CISO at Interpublic Group (IPG)

The team at Material Security has built a really interesting product that completely bypasses how everybody has thought about email security historically. Congrats Ryan Noon & the entire Material team!
#seriesc #unicorn #cybersecurity

Troy Wilkinson
Troy Wilkinson
CISO at Interpublic Group (IPG)

The team at Material Security has built a really interesting product that completely bypasses how everybody has thought about email security historically. Congrats Ryan Noon & the entire Material team!
#seriesc #unicorn #cybersecurity

Troy Wilkinson
Troy Wilkinson
CISO at Interpublic Group (IPG)

The team at Material Security has built a really interesting product that completely bypasses how everybody has thought about email security historically. Congrats Ryan Noon & the entire Material team!
#seriesc #unicorn #cybersecurity

Read full review
Jimmy Harrington United States Air Force
Jimmy Harrington
Jimmy Harrington United States Air Force

After spending a few months with Ryan Noon, Abhishek Agrawal and Chris Park, it’s no surprise that the creative minds at Material Security just landed a fantastic Series C. Just like a seatbelt or a parachute, Material Security tech protects your digital life even after an attacker breaks into a mailbox. Highly recommend checking them out at https://material.security/Congrats on the Class C! I can't wait to see what comes next.

Jimmy Harrington United States Air Force
Jimmy Harrington
Jimmy Harrington United States Air Force

After spending a few months with Ryan Noon, Abhishek Agrawal and Chris Park, it’s no surprise that the creative minds at Material Security just landed a fantastic Series C. Just like a seatbelt or a parachute, Material Security tech protects your digital life even after an attacker breaks into a mailbox. Highly recommend checking them out at https://material.security/Congrats on the Class C! I can't wait to see what comes next.

Jimmy Harrington United States Air Force
Jimmy Harrington
Jimmy Harrington United States Air Force

After spending a few months with Ryan Noon, Abhishek Agrawal and Chris Park, it’s no surprise that the creative minds at Material Security just landed a fantastic Series C. Just like a seatbelt or a parachute, Material Security tech protects your digital life even after an attacker breaks into a mailbox. Highly recommend checking them out at https://material.security/Congrats on the Class C! I can't wait to see what comes next.

Read full review
Salahuddin Choudhary @salahuddin
Salahuddin Choudhary
@salahuddin

Users have 10x more information online than 10 years ago yet we haven’t seen a rethink of information security.

@material_sec assumes the attacker will get access and still protects you, works against social engineering!

Every political campaign should sign up by end of week :)

Salahuddin Choudhary @salahuddin
Salahuddin Choudhary
@salahuddin

Users have 10x more information online than 10 years ago yet we haven’t seen a rethink of information security.

@material_sec assumes the attacker will get access and still protects you, works against social engineering!

Every political campaign should sign up by end of week :)

Salahuddin Choudhary @salahuddin
Salahuddin Choudhary
@salahuddin

Users have 10x more information online than 10 years ago yet we haven’t seen a rethink of information security.

@material_sec assumes the attacker will get access and still protects you, works against social engineering!

Every political campaign should sign up by end of week :)

Read full review
Andrew Becherer, Fmr CISO Iterable, CSO Datadog
Andrew Becherer
Fmr CISO Iterable, CSO Datadog

When a friend hipped me to Material Security early in their development it was heaven sent.

Andrew Becherer, Fmr CISO Iterable, CSO Datadog
Andrew Becherer
Fmr CISO Iterable, CSO Datadog

When a friend hipped me to Material Security early in their development it was heaven sent.

Andrew Becherer, Fmr CISO Iterable, CSO Datadog
Andrew Becherer
Fmr CISO Iterable, CSO Datadog

When a friend hipped me to Material Security early in their development it was heaven sent.

Read full review
@securingdev, Senior Manager, @thermofisher
Keith Hoodlet
@securingdev, Senior Manager, @thermofisher

Just got off the phone with the folks @material_sec and I have to say, @internet_meme and the team have built a pretty amazing security product. I rarely walk away from a product demo and think “this is incredible”.

This was one of those moments.

@securingdev, Senior Manager, @thermofisher
Keith Hoodlet
@securingdev, Senior Manager, @thermofisher

Just got off the phone with the folks @material_sec and I have to say, @internet_meme and the team have built a pretty amazing security product. I rarely walk away from a product demo and think “this is incredible”.

This was one of those moments.

@securingdev, Senior Manager, @thermofisher
Keith Hoodlet
@securingdev, Senior Manager, @thermofisher

Just got off the phone with the folks @material_sec and I have to say, @internet_meme and the team have built a pretty amazing security product. I rarely walk away from a product demo and think “this is incredible”.

This was one of those moments.

Read full review
Allen Cox, Sr Director, IT & Security, MyFitnessPal
Allen Cox - Sr Director, IT & Security, MyFitnessPal

“Something that really stuck out to us was Posture Management as an element of the tool – there's a lot of really good context that would be hard to find in Google otherwise.“

View Case Study
Aaron Clukey - Director of Information Security & IT, Alto

“Material in contrast is, at least for me, very much plug and play. It works well for a very lean team to make sure you're still covering your bases and making sure your email suite is secure.“

View Case Study
Troy Wilkinson
Troy Wilkinson
CISO at Interpublic Group (IPG)

The team at Material Security has built a really interesting product that completely bypasses how everybody has thought about email security historically. Congrats Ryan Noon & the entire Material team!
#seriesc #unicorn #cybersecurity

Troy Wilkinson
Troy Wilkinson
CISO at Interpublic Group (IPG)

The team at Material Security has built a really interesting product that completely bypasses how everybody has thought about email security historically. Congrats Ryan Noon & the entire Material team!
#seriesc #unicorn #cybersecurity

Read full review
Jimmy Harrington United States Air Force
Jimmy Harrington
Jimmy Harrington United States Air Force

After spending a few months with Ryan Noon, Abhishek Agrawal and Chris Park, it’s no surprise that the creative minds at Material Security just landed a fantastic Series C. Just like a seatbelt or a parachute, Material Security tech protects your digital life even after an attacker breaks into a mailbox. Highly recommend checking them out at https://material.security/Congrats on the Class C! I can't wait to see what comes next.

Jimmy Harrington United States Air Force
Jimmy Harrington
Jimmy Harrington United States Air Force

After spending a few months with Ryan Noon, Abhishek Agrawal and Chris Park, it’s no surprise that the creative minds at Material Security just landed a fantastic Series C. Just like a seatbelt or a parachute, Material Security tech protects your digital life even after an attacker breaks into a mailbox. Highly recommend checking them out at https://material.security/Congrats on the Class C! I can't wait to see what comes next.

Read full review

See what we’ve been up to

blog post

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

Josh Donelson
5
m read
Read post
Podcast

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen to episode
Video

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m watch
Watch video
Downloads

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Watch video
Webinar

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen episode
blog post

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Material Team
10
m read
Read post
Podcast

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen to episode
Video

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m watch
Watch video
Downloads

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Watch video
Webinar

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen episode
blog post

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Material Team
35
m read
Read post
Podcast

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen to episode
Video

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m watch
Watch video
Downloads

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Watch video
Webinar

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen episode
blog post

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

Rajan Kapoor
7
m read
Read post
Podcast

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen to episode
Video

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m watch
Watch video
Downloads

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Watch video
Webinar

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen episode

Schedule a live demo

Fredrick "Flee" Lee, CSO, Gusto
Fredrick "Flee" Lee
CSO, Gusto

“At Gusto, every employee is serious about protecting our customers and ecosystem. We are using Material to take full advantage of the underlying APIs in our cloud email to protect against phishing, reduce ATO attacks, prevent sensitive data leakage, and more.”

Alex Bynum, Information Security Manager, Color
Alex Bynum
Information Security Manager, Color

"It used to take me 20-30 mins to investigate a single phishing email. Today I received 5 or 6 phishing emails and spent only 2-5 minutes in Material."

Nico Waisman - Former CISO, Lyft
Nico Waisman
Former CISO, Lyft

"If we review the last 5 years of incidents across multiple industries, both sophisticated and wide-spread attacks started with a successful intrusion through phishing. Material gives us an extra layer of protection when it matters most—and accelerates our detection and response time by delivering a strong workflow."

Matt Pecorelli, Director Cybersecurity Operations, Mars
Matt Pecorelli
Director Cybersecurity Operations, Mars

“Material was simple to operate and trust even at our scale. There was no complex implementation and no disruption to go into production, and we had full access to our own cloud instance throughout. Within a couple of hours of deployment, we could analyze all the email data for all our domains across North America. It was remarkable.”

Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.