Trends The Hidden Tax Every Multi-Tenant SaaS Platform Pays on Email By Ken Simpson | 8 minute read Most SaaS platforms treat email as a solved problem. Plug in SendGrid or SES, wire up some templates, move on to the next sprint. But for a large and growing class of companies — the B2B2C platforms that send email on behalf of thousands of small business customers — email is anything but solved. It’s a ticking reputation bomb, and the blast radius is the entire platform. I’ve been thinking about this problem a lot lately, and the more I dig in, the more I’m convinced the industry has a structural gap that nobody is talking about clearly enough. The Problem: Your Tenants Are Untrusted Senders Here’s the setup. You run a SaaS platform — maybe it’s invoicing software, a field service management tool, a property management system, or a helpdesk. You have thousands of small business customers. Those customers need to send email through your platform: appointment reminders, invoice notifications, follow-ups, support replies. Naturally, those customers want control. They want their branding on the emails. They want custom templates, attachments, maybe even custom sender domains. Every product manager at a B2B2C company hears this request constantly — and the evidence backs it up. The white-label SaaS market is growing at roughly 10% CAGR, and platforms like Intercom and HubSpot have years of unfulfilled community requests for richer email branding features. But here’s the tension: tenant-authored content is inherently untrusted. You can’t fully control what your customers put in their emails. And a single bad tenant — one spammer, one compromised account, one naive user who uploads a purchased list — can contaminate your shared sending reputation and crater deliverability for everyone on your platform. This isn’t a theoretical risk. It’s the single best-documented problem in shared email infrastructure. SendGrid’s own documentation confirms that shared IP reputation affects every sender in the pool. Real-world incidents are extensively documented: companies have found their shared IPs blacklisted by Microsoft, seen delivery rates drop to 30%, and spent weeks recovering — all because of another sender’s behavior on the same infrastructure. Without proper isolation, a single client’s mistake can reduce inbox placement by 40–60% across an entire client base within days. The Uncomfortable Tradeoff Platforms Make Today Faced with this risk, most platforms make a rational but painful choice: they cap what their customers can do with email. They strip out customization. They limit templates. They avoid attachments. They don’t let customers compose freeform messages. Not because customers don’t want these features — they very much do — but because the blast radius of abuse is too large to justify the risk. This pattern is extensively documented with named examples. SaaS companies have published detailed accounts of spammers exploiting their platforms — one saw 80,000 spam teammate invitations in a single week, another had to add manual email verification gates, and several have added “Possible Exploits and Mitigation” sections to their product requirements process for every new email feature. Cloud platforms enforce hard restrictions too: AWS SES sandboxes new accounts to 200 messages per day and requires written justification for production access. SendGrid eliminated its free tier entirely in mid-2025, likely in part due to abuse costs. The result is a hidden tax. Product teams can’t ship the email features customers are asking for. Support teams field “my customer didn’t get it” tickets they can’t easily debug. Growth teams can’t reduce friction in onboarding or notifications. And engineering teams are told to build custom abuse detection on top of infrastructure that was never designed for it. Why General-Purpose ESPs Don’t Fully Solve This It’s not that SendGrid, Mailgun, and Amazon SES are bad products. They’re excellent at general-purpose email delivery. But they were not architecturally designed for the specific challenge of untrusted, multi-tenant sending at scale. The evidence here is pretty clear. General-purpose ESPs offer subaccount features — SendGrid has subusers, Mailgun has subaccounts — but these are limited, bolted on, and not the primary design focus. Per-tenant policy enforcement, quarantine workflows, progressive trust scoring, and automated containment are not their core competencies. Shared IP contamination is a recurring complaint across review sites and developer forums, and abuse detection tends to be reactive — accounts get suspended after the damage is done, not before. Building your own abuse controls on top of SES is possible, but substantially burdensome. Amazon itself validated this pain point when it launched a dedicated tenant management feature in August 2025, explicitly listing the problems customers faced: lack of tenant isolation, limited visibility into per-tenant performance, complex monitoring requirements, and inadequate control mechanisms. That feature — supporting 10,000 to 300,000 tenants with automated reputation policies and per-tenant sending controls — materially reduces the burden and is a meaningful step forward. But it’s new, still carries account-level reputation risk, relies on best-effort EventBridge delivery, and requires substantial engineering integration compared to a fully managed solution. The fact that the largest cloud provider felt compelled to build this feature tells you everything about how real the problem is. The Deliverability Crisis Is Getting Worse, Not Better The backdrop to all of this is a deliverability environment that’s deteriorating for everyone. Roughly one in six legitimate, permission-based marketing emails fails to reach the inbox globally. In Q1 2025, inbox rates fell sharply across major ESPs — Mailgun dropped 27.5%, Mailchimp fell 19.6%, Amazon SES fell 14.6%. For high-volume senders, inbox placement dropped from 50% in early 2024 to under 28% a year later. Meanwhile, the major inbox providers are tightening requirements. Google and Yahoo mandated SPF, DKIM, and DMARC for bulk senders in 2024. Microsoft followed with similar requirements in 2025. The industry is shifting from IP-based to domain-based reputation, which partially mitigates the “bad neighbor” IP problem but introduces new complexities around domain-level protections that most platforms haven’t caught up with. The cost of getting this wrong is real. Every 1% of emails treated as spam translates to roughly $1,200 in lost revenue per sender. Recovery from blacklisting takes two weeks to six months. One week of email downtime for a 20-person sales team costs over $50,000 in lost pipeline. What a Purpose-Built Solution Looks Like The market needs a category of email infrastructure that treats abuse containment as a first-class concern, not an afterthought. This means tenant isolation primitives — subaccounts, per-tenant policies, per-tenant rate limits — applied at the tenant boundary rather than globally. It means automated abuse detection that quarantines suspicious tenants before they damage the shared reputation. It means progressive trust models where tenants earn sending freedom as their behavior proves safe. And it means feedback loops that turn bounces, complaints, and block signals into automated policy actions. The good news is that platforms are willing to pay for this. The email security market is valued at $4.5–6 billion and growing at 11–13% annually. Postmark has built an entire premium business model around anti-spam strictness, achieving 98.7% inbox placement versus the industry average of 83%. The concept of a differentiated sending stream for different risk profiles is well-established in practice — it’s just that nobody has built the comprehensive, multi-tenant-native version of it specifically for platform operators. The Emerging Frontier: Agent-Authored Email There’s one more dimension worth flagging. The rise of AI agent ecosystems — agent orchestration platforms, workflow automation tools, agent tool protocols — is creating a new class of untrusted email sender. Agents want to send and receive email as a universal action channel, but email is both high-value and high-risk output. OWASP has published a dedicated threat model for agentic applications that explicitly cites email sending as a high-risk tool action. Gartner predicts that by 2028, 25% of enterprise breaches will trace back to AI agent misuse. Real-world incidents of agents sending unauthorized emails have already been documented. The need for a trust layer here is real, though I’ll be honest that the timing is uncertain. Today, most agent builders are using commodity email providers like Gmail API or SendGrid rather than specialized agent email platforms. The market may develop more slowly than the hype suggests — Gartner also warns that 40%+ of agentic AI projects will be cancelled by end of 2027. But the structural need for policy gates, containment, and auditability on agent-initiated email is genuine, and it’s going to matter more as agent autonomy increases. The Bottom Line For the large number of B2B2C SaaS platforms sending email on behalf of downstream customers, the status quo is a series of bad tradeoffs: cap your customers’ email features and leave product value on the table, or open things up and risk a reputation meltdown that takes weeks to recover from. The core thesis — that multi-tenant email abuse is a real, expensive, and underserved problem — stands on very solid ground. The market demand is well-documented. The problem severity is quantifiable. The competitive gap in purpose-built solutions is clear. What the industry needs is infrastructure that treats this as a distinct problem category rather than a footnote in general-purpose email delivery. The platforms that figure out how to safely expand tenant-controlled email — without betting their sender reputation on perfect tenant behavior — will have a meaningful competitive advantage. The ones that don’t will keep paying the hidden tax.