The agency problem with both
Agencies on Mailgun build their own multi-tenant layer on top of subaccounts. Agencies on shared senders trade control for convenience and inherit neighbor risk. Neither answers the real question: how to run dozens of client programs with per-client isolation, warm-up, audit, and policy.
What a control plane adds
- Workspace-per-client model; Mailgun subaccounts register per workspace.
- Mailbox registry: Workspace/365 mailboxes for cold prospecting.
- Per-mailbox warm-up profiles; declarative, not scripted.
- Canonical events across Mailgun + Workspace + 365.
- Decision log per send.
- Per-workspace audit export for client compliance reviews.
How it works
- Create workspace per client.
- Register Mailgun subaccount or domain under the workspace.
- Connect Workspace/365 mailboxes via OAuth for cold paths.
- Assign warm-up profiles.
- Declare policy: per-provider caps, fallback order, regional preference.
- Submit sends via API or SMTP relay; decisions logged.
Benefits
- Keep Mailgun cost profile on the Mailgun path.
- Cold moves to owned mailboxes; reputation isolated.
- Agency scales to new clients by spinning up workspaces.
- Compliance exports per client in one call.
Drawbacks
- More concepts than shared senders.
- External dependency on the control plane; managed with SLA.
- Mailgun subaccount setup stays with the agency.
Who should use it
- Agencies managing 5+ client programs.
- Agencies where deliverability is a paid deliverable.
- Agencies whose clients ask for DPA, audit, and data residency answers.
Comparison table
| Dimension | Mailgun | Shared sender | Control plane above |
|---|---|---|---|
| Reputation ownership | Client (on dedicated IPs) | Pool | Client (per mailbox + Mailgun identity) |
| Per-client isolation | Subaccounts | DIY | Workspaces |
| Mailbox registry | No | No | Yes |
| Warm-up | IP-level | Pool-level | Per mailbox |
| Decision log | No | No | Yes |
| Events | Mailgun webhooks | Vendor schema | Canonical across providers |
| Compliance | Vendor certifications + DPA | Vendor DPA | Mailers.io DPA + GDPR |
Pricing at /pricing; agency surface at /platform/agency-email-platform; DPA at /dpa.
Finally, treat deliverability talk as a constraint problem, not a battle of slogans. Recipients, mailbox providers, and local IT policies are not under your vendor’s control. What you can control is list provenance, authentication, throttles, content hygiene, and how fast you stop repeating mistakes. The organizations that do well here look boring: fewer surprises, fewer “unknown unknowns” in audits, and operators who can show receipts.
When you operationalize Article at scale, the durable win is a repeatable review loop: weekly metrics that surface drift before leadership notices. That usually means bounces and complaints as first-class series—not vanity engagement charts—paired with a written rule for when a program pauses. This matters whether your stack is a single console or a multi-provider layer; the work is the same even when “Article” is the public label on the project.
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Testing discipline for guide-style problems usually improves when you separate “content experiments” from “infrastructure changes.” If you must change both, sequence them: stabilize the path, then test creative, or you will not know which variable moved the signal you care about. If you are comparing providers, do it with the same list ethics and the same segment definitions; otherwise the comparison is a story, not a measurement.
Runbooks are underrated. A good runbook is not a PDF nobody opens; it is a checklist that includes who is allowed to do what, what “pause sending” does in your configuration, and how to verify suppression state after an incident. Mailers.io is built as orchestration and policy on infrastructure you connect—useful when you have multiple paths, shared templates, and need consistent governance across teams. It is the wrong product if the primary pain is a missing CRM surface or a guarantee that mail will “land in primary.”
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Cross-functional alignment fails quietly: Marketing ships a new domain, Data updates a list export, and Engineering rotates an API key—each change reasonable alone, but together they break assumptions about identity and suppression. A useful discipline is a lightweight change log for anything that touches a live sending identity, even if the change is “small.” The goal is not paperwork theatre; the goal is that the next on-call can reconstruct state without heroics.
Procurement and security questions often ask for certifications as shorthand. The better question is: what logs exist, for how long, and who can access them? A control plane can unify routing, but you still need your own data map for personal data, subprocessors, and incident response. This article is educational; align final commitments with your counsel and your customer contracts. We do not claim outcomes we cannot own (placement, read rates, or a unified sales inbox) because that would mis-sell the product’s shape.
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Finally, treat deliverability talk as a constraint problem, not a battle of slogans. Recipients, mailbox providers, and local IT policies are not under your vendor’s control. What you can control is list provenance, authentication, throttles, content hygiene, and how fast you stop repeating mistakes. The organizations that do well here look boring: fewer surprises, fewer “unknown unknowns” in audits, and operators who can show receipts.
When you operationalize Article at scale, the durable win is a repeatable review loop: weekly metrics that surface drift before leadership notices. That usually means bounces and complaints as first-class series—not vanity engagement charts—paired with a written rule for when a program pauses. This matters whether your stack is a single console or a multi-provider layer; the work is the same even when “Article” is the public label on the project.
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Testing discipline for guide-style problems usually improves when you separate “content experiments” from “infrastructure changes.” If you must change both, sequence them: stabilize the path, then test creative, or you will not know which variable moved the signal you care about. If you are comparing providers, do it with the same list ethics and the same segment definitions; otherwise the comparison is a story, not a measurement.
Runbooks are underrated. A good runbook is not a PDF nobody opens; it is a checklist that includes who is allowed to do what, what “pause sending” does in your configuration, and how to verify suppression state after an incident. Mailers.io is built as orchestration and policy on infrastructure you connect—useful when you have multiple paths, shared templates, and need consistent governance across teams. It is the wrong product if the primary pain is a missing CRM surface or a guarantee that mail will “land in primary.”
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Cross-functional alignment fails quietly: Marketing ships a new domain, Data updates a list export, and Engineering rotates an API key—each change reasonable alone, but together they break assumptions about identity and suppression. A useful discipline is a lightweight change log for anything that touches a live sending identity, even if the change is “small.” The goal is not paperwork theatre; the goal is that the next on-call can reconstruct state without heroics.
Procurement and security questions often ask for certifications as shorthand. The better question is: what logs exist, for how long, and who can access them? A control plane can unify routing, but you still need your own data map for personal data, subprocessors, and incident response. This article is educational; align final commitments with your counsel and your customer contracts. We do not claim outcomes we cannot own (placement, read rates, or a unified sales inbox) because that would mis-sell the product’s shape.
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Finally, treat deliverability talk as a constraint problem, not a battle of slogans. Recipients, mailbox providers, and local IT policies are not under your vendor’s control. What you can control is list provenance, authentication, throttles, content hygiene, and how fast you stop repeating mistakes. The organizations that do well here look boring: fewer surprises, fewer “unknown unknowns” in audits, and operators who can show receipts.
When you operationalize Article at scale, the durable win is a repeatable review loop: weekly metrics that surface drift before leadership notices. That usually means bounces and complaints as first-class series—not vanity engagement charts—paired with a written rule for when a program pauses. This matters whether your stack is a single console or a multi-provider layer; the work is the same even when “Article” is the public label on the project.
Related depth for “Article”: operators often underestimate how much time is spent on credential lifecycle (API keys, SMTP passwords, domain delegation) and how little time is left for improving message quality. Rebalance that intentionally if revenue depends on reliable outbound. Multi-provider routing can reduce provider-specific lock-in and separate blast radius, but it does not remove your obligation to own consent, suppression, and record-keeping. Not legal advice. Where GDPR, CCPA/CPRA, or similar apply, align with counsel. We do not use generic marketing copy to assert SOC 2 or ISO 27001.
Testing discipline for guide-style problems usually improves when you separate “content experiments” from “infrastructure changes.” If you must change both, sequence them: stabilize the path, then test creative, or you will not know which variable moved the signal you care about. If you are comparing providers, do it with the same list ethics and the same segment definitions; otherwise the comparison is a story, not a measurement.
Runbooks are underrated. A good runbook is not a PDF nobody opens; it is a checklist that includes who is allowed to do what, what “pause sending” does in your configuration, and how to verify suppression state after an incident. Mailers.io is built as orchestration and policy on infrastructure you connect—useful when you have multiple paths, shared templates, and need consistent governance across teams. It is the wrong product if the primary pain is a missing CRM surface or a guarantee that mail will “land in primary.”