Simple & flexible plans

Choose the right level of control and automation for your team.

Core

Essential protection

Free for individual security practitioners getting started and lightweight deployment.

First 100 mailboxes free.

Enterprise

Autonomous protection & control

For enterprises standardizing on Sublime.

Full platform, premium support, and advanced controls.

Detections

Core capabilities to detect and block email-borne threats before and after delivery.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Detection engine

Analyzes email content, attachments, senders, and links using layered detection, including ML (CV, NLU, OCR), behavioral analysis, file and URL inspection, and threat intelligence to stop modern email attacks.

Vendor impersonation and compromise

Detects vendor impersonation and compromised vendor accounts used in BEC and payment fraud to catch supply chain attacks that bypass traditional trust and reputation checks.

Sender behavioral profiles

Builds behavioral profiles for senders over time to detect anomalies that indicate account compromise.

Dynamic link analysis

Analyzes links in real time using headless browsers to detect credential phishing, malicious redirects, and brand impersonation.

Monthly quota

Email bombing protection

Detects and mitigates email bombing attacks that flood inboxes to hide fraud or disrupt operations, keeping mailboxes usable during high‑volume campaigns.

Spam detection

Identifies and filters spam messages to maintain inbox hygiene and keep analysts focused on threats.

Graymail detection

Identifies and manages promotional and bulk emails to reduce inbox clutter so security teams and users can focus on real threats.

Allowlisting

Creates precise, rule‑scoped exceptions to trust specific senders without opening broad security gaps.

Blocklisting

Blocks known malicious senders and domains at scale to prevent repeat attacks from identified threat actors.

Feature
Core
Enterprise

Detection engine

Analyzes email content, attachments, senders, and links using layered detection, including ML (CV, NLU, OCR), behavioral analysis, file and URL inspection, and threat intelligence to stop modern email attacks.

Vendor impersonation 
and compromise

Detects vendor impersonation and compromised vendor accounts used in BEC and payment fraud to catch supply chain attacks that bypass traditional trust and reputation checks.

Sender behavioral profiles

Builds behavioral profiles for senders over time to detect anomalies that indicate account compromise.

Dynamic link analysis

Analyzes links in real time using headless browsers to detect credential phishing, malicious redirects, and brand impersonation.

Monthly quota

Email bombing protection

Detects and mitigates email bombing attacks that flood inboxes to hide fraud or disrupt operations, keeping mailboxes usable during high‑volume campaigns.

Spam detection

Identifies and filters spam messages to maintain inbox hygiene and keep analysts focused on threats.

Graymail detection

Identifies and manages promotional and bulk emails to reduce inbox clutter so security teams and users can focus on real threats.

Allowlisting

Creates precise, rule‑scoped exceptions to trust specific senders without opening broad security gaps.

Blocklisting

Blocks known malicious senders and domains at scale to prevent repeat attacks from identified threat actors.

Agents

AI-powered agents that automate detection engineering and email triage.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Autonomous Detection Engineer (ADÉ)

Automatically turns novel threats into validated detection rules so defenses adapt continuously without manual rule writing or tuning.

Autonomous Security Analyst (ASA)

Automates analysis and response for user‑reported and system-flagged emails with Suspicious or Unknown Attack Scores, cutting triage time from hours to seconds.

Analysis & Hunting

Tools to investigate incidents, search historical email data, and uncover hidden threats.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Historical message search

Searches historical email data with MQL to investigate incidents and understand attack patterns.

Advanced threat hunting

Runs retroactive hunts over historical email data to uncover threats that evaded initial detection and reveal broader attack campaigns.

EML Analyzer

Analyzes individual email files without full platform deployment for fast threat assessment and training.

Backtesting

Tests detection rules against historical messages to validate effectiveness and tune accuracy before production deployment.

Remediation & Response

Capabilities to neutralize threats in user inboxes and protect users post-delivery.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Standard actions

Mailbox actions to contain threats. Core includes trash and move to spam or junk; Enterprise also adds quarantine, quarantine‑and‑release, and warning banners.

Basic

Automations (decision‑driven)

Prebuilt and custom policies that automatically apply standard actions based on Attack Score, ASA, and rule logic – for example auto‑quarantining malicious messages, auto‑handling suspicious‑in‑Spam, and campaign‑level remediation.

Warning banners

Displays customizable warning banners on suspicious emails so users are alerted to risk without blocking legitimate messages.

Malicious calendar event removal

Finds and remediates malicious calendar invites (ICS phishing) that bypass traditional email defenses and persist in user calendars.

Platform &  Integrations

Connectivity and extensibility to adapt to your mail flow and security ecosystem.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Git-based detection management

Stores and manages detection rules in GitHub for version control, collaboration, and automated deployment.

API-based protection

Ingests via API to analyze messages and act without altering mail flow. Fast to deploy for Google Workspace and Microsoft 365.

REST API

Exposes comprehensive REST APIs to integrate email security data into existing workflows and tools.

Email platform connectors

Connects to Google Workspace, Microsoft 365, and IMAP‑compatible email platforms to extend protection across the organization.

Threat intelligence ingestion

Ingests external threat feeds, including IOCs, malware hashes, and YARA‑based intelligence, to enhance detection coverage.

Inline protection

Sits in mail flow to scan and enforce before delivery, enabling stricter real-time controls and policy enforcement.

SIEM and SOAR integrations

Sends enriched email threat data to SIEM and SOAR platforms via webhooks and S3 exports for centralized monitoring and automation.

Admin & Reporting

Controls for management, compliance, and visibility across 
the platform.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

Deployment options

Supports deployment as fully managed SaaS, single‑tenant SaaS, self‑managed in AWS or Azure (including GovCloud), or Docker‑based environments.

Reporting and dashboards

Shows security posture metrics such as mailboxes protected, threats detected, active rules, and remediated attacks so teams can demonstrate value and coverage.

RBAC

Controls platform access with built-in roles for admins, engineers, and analysts to enforce least privilege.

Custom RBAC roles

Defines custom roles with granular permissions to tailor access controls and restrict visibility of message contents.

SSO and MFA

Integrates with enterprise identity providers for single sign‑on and multi‑factor authentication.

SCIM user provisioning

Automates user provisioning and deprovisioning via SCIM to streamline access management.

Audit logging

Tracks platform activity and configuration changes for compliance and investigations.

Audit log export

Exports audit logs for ingestion into SIEM or storage (e.g., via S3).

S3 export

Exports message and threat data to S3 for long‑term retention and external analysis.

Multi-tenancy support

Manages multiple customer organizations with multi‑tier hierarchies for MSPs and complex enterprise structures.

User Reports

Features to engage users in the feedback loop, phishing, and abuse reporting.

Reveal all
Collapse all
Feature
Description
Core
Enterprise

User reports and feedback loop

Lets users report suspicious emails via an abuse mailbox or report button, feeding intelligence back 
to security teams and powering automated analysis and response.

Organization-wide campaign remediation (Herd immunity)

Uses user reports and message grouping to automatically remediate all copies of a campaign across the organization when a threat is confirmed or reports reach a threshold.

VIP alerting automation

Alerts or takes action when a VIP reports or receives a high‑risk message, so high‑impact users get prioritized protection and response.

User report auto-replies

Automatically acknowledges user‑reported emails and closes the loop with templated responses after messages are classified.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern