Skip to main content
TrustRadius
Material Security

Material Security

Overview

What is Material Security?

Material Security is a security solution offered by Material Security that aims to provide visibility, defense-in-depth, and security infrastructure for Microsoft 365 and Google Workspace. According to the vendor, this solution helps organizations protect their sensitive email assets from phishing attacks,...

Read more
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Material Security?

Material Security in Redwood City aims to help users secure critical messages without sacrificing productivity. Material automatically classifies and redacts sensitive content in email, keeping it safe even if someone gets in.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

17 people also want pricing

Alternatives Pricing

What is Veeam Backup for Microsoft 365?

Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over Office 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams — so that data is always protected and accessible.

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

Return to navigation

Product Details

What is Material Security?

Material Security is a security solution offered by Material Security that aims to provide visibility, defense-in-depth, and security infrastructure for Microsoft 365 and Google Workspace. According to the vendor, this solution helps organizations protect their sensitive email assets from phishing attacks, data breaches, and other cyber threats. It is designed to be used by organizations of all sizes, ranging from small businesses to large enterprises. The solution is utilized by various professionals, including IT security professionals, CISOs, technology executives, security engineers, cloud architects, and individuals in industries such as financial services, healthcare, technology, and media and entertainment.

Key Features

Data Protection: According to the vendor, Material Security allows organizations to identify and protect sensitive content without sacrificing productivity. It provides built-in detection for personally identifiable information (PII), protected health information (PHI), financial data, and other common types of sensitive information. The solution continuously detects sensitive data in mailboxes, offering insights into data location and management. It also has the capability to redact sensitive messages at rest, even in the event of an account compromise.

Phishing Protection: Material Security is said to offer AI-based detection capabilities to identify and remediate inbound threats. The solution can reportedly detect and mitigate business email compromise (BEC), VIP impersonation, and other evasive attacks. Custom rules can be created to establish specific detection criteria. Additionally, the solution includes user reporting and automated response mechanisms to address user-reported threats.

Posture Management: According to the vendor, Material Security helps organizations discover and address vulnerabilities, misconfigurations, and risky user behavior. It assists in identifying unfederated and misconfigured apps that use legacy authentication, providing insights into third-party apps used within the organization and the associated accounts. The solution also has the ability to detect signup confirmations, password resets, and other automated messages, thereby enhancing posture management.

Identity Protection: Material Security aims to protect legacy authentication and signups to prevent lateral takeovers and manage Shadow IT. The solution intercepts and challenges identity verification emails, adding an extra layer of security. Users can reportedly confirm messages they requested by verifying their identity through an existing identity provider or a custom workflow. The solution also blocks the delivery of identity verification emails from blocked apps and requires proper authorization.

Deployment + Security: Material Security offers fast and flexible deployment through Microsoft 365 and Google Workspace APIs, according to the vendor. It provides a single-tenant, isolated instance that grants complete control over the underlying infrastructure. The solution is fully extensible with Material API and built-in integrations. It also offers in-product security controls, role-based access control (RBAC), audit logs, single sign-on (SSO), and infrastructure control.

Integration with Other Security Products: Material Security claims to seamlessly integrate with SIEM (Security Information and Event Management), IdP (Identity Provider), BI (Business Intelligence), and SOAR (Security Orchestration, Automation, and Response) tools. This integration is said to enhance the functionality of Material Security and existing security infrastructure. It enables organizations to gain insights into user mailboxes, behavior, and data usage patterns, thereby strengthening the overall security capabilities of the Data Cloud.

Material Security Video

Material Security Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation