Most effective form of security awareness training.

Unlike traditional training programs, users learn in real-time, all the time.


Stop Attacks That Gateways Miss

Business Email Compromise (Whaling)

Impersonation of a CEO, CFO, or trusted individual.

Spear Phishing

Targeted attacks with no malicious payload and URLs that aren't on any blacklists.

Document Macros

Macros within Office documents can be obfuscated and easily let through.

Domain Similarity Attacks

Domain name misspellings and homoglyphs.

Brand Impersonation

Impersonating well-known brands with like-kind domain names, content, and brand logos.

Zero Day Phishing Attacks

New attack vectors that exploit email clients, file types, or human trust.

Compatible with your stack

Sublime is compatible with all major SEGs and simulated phishing tools.


Seamless Setup with OAuth. No mail routing changes.

Users Learn Better with Sublime

Users are an organization's last line of defense. Sublime makes them better with an integrated Heads-Up Display.


This is a real phishing email.

This email bypassed Microsoft Office 365 and landed in an employee inbox. Sublime flags it with threat indicators and detailed explanations.


This email is dangerous.

Contains a suspicious subject.

Contains suspicious phrasing.

Sender's domain was registered very recently.

A link was registered very recently.

Link with low reputation.

Your contact with this person is limited.

You've never sent this person an email before.

Why Customers Love Sublime

Sublime aligned with my goal of arming the sheep instead of fighting the wolves, teaching employees to protect themselves rather than extending the email gateway security Maginot Line.