Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

29 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Graphic Design

Transparent Email Threat Detections That Build Trust and Speed Response

  • February 05, 2026
  • Review provided by G2

What do you like best about the product?
One of the strongest aspects of Sublime is how transparent its detections are. Instead of operating as a black-box filter, Sublime clearly shows why an email was flagged, including the specific signals, patterns, or behaviors that triggered the alert. This makes it much easier for IT and security teams to quickly validate threats, reduce false positives, and build trust in the system’s decision-making. That level of visibility also improves incident response and supports better long-term tuning, since administrators can understand exactly what the platform is catching and why.
What do you dislike about the product?
Sublime is primarily focused on detection and response rather than bundling broader end-user awareness or auxiliary security features, so organizations looking for an all-in-one suite may need to pair it with separate tools. In our case, moving from Avanan to Sublime also meant giving up some nice-to-have features such as geographic threat maps, Shadow IT visibility, and certain built-in reporting elements that were more readily available in the Avanan platform.
What problems is the product solving and how is that benefiting you?
Sublime has been particularly effective in reducing the volume of business email compromise (BEC) and impersonation attacks that previously slipped through our legacy email filtering tools.


    Shaun G.

Effortless Setup, Robust Email Security

  • February 05, 2026
  • Review provided by G2

What do you like best about the product?
I like the Sublime Email Security Platform because the setup was easy and its user interface seems intuitive, making it easy to use. I appreciate the lots of customization capability it offers, even though I might not use all those capabilities right now, there's room for us to grow into.
What do you dislike about the product?
Nothing right now
What problems is the product solving and how is that benefiting you?
I use the Sublime Email Security Platform to monitor emails for threats, preventing business email compromise, account takeover, and phishing. I like the ability to put in custom rules and enjoy its modularity.


    Andrew M.

Enterprise-Level Security, Effortless Onboarding

  • December 29, 2025
  • Review provided by G2

What do you like best about the product?
I like that the Sublime Email Security Platform feels like an enterprise product and it was really easy to onboard our Google Workspaces account, all for free. I appreciate how it helps filter out malicious and spam content, while also allowing us to whitelist customer email domains and craft specific rules. The comprehensive rules make decision-making straightforward. Additionally, reviewing actions taken by the system has become an important internal security process to ensure we reduce false positives. The platform's interactive wizard automated our setup process, making it very easy to get started, and it feels very complete for the price point, especially since we're under the threshold for free use.
What do you dislike about the product?
It takes a little bit of trial and error to learn how to apply actions to the 700+ built-in rules, I would of appreciated some additional help/guidance on setting up rule actions from within the console.
What problems is the product solving and how is that benefiting you?
I use Sublime Email Security Platform for inbound email security, anti-phishing, anti-spam, filtering malicious content, whitelisting domains, and creating specific rules. It enhances security review processes, offers comprehensive rules, easy onboarding, and is free for small teams.


    Airlines/Aviation

Fast, Accurate Phishing Protection with Effortless Deployment

  • November 18, 2025
  • Review provided by G2

What do you like best about the product?
API-based deployment that quickly catches phishing and BEC with low false positives, clear reporting, and simple policy tuning.
What do you dislike about the product?
Limited advanced reporting and audit exports, uneven integration depth, and an admin UI that lacks fast search/bulk actions; pricing also ramps up quickly as mailboxes grow.
What problems is the product solving and how is that benefiting you?
It tackles the biggest email-borne risks—phishing, BEC/impersonation, vendor fraud, and malware in links/attachments—using API-based detection and automated remediation to remove threats quickly. That means fewer incidents and account takeovers, less noise for users and the SOC, faster investigations with unified quarantine/forensics, and clearer reporting for compliance. Net result: higher user confidence, lower risk, and shorter mean time to detect and respond.


    reviewer2764257

Improves decision-making with clear verdict explanations and works well across multiple environments

  • October 10, 2025
  • Review provided by PeerSpot

What is our primary use case?

The basic functionality provided by Microsoft Defender and its email protections was insufficient for our needs. While it effectively handled common spam and phishing attempts, we required a solution that could address more sophisticated attacks. After researching the market, we discovered Sublime Security. Our organization expressed considerable interest in tools that utilize LLM and AI agent technologies. After conducting a thorough review, we selected Sublime Security, and we have been using it in our environment ever since.

How has it helped my organization?

The autonomous security analyst agent takes user-submitted emails and conducts a thorough review of them. Out of the box, Sublime Security comes with a variety of security rules that it applies to incoming emails. However, when someone submits an email to a phishing mailbox, the autonomous security analyst performs an even more in-depth analysis of that message. This tool utilizes an underlying agentic component powered by a large language model (LLM), which, as I understand, currently uses Claude 3.7. The analyst thoroughly examines the email and provides not only the verdict it arrives at but also a detailed explanation of how it reached that conclusion. This includes all the logic and reasoning used during its evaluation, giving us a level of detail that is quite valuable.

I have found that the verdicts are generally accurate, although there can be unusual edge cases in any organization. The information returned from the analysis has helped me understand the rationale behind decisions, clarifying why something was classified as spam, gray mail, or malicious. While these classifications are typically reliable, specific contexts might require additional considerations. Since September of this year, we have been operating in a fully automated remediation mode with the autonomous security analyst. So far, I haven’t seen many instances of users disputing the verdicts. We communicate the results to those who report phishing emails, informing them of the decision made and the actions taken. Users have been generally receptive to this feedback, and we aim to be transparent about our reasoning.

We continuously evaluate the cases labeled as either malicious or benign to ensure that legitimate emails are not incorrectly flagged as dangerous. Our goal is to avoid mistakenly labeling a dangerous email as safe. Although I trust the tool, we are diligent about validating its performance regularly, especially since the email landscape is always changing. Overall, I have been very satisfied with the tool, and we are currently achieving about a 95% automation rate for user-submitted emails.

I felt comfortable moving forward with enabling auto-remediation due to the detailed information provided. As an analyst, if I encountered something that didn't seem quite right or if there was an edge case in the environment that required a different response, I could easily navigate and address these issues. The web interface offers a comprehensive layout for evaluating emails in depth, providing all the essential details one would need for decision-making. For instance, you have access to basic information such as SPF and DKIM, along with complete header information. You can also retrieve a copy of the email itself, including any attachments, which can be placed in a sandbox environment for further analysis. This allows you to utilize any other tools or assessment methods necessary to verify findings, giving you complete freedom to investigate. Overall, the auditability and the ability to evaluate the information in Sublime through various mechanisms made me very comfortable with setting these capabilities to auto-remediation. So far, we have been very pleased with the results.

It is a big deal for us that Sublime Security offers reduced vendor dependency in deploying new protections. Being able to utilize this platform regardless of the environment it monitors is crucial. We have Sublime Security deployed in both a Microsoft environment and a Google Workspace setting. The ability to enable rules through the same platform, regardless of the monitored environment, and to do this via API calls makes the process much cleaner. It eliminates the need to rely on other tools to perform its functions. In the future, we aim to extract information from the Sublime platform to integrate with a Security Orchestration and Automated Response (SOAR) platform, like Simplify or Demisto Cortex. We’re keen on leveraging data from Sublime Security, but for now, we’re very satisfied with performing most tasks directly within the portal. We are also considering other automation opportunities moving forward. Overall, the ability to apply this functionality without initially worrying about integration with other tools speeds up onboarding and enhances our value from the system right from the start.

Based on a 30-day period, using the Microsoft Defender toolset, around 240,000 phishing messages are blocked before delivery each month. Sublime Security's control set operates after this initial filtering. The basic phishing attempts—those that are well-known and have malware attached—are typically blocked by Microsoft Defender. However, of the emails that do get past Microsoft Defender, we still triage and remediate about 186,000 emails a month within Sublime Security. This number represents emails that successfully bypassed Microsoft Defender's capabilities. Having Sublime Security as an additional layer of defense significantly enhances our security. To put it into perspective, we are blocking about two-thirds more unwanted emails with Sublime Security compared to what Microsoft Defender blocks. So, we are noticing a substantial reduction in unwanted emails, even after other security controls have had their chance to filter them out but failed to do so.

What is most valuable?

What I appreciate most about Sublime Security is the amount of detail that's provided. I've used Microsoft Defender and, in the past, Proofpoint for similar purposes. Both offer valuable insights, but what stands out about Sublime Security is how accessible the detailed analyses are for the messages that have been evaluated. The tools clearly explain why a specific verdict was assigned to a message. This level of detail is essential for analysts and anyone conducting evaluations, as it helps them understand the specific circumstances of their environment. What may be clearly malicious in one organization could be viewed as legitimate or benign in another. The information provided about flagged emails and the subsequent evaluations offers a comprehensive breakdown of how a particular conclusion was reached, which has been incredibly beneficial.

What needs improvement?

I know that a lot of time has been invested in improving the efficacy of the platform, and it shows; it performs very well. Moving forward, I think our focus should be on how to achieve better integration with other systems. While they do provide API-level access and web hooks, I believe more out-of-the-box integrations with SOAR platforms and SIEM tools would enhance Sublime's value. This would allow it to be integrated more closely with the workflows of various teams and could potentially increase its market appeal. From my perspective, the tool itself functions exceptionally well, which gives me confidence in the system. I want to see this functionality extend to other tools that I use, enabling faster automation and improved workflows for the team, particularly from a security operations standpoint. I have no critiques regarding the tool itself. They've done an outstanding job and are maintaining high quality throughout their development process. They have a great product, and it's essential that they continue to uphold that standard, even though it requires significant effort.

For how long have I used the solution?

I have been using it since 2024.

What do I think about the stability of the solution?

My thoughts on the stability of Sublime Security are positive. I believe the effectiveness of the system is largely due to its API-based development and its scalable infrastructure on the back end. I haven't experienced any slowness when using their portal or during the actions they take to remove malicious content from the environment. For example, our CISO contacted me after receiving a notification on their phone about an email that Microsoft initially thought was valid. However, by the time they opened their Outlook client, the email had already been removed because it was deemed malicious. Sublime Security acted quickly; once Microsoft alerted Outlook about the incoming email, Sublime Security managed to pull it from the stream before it had a chance to appear in the user's inbox. This happened so swiftly that the email was deleted before the intended recipient ever received it. We were able to conduct a thorough evaluation and provide the CISO with all the information they needed, which made them very satisfied. If we can meet the expectations of such a demanding customer in terms of email security, it's a strong indication of the system's reliability.

What do I think about the scalability of the solution?

Regarding scalability, we initially protected around 20,000 mailboxes daily, and that number has now increased to about 35,000, with no signs of lag or slowness. When we first onboarded the tool, there were close to 600 active detection rules. That number has now risen to 734. Despite nearly doubling the number of mailboxes and adding significantly more detection rules, the service remains just as fast as it was when we first implemented it. Overall, it appears to be highly scalable.

How are customer service and support?

We have a Teams channel that we use regularly with them. They provide updates on new capabilities being enabled, as well as information that allows us to open cases if we have questions. If there's an issue in the platform that they want us to investigate further, this communication channel allows for free-flowing dialogue.

I haven't been disappointed so far; their response is very fast. If there's something more complex, they can connect you with the appropriate engineering resources for a more in-depth conversation. We have our own internal AI review panel, and we were able to get in touch with the person who constructed the LLM and its agentic aspects relatively quickly to address our questions. They offer a wide range of expertise to their customer base on relatively short notice. Overall, they have been highly responsive and very helpful.

How was the initial setup?

It's very simple. You just need to gain API-level access to a Microsoft 365 tenant or a Google Workspace account. As long as someone can provide an API key with the necessary permissions, that's all it takes. The entire process of setting it up is straightforward and easy to implement.

It could take about a week to get the right approvals because of the large organization, but the actual technical implementation takes 30 minutes.

Maintenance is taken care of by Sublime. They do auto updates and addition of new rules and all of that. It's completely hosted by them. It's a full SaaS model.

What was our ROI?

Sublime Security has proven to be a significant advantage for us. We transitioned from relying on a third-party service provided by Cofense for handling user-reported phishing emails to managing everything in-house. This means that our previous relationship with Cofense has ended, and we have fully replaced their services with Sublime, which automates many remediation actions.

Importantly, we didn’t need to hire any additional staff; we were able to absorb this responsibility using our existing team. As we activated more functionalities of the tool, our team learned to manage the process effectively. Now, we handle everything internally, utilizing both the tool and our team's processes.

What's my experience with pricing, setup cost, and licensing?

It's very reasonable. It's competitive with its peers, especially for the number of mailboxes we have.

What other advice do I have?

We have not yet fully enabled ADÉ, but I am working on getting it activated because we have confidence in the rest of the toolset and its available functions. Currently, it is undergoing evaluation and remains in public beta. For any components that we activate, particularly those based on AI, we have an internal review board. This board focuses on determining whether a large language model (LLM) or AI component will be used to facilitate model learning in other environments or if it will be restricted solely to our tenant. We want to ensure that our internal organizational messages are not used to train external models. This review process will be conducted on a function-by-function basis, even for tools we've previously assessed. Although we haven't completed this review for the component yet, it is on our agenda. I would like to have it turned on before the end of the calendar year. We are moving forward with this, but it must pass our internal review first. If the review results are positive, we will aim to enable it before the end of December.

I would rate Sublime Security a nine out of ten.


    Patrick L.

Best-in-Class Security Platform

  • August 29, 2025
  • Review provided by G2

What do you like best about the product?
The platform is incredibly intuitive, giving us full visibility into email threats without complex setup or management. The dashboards and alerting make it easy to stay ahead of attacks. The ability to customize detection rules and workflows is a huge plus. We’re not locked into a one-size-fits-all product—it adapts to our environment.

We were able to connect Google Workspace and start seeing results in less than 10 minutes.
What do you dislike about the product?
Sublime's Message Query Language (MQL) is powerful and incredibly useful for creating detection rules and automations, but it does require some trial and error and time spent with documentation to be able to use it to its full potential.
What problems is the product solving and how is that benefiting you?
We are solving a number of issues with Sublime:
- The Google Workspace-native email security tools are cumbersome to use and don't provide much visibility into why something was flagged. Sublime provides a lot of detail on attack signals and message details, allowing our Security team to analyze potential threats faster.
- Sublime's detection of malicious emails is very good. During our first week, a number of employees received a well crafted phishing email that Google did not detect, but Sublime flagged it as malicious instantly.
- Sublime allows us to automate the response to malicious emails, which reduces the risk to end users and saves Security teams valuable time.


    John H.

Reliable detection out of the box, unrivalled support, transparency and endless customisation.

  • June 06, 2025
  • Review provided by G2

What do you like best about the product?
I'm a big fan of the transparency of the platform and how you can see the what, the why, the how a threat was detected and prevented.

The limitless ability to tune and customize detections to provide the best coverage for our organisation (whilst still providing reliable coverage right out of the box). Initial deployment is a piece of cake.... In just a few clicks you are ingesting historic data and detecting threats.

Another stand-out to me is the excellent slack community where you can not only engage directly with the Sublime team for support but where other customers can share ideas, detections and threats they have seen.
What do you dislike about the product?
I find it hard to offer criticism of Sublime as any "dislikes" I had have been addressed by Sublime since we became a customer.

If I had to be pressed I would like to see some improvement in the native reporting abilities of the platform and the capability to export these reports for consumption.
What problems is the product solving and how is that benefiting you?
Sublime has been a game-changer in tackling advanced email threats. It gives me real peace of mind knowing our environment is well protected.
The level of security it provides allows us to focus on other tasks without constantly worrying about email threats.


    Retail

Excellent Email Security Platform

  • June 03, 2025
  • Review provided by G2

What do you like best about the product?
What’s great about Sublime is how flexible it is. If you’re into that sort of thing, you can geek out on detection rules, figure out why something was quarantined, go on threat hunts, and even create your own detection rules. You can also set up automation to make your security ops simple; or if you’d rather, you can just deploy it and forget about it – it’s completely up to you. Deployment literally takes 5 minutes and the customer support team is pretty much an extension of your existing team - no ask is too small.
What do you dislike about the product?
There’s not much to dislike, but if I had to pick something, it would be the learning curve for some of the more advanced features. However, once you get the hang of it, the platform becomes a powerful tool, and the flexibility it offers is well worth the initial effort.
What problems is the product solving and how is that benefiting you?
Sublime helps us address the ongoing challenge of advanced phishing attacks. It has reduced our workload by automatically detecting and quarantining threats, allowing us to focus on other critical tasks.


    Manufacturing

The best security software I have used

  • May 27, 2025
  • Review provided by G2

What do you like best about the product?
I love how easily it is it implement, its effectiveness, and how transparent the whole software is about what it detect & why. You will very quickly see a return on investment due to much cleaner inboxes, rid of malware, phishing attempts and other attacks. They continually add new features and detections. I feel sublime is the best email security platform out there right now, and one of the strongest tools at our disposal.
What do you dislike about the product?
it is not a good fit for on-prem email or non-m365 or g-suite mail systems, based on how it is designed to work
What problems is the product solving and how is that benefiting you?
Sublime is making sure malicious mail is not getting into our company, and when it does, offers a complete triage & remediation workflow and tools that can automate it.


    Ben A.

Excellent Anti-phishing and email security platform

  • May 27, 2025
  • Review provided by G2

What do you like best about the product?
The out-of-the-box effiencieny of the platform absolutely crushes that of its competitors we tested.
What do you dislike about the product?
The platform is developing fast, but still nacent compared to industry competitors
What problems is the product solving and how is that benefiting you?
Sublime is the most effective line of email defense we currently employ. It provides a very friendly UI and it can be completely API driven. Means our SOC has fewer places to go and needs to visit it less often and have decreased incidents to handle.