Audience

Companies searching for a detection and response platform for securing email

About Sublime

Sublime alleviates the pain of traditional black box email gateways with detection-as-code and community collaboration. Binary explosion recursively scans files delivered via attachments or auto-downloaded via links to detect HTML smuggling, suspicious macros, and other types of malicious payloads. Natural Language Understanding analyzes message tone and intent and leverages sender history to detect payload-less attacks. Link Analysis renders web pages using a headless browser and analyzes content using Computer Vision for impersonated brand logos, login pages, captchas, and other suspicious content. Sender analysis leverages organizational context to detect the impersonation of high-value users. Optical-Character-Recognition (OCR) extracts key entities from attachments such as callback phone numbers.

Integrations

API:
Yes, Sublime offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Sublime Security
Founded: 2019
United States
sublime.security/

Videos and Screen Captures

Sublime Screenshot 1
Other Useful Business Software
Try Google Cloud Risk-Free With $300 in Credit Icon
Try Google Cloud Risk-Free With $300 in Credit

No hidden charges. No surprise bills. Cancel anytime.

Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free

Product Details

Platforms Supported
Cloud
Support
Online

Sublime Frequently Asked Questions

Q: What kinds of users and organization types does Sublime work with?
Q: What languages does Sublime support in their product?
Q: What other applications or services does Sublime integrate with?
Q: Does Sublime have an API?

Sublime Product Features

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting