Skip to content
Material Security logo

Material Security

Unclaimed

The first detection and response platform built for the cloud workspace.

Visit Website

TL;DR - Material Security

  • Comprehensive security for Google Workspace and Microsoft 365.
  • Automates detection and response for email, file, and account threats.
  • Reduces manual security toil with AI-powered automation and auto-remediations.
Pricing: Paid only
Best for: Enterprises & pros
4.9/5 across review platforms

Pros & Cons

Pros

  • Purpose-built for cloud workspaces (Google Workspace, Microsoft 365), not retrofitted
  • Provides holistic security across email, files, and accounts from a single platform
  • Automates threat detection and response, reducing manual effort and burnout for security teams
  • Offers full lifecycle protection: detection, containment, and resilience
  • Seamlessly integrates into existing workflows and is extensible via APIs and event hooks

Cons

  • No free tier or trial explicitly mentioned on the provided pages
  • Requires integration with existing cloud workspace environments

Ratings Across the Web

4.9(20 reviews)

Ratings aggregated from independent review platforms. Learn more

Preview

Key Features

Email security with AI-powered investigation and response workflowsFile security for detecting and remediating sensitive data exposure and excessive permissionsAccount security for detecting account takeovers and hardening cloud workspace accountsAutomated threat response and remediationAPI-based and agentless deploymentSearch and investigation capabilities across the cloud workspaceAccount risk overview for blast radius understandingConfigurable notifications and integration with SIEM/SOAR platforms

Pricing Plans

Essentials

$4/month

  • Identity-based threat detection and response
  • Posture management and vulnerability reduction across the cloud office
  • No one-size-fits-all, black box solution
  • Zero hours spent writing and maintaining detection rules
  • Detect sophisticated email-based attacks (Phishing, BEC, Impersonation, Fraud, etc.)
  • Remediate email attacks with flexible remediations (banners, link/attachment speedbumps, marking spam and deletion)
  • AI agent ingests, auto-classifies, and responds to user-reported phishing
  • Hunt for email threats and build custom detections
  • View trends and analytics on email-based attacks
  • Run phishing simulations based on real attacks
  • Create custom detections to monitor sensitive and malicious email
  • Detect and monitor built-in sensitive data types in email
  • Define custom sensitive data types
  • Detect anomalous and high-volume sensitive content sharing
  • Detect and remediate email bomb and harassment campaigns
  • Sync files from MyDrives and Shared Drives (Metadata only)
  • Detect files with improper sharing
  • Detect files with excessive permissions
  • Detect external applications with excessive file access
  • Detect orphaned file sharing from offboarded accounts
  • Create custom detections to monitor file permissions and sharing
  • Remediate file issues with user notifications, permissions updates, and label assignments
  • Ingest Google Drive labels for use with custom detections and remediations

Advanced

$6/month

  • Everything in Essentials
  • Detect and monitor improper sharing and excessive permissions in Google Drive
  • Detect and monitor sensitive content in email
  • Expanded data discovery and governance capabilities
  • Enhanced identity risk and threat detections
  • Detect anomalous behavior related to sensitive content in files and emails
  • Sync files from MyDrives and Shared Drives (Metadata and Content)
  • Detect and monitor built-in sensitive data types in file content
  • Ingest custom sensitive data types from Microsoft Purview

ATO Resilience (Add-on)

+$3/month

  • Contain the blast radius of ATO attacks with message-level controls for sensitive content, password resets, and more
  • Reduce your vulnerability to ATOs by uncovering MFA gaps and bypasses before they’re exploited
  • Detect ATO attacks early via monitoring of anomalous behavior
  • Detect MFA coverage gaps including use of non phishing-resistant MFA
  • Detect and remediate IMAP/POP, ASPs, and other forms of MFA bypass
  • Detect leaked credentials in public data breaches
  • Detect suspicious mail forwarding rules
  • Detect and mitigate suspicious admin activity
  • Detect and mitigate account takeovers (ATO)

ATO Resilience (Stand-alone)

$5/month

  • Contain the blast radius of ATO attacks with message-level controls for sensitive content, password resets, and more
  • Reduce your vulnerability to ATOs by uncovering MFA gaps and bypasses before they’re exploited
  • Detect ATO attacks early via monitoring of anomalous behavior
  • Detect MFA coverage gaps including use of non phishing-resistant MFA
  • Detect and remediate IMAP/POP, ASPs, and other forms of MFA bypass
  • Detect leaked credentials in public data breaches
  • Detect suspicious mail forwarding rules
  • Detect and mitigate suspicious admin activity
  • Detect and mitigate account takeovers (ATO)

What is Material Security?

Editorial review
Material Security is a comprehensive detection and response platform specifically designed for cloud workspaces like Google Workspace and Microsoft 365. It provides holistic security across email, files, and accounts, aiming to protect organizations from sophisticated attacks that bypass native security controls. The platform is built for security teams seeking to automate threat response, reduce manual toil, and gain a unified view of their cloud office security posture. It helps prevent Business Email Compromise (BEC) and Vendor Email Compromise (VEC) attacks, protects sensitive data in emails and files, and hardens user accounts against compromise. By offering automated remediation and integrating seamlessly into existing workflows, Material Security allows teams to handle more threats without increasing headcount. Material Security's core value lies in its ability to provide full lifecycle protection-detection before an incident, containment during, and resilience after. It offers in-depth protection for cloud-based collaboration, ensuring sensitive data remains protected even if credentials are compromised. The platform emphasizes proactive security, automation, and a single-pane-of-glass view for managing complex cloud environments, including those with multiple tenants.

Reviews

Be the first to review Material Security

Your take helps the next buyer. Verified LinkedIn reviewers get a badge.

Write a review

Best Material Security Alternatives

Top alternatives based on features, pricing, and user needs.

View full list →

Explore More

Material Security FAQ

What is Material Security?

Material Security is a detection and response platform designed to secure cloud workspaces like Google Workspace and Microsoft 365. It protects against sophisticated attacks across email, files, and user accounts, automating threat response and data protection.

How much does Material Security cost?

The pricing for Material Security is not explicitly mentioned on the provided pages, but it is indicated as a paid product, suggesting a subscription or enterprise-level pricing model.

Is Material Security free?

No, Material Security is not free. The provided content does not mention a free tier or a free trial.

Who is Material Security for?

Material Security is for security teams and organizations that rely on Google Workspace or Microsoft 365 for their cloud collaboration. It's particularly beneficial for those looking to enhance their security posture, automate threat response, and gain a unified view of their cloud office security without increasing headcount.