Choose the right level of control and automation for your team.
Essential protection
Free for individual security practitioners getting started and lightweight deployment.
First 100 mailboxes free.
Autonomous protection & control
For enterprises standardizing on Sublime.
Full platform, premium support, and advanced controls.

Core capabilities to detect and block email-borne threats before and after delivery.
Detection engine
Analyzes email content, attachments, senders, and links using layered detection, including ML (CV, NLU, OCR), behavioral analysis, file and URL inspection, and threat intelligence to stop modern email attacks.
Vendor impersonation and compromise
Detects vendor impersonation and compromised vendor accounts used in BEC and payment fraud to catch supply chain attacks that bypass traditional trust and reputation checks.
Sender behavioral profiles
Builds behavioral profiles for senders over time to detect anomalies that indicate account compromise.
Dynamic link analysis
Analyzes links in real time using headless browsers to detect credential phishing, malicious redirects, and brand impersonation.
Email bombing protection
Detects and mitigates email bombing attacks that flood inboxes to hide fraud or disrupt operations, keeping mailboxes usable during high‑volume campaigns.
Spam detection
Identifies and filters spam messages to maintain inbox hygiene and keep analysts focused on threats.
Graymail detection
Identifies and manages promotional and bulk emails to reduce inbox clutter so security teams and users can focus on real threats.
Allowlisting
Creates precise, rule‑scoped exceptions to trust specific senders without opening broad security gaps.
Blocklisting
Blocks known malicious senders and domains at scale to prevent repeat attacks from identified threat actors.
Detection engine
Analyzes email content, attachments, senders, and links using layered detection, including ML (CV, NLU, OCR), behavioral analysis, file and URL inspection, and threat intelligence to stop modern email attacks.
Vendor impersonation and compromise
Detects vendor impersonation and compromised vendor accounts used in BEC and payment fraud to catch supply chain attacks that bypass traditional trust and reputation checks.
Sender behavioral profiles
Builds behavioral profiles for senders over time to detect anomalies that indicate account compromise.
Dynamic link analysis
Analyzes links in real time using headless browsers to detect credential phishing, malicious redirects, and brand impersonation.
Email bombing protection
Detects and mitigates email bombing attacks that flood inboxes to hide fraud or disrupt operations, keeping mailboxes usable during high‑volume campaigns.
Spam detection
Identifies and filters spam messages to maintain inbox hygiene and keep analysts focused on threats.
Graymail detection
Identifies and manages promotional and bulk emails to reduce inbox clutter so security teams and users can focus on real threats.
Allowlisting
Creates precise, rule‑scoped exceptions to trust specific senders without opening broad security gaps.
Blocklisting
Blocks known malicious senders and domains at scale to prevent repeat attacks from identified threat actors.
AI-powered agents that automate detection engineering and email triage.
Autonomous Detection Engineer (ADÉ)
Automatically turns novel threats into validated detection rules so defenses adapt continuously without manual rule writing or tuning.
Autonomous Security Analyst (ASA)
Automates analysis and response for user‑reported and system-flagged emails with Suspicious or Unknown Attack Scores, cutting triage time from hours to seconds.
Tools to investigate incidents, search historical email data, and uncover hidden threats.
Historical message search
Searches historical email data with MQL to investigate incidents and understand attack patterns.
Advanced threat hunting
Runs retroactive hunts over historical email data to uncover threats that evaded initial detection and reveal broader attack campaigns.
EML Analyzer
Analyzes individual email files without full platform deployment for fast threat assessment and training.
Backtesting
Tests detection rules against historical messages to validate effectiveness and tune accuracy before production deployment.
Capabilities to neutralize threats in user inboxes and protect users post-delivery.
Standard actions
Mailbox actions to contain threats. Core includes trash and move to spam or junk; Enterprise also adds quarantine, quarantine‑and‑release, and warning banners.
Automations (decision‑driven)
Prebuilt and custom policies that automatically apply standard actions based on Attack Score, ASA, and rule logic – for example auto‑quarantining malicious messages, auto‑handling suspicious‑in‑Spam, and campaign‑level remediation.
Warning banners
Displays customizable warning banners on suspicious emails so users are alerted to risk without blocking legitimate messages.
Malicious calendar event removal
Finds and remediates malicious calendar invites (ICS phishing) that bypass traditional email defenses and persist in user calendars.
Connectivity and extensibility to adapt to your mail flow and security ecosystem.
Git-based detection management
Stores and manages detection rules in GitHub for version control, collaboration, and automated deployment.
API-based protection
Ingests via API to analyze messages and act without altering mail flow. Fast to deploy for Google Workspace and Microsoft 365.
REST API
Exposes comprehensive REST APIs to integrate email security data into existing workflows and tools.
Email platform connectors
Connects to Google Workspace, Microsoft 365, and IMAP‑compatible email platforms to extend protection across the organization.
Threat intelligence ingestion
Ingests external threat feeds, including IOCs, malware hashes, and YARA‑based intelligence, to enhance detection coverage.
Inline protection
Sits in mail flow to scan and enforce before delivery, enabling stricter real-time controls and policy enforcement.
SIEM and SOAR integrations
Sends enriched email threat data to SIEM and SOAR platforms via webhooks and S3 exports for centralized monitoring and automation.
Controls for management, compliance, and visibility across the platform.
Deployment options
Supports deployment as fully managed SaaS, single‑tenant SaaS, self‑managed in AWS or Azure (including GovCloud), or Docker‑based environments.
Reporting and dashboards
Shows security posture metrics such as mailboxes protected, threats detected, active rules, and remediated attacks so teams can demonstrate value and coverage.
RBAC
Controls platform access with built-in roles for admins, engineers, and analysts to enforce least privilege.
Custom RBAC roles
Defines custom roles with granular permissions to tailor access controls and restrict visibility of message contents.
SSO and MFA
Integrates with enterprise identity providers for single sign‑on and multi‑factor authentication.
SCIM user provisioning
Automates user provisioning and deprovisioning via SCIM to streamline access management.
Audit logging
Tracks platform activity and configuration changes for compliance and investigations.
Audit log export
Exports audit logs for ingestion into SIEM or storage (e.g., via S3).
S3 export
Exports message and threat data to S3 for long‑term retention and external analysis.
Multi-tenancy support
Manages multiple customer organizations with multi‑tier hierarchies for MSPs and complex enterprise structures.
Features to engage users in the feedback loop, phishing, and abuse reporting.
User reports and feedback loop
Lets users report suspicious emails via an abuse mailbox or report button, feeding intelligence back to security teams and powering automated analysis and response.
Organization-wide campaign remediation (Herd immunity)
Uses user reports and message grouping to automatically remediate all copies of a campaign across the organization when a threat is confirmed or reports reach a threshold.
VIP alerting automation
Alerts or takes action when a VIP reports or receives a high‑risk message, so high‑impact users get prioritized protection and response.
User report auto-replies
Automatically acknowledges user‑reported emails and closes the loop with templated responses after messages are classified.
See how Sublime delivers autonomous protection by default, with control on demand.