Skip to main content

Help us improve the Digital Marketplace - send your feedback

  1. Digital Marketplace
  2. Lot 2: Cloud software
  3. eDiscovery / eDisclosure Cloud Software - Sightline
Anexsys Ltd

eDiscovery / eDisclosure Cloud Software - Sightline

Sightline is our intuitive, proprietary platform that has been developed specifically to help case teams perform eDiscovery / eDisclosure efficiently. Cull more, prioritise better and review faster at lower cost using the latest tools, all supported by our in-house team of development and legal process experts.


  • Intuitive document review interface
  • Flexible hosting options to meet your unique needs
  • Supports advanced analytics and traditional data reduction techniques
  • Complete control of where your data is stored and processed
  • Flexible and customisable workflows and integrations to support review needs
  • Productions and disclosures adapted to your needs and practice directions
  • Fully supported managed service


  • Access to digital forensic experts (data collection to witness reporting)
  • Expert advice on document processing and data reduction techniques
  • Analytics features provided at no extra cost to optimise reviews
  • Review efficiency savings of 20% from our proprietary platform enhancements
  • Access to bespoke solutions from our UK in-house software team
  • Customer self-sufficiency achieved through Anexsys training plans
  • No charge for sub-15-minute tasks, typically saving 15% fees
  • Highest degree of customisation and greatest control of data locations.


£10 a gigabyte a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 8 0 5 2 5 3 6 7 6 5 8 4 1 3


Anexsys Ltd Rob Crowley
Telephone: 020 3217 0300

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
System requirements
  • 2GB of RAM; 4 GB for optimum performance
  • Windows 7+ running Google Chrome (preferred)
  • Windows 7+ running Microsoft Edge
  • Browser must accept cookies for dual-factor authentication
  • Minimum Resolution is 1280 x 720 pixels
  • 10Mbps Broadband internet connection

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Support/office hours - Monday - Friday - 08:30 to 18:30.
Ticketing facility to log support requests - Available 24/7. Outside office hours we will provide an initial response to support requests within three hours. Enhanced support hours - weekend, bank holidays - by prior arrangement.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Our team will support your project from the first stages of scoping and data collection, continuing through the processing, review and the production stages. Our full onboarding process ensures we understand your review needs from the outset. You will have direct access to our security-cleared technical project managers, who all have extensive experience and are supported by a large technical team. Our support team can assist with more complex tasks such as creating layouts, search term reports, applying analytics functionality, and creating productions. With more complex work, your approval is sought for any additional costs associated with those tasks.
Support available to third parties

Onboarding and offboarding

Getting started
Our onboarding process starts with a kick-off meeting where we agree the ordering/engagement process, key contacts, timelines, design templates and workflows, define security arrangements and agree milestones. We also analyse existing skills within your team and determine what levels of training will be required. Online or face to face training is then arranged accordingly using dummy data. All training is supported by user guide documentation.
Each case will also have its own engagement process. With any new case, a scoping call will be required to determine data sources, sizes, whereabouts, and requirements specific to the case, such as de-duplication and search criteria. Previously agreed bespoke templates will be used to set up the new workspace, applying case-specific adjustments as required. Further training on the specific workspace is also given at this stage so reviewers are introduced to their case-specific data and workflows.
Service documentation
Documentation formats
  • ODF
  • PDF
  • Other
Other documentation formats
  • Microsoft Office formats
  • MP4
End-of-contract data extraction
We offer various closure options. We can export the entire database including all the files. This export is provided on an encrypted hard drive and data can be restored in the future if required. We can export the documents with agreed metadata. With this option, a single export is provided on an encrypted hard drive. Finally, we can delete all data. We also have options for the source data that was originally supplied to us for processing. This source data can be stored for an agreed period, copied and returned, or deleted from our systems. We will only delete the data from our servers once you have confirmed you can access your archive. We use forensically sound deletion processes, so rendering data irretrievable.
End-of-contract process
Deleting data is carried out free of charge. We do not charge for returning physical evidence within the UK. Our case closure letter outlines upfront the associated costs for each option and options are priced on a sliding scale, depending on case size. Once archive instructions have been actioned, project data is deleted from our systems and a certificate of destruction is issued.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
Designed for use on mobile devices
Service interface
User support accessibility
None or don’t know
Description of service interface
Designing Sightline from the ground up allowed us to start with a fresh perspective and unencumbered by constraints. We worked closely with our clients to solve their greatest challenges around speed, efficiency, cost savings, technology adoption, insights and security. The result is a streamlined, intuitive solution that delivers outcomes not possible with any other application. Sightline is different by design. By integrating ECA, a complete review experience and powerful analytics into a single, unified platform, you now only log in once to investigate, analyse, review and produce documents to support the full matter lifecycle.
Accessibility standards
None or don’t know
Description of accessibility
All browser-level accessibility features are supported within Sightline. In addition, we use a Web Content Accessibility Guidelines (WCAG) Checklist to test accessibility standards following any development activity. All our proprietary features are fully integrated within the Sightline interface and so as accessible as the core Sightline product.
Accessibility testing
Work is underway to make Sightline compliant with WCAG 2.1 A and the Americans with Disabilities Act, section 508. Work is expected to be completed, and compliance/certification achieved, by the Autumn of 2022.
What users can and can't do using the API
Sightline presently provides two publicly available APIs. The first performs SAML-based Single Sign On via Azure and the second connects Sightline to the client’s Microsoft365 tenant for mailbox/calendar item collection. We have a roadmap in place for the expansion of API functionality with new features being added quarterly.
API documentation
API sandbox or test environment
Customisation available
Description of customisation
Sightline provides flexibility to enhance and customise the application.
This capability, from building unique workflows to supporting structured and unstructured datasets, and embedding of other technology platforms, ensures that the platform can continue to meet ever more complex use cases.
During the onboarding process, we work with you to determine what "standard" workspace layouts and workflows should look like, what tagging and coding options are required. Our experts will be on hand to adjust workspaces to adapt as the case progresses. Levels of security are a huge feature of the platform, and these can be customised to user, folder and even document level.


Independence of resources
Sightline’s concurrency testing protocol is for 100 concurrent reviewers in a single project database. There is no known limit on simultaneous users in an instance. Sightline will scale horizontally and vertically.


Service usage metrics
Metrics types
Sightline offers various reports for statistical and graphical presentation of data. The Tally Report provides metrics, KPIs, plus any other metadata or work product attribute in the database, whether a standard field or a custom project field. Other reports range from data exploration (Communications Explorer, Concept Explorer, and Search Term Hit Reports) to review progress by assignment or by reviewer to user or document history. Each report has its own set of controls allowing some reports to be configured and saved as custom reports, shared with other users, scheduled for automated running and distribution, and/or exporting from the system.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Downloading and printing of documents and case reports is tightly controlled by user permissions, and explicit permission by case managers is sought before enabling this functionality. Standard large data exports are completed by our team in accordance with your individual case requirements. We can then make use of our Secure FTP service or we can supply data on physical media for you to collect or have couriered to your physical site.
Data export formats
  • CSV
  • Other
Other data export formats
  • All major load file formats (DAT, LST, CSV, tab delimited...)
  • Natives
  • Text only
  • Image files
  • PDF
  • Audio files (MP3, WAV...)
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Archive formats (ZIP, RAR...)
  • Email formats (PST, MBOX, EML...)
  • MS Office, Open Office and Lotus 123 formats
  • Document formats (PDF, TXT, HTML, DWG...)
  • Image formats (JPG, BMP, PNG...)
  • AV formats (AVI, WAV, MP3, MP4...)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
As we have control over hosting, we can offer a range of uptime SLAs to meet your needs. These start at 99.5% of the total number of minutes in each calendar month outside of planned maintenance windows and increase to meet the most demanding of requirements. Or we can allow you to take complete control by managing a platform that is hosted within your own infrastructure.
Support hours (Mon-Fri) 08:30am-18:30pm following initial acknowledgment you can expect a full response to queries within the following timescales: Low urgency – 4 business hours, Medium / routine urgency – 2 business hours, High urgency – 1 hour (24/7, not limited to business hours).
Approach to resilience
Anexsys is an ISO 27001, ISO 9001 and Cyber Essentials Plus accredited organisation. Our datacentres are ISO27001 and SOC 2 compliant. Processes and security arrangements that are in place, protecting both physical and digital assets are regularly audited for compliance, internally and externally. We have documented disaster recovery and business continuity procedures, available to view on request.
Sightline is built on a high-availability network architecture with primary and redundant multi-tier systems (including multiple ISPs) to provide best-in-class infrastructure. Sightline’s web servers, application servers, network, storage, memory, and all backend processing systems are all on immediate fail-over for super high availability
Outage reporting
Sightline is actively monitored and in the event of an outage or significant downtime, this will alert our in-house infrastructure team and project managers will in turn issue email alerts to you. Email alerts will contain detailed information regarding our plans to address the issue(s), the root cause and expected length of the outage.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
User access is configured to match the job roles of employees and clients. Permissions are highly granular and flexible. Permissions can control which databases and data can be accessed, which functions of the application can be used, and access to the administrator interface. An increased level access is required for the import and configuration of data into the platform as well as administrative tasks.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Schellman & Company, LLC
ISO/IEC 27001 accreditation date
4th May 2022
What the ISO/IEC 27001 doesn’t cover
All of our services are covered by our accreditation.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • FedRAMP
  • SSAE-16 SOC 1 and SOC 2
  • ISO 27018

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Complying with ISO standards ensures that we are committed to meeting your needs together with protecting our information and your data. This is a mechanism for us to show that we are continually improving and learning by completing regular internal and external audits of our quality and information security management systems.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to operational software, system upgrades, application module upgrades, vendor-supplied software, product enhancements and patches are controlled through our change management procedure detailed in our Information Security Management System. Any changes are requested through a ticketing system with full details and risk assessment for approval. The approval of a member of our management team is required if there is a possible alteration to any security controls, a financial cost or where a third-party approval is required. Once approved the infrastructure team follows a specific implementation procedure which includes planning, testing, taking backups and version control.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The management of our technical vulnerabilities is documented in our ISO27001 Information Security Management System documentation. In summary, measures include, maintaining an inventory of assets, ensuring a patching regime is adhered to for all devices and a monthly vulnerability scan by a third party. We also restrict the installation of software on all company devices, and audit devices regularly.
The application is developed to fully support containerisation, each feature of the software running in its own runtime and all images of this software are scanned on creation. Regular maintenance is conducted on the platform to apply OS and application patches.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We are certified to the ISO\IEC 27001:2013 standard. Our dedicated Information Security team manages all information security and business continuity activities. Our comprehensive vulnerability assessment programme continuously monitors equipment in our environment for vulnerabilities. Remediation efforts are planned, tracked, and undertaken. We have various security monitoring tools (IDS/IPS, data loss prevention, antivirus, mobile device management, etc.) implemented across our environment to detect security violations. Incident Management policies are implemented according to ISO standards. Policies cover escalation protocols to management, clients, and other external agencies, as necessary. These policies cover information security incidents, security breaches, and privacy related incidents as well.
Incident management type
Supplier-defined controls
Incident management approach
In the event of a verified information security incident, we will inform you at the earliest possible opportunity. From that point on, all communication will be handled by the Incident Manager. We will provide a substantive update (e.g., nature of the incident and affected data) within 24 hours and updates every 24 hours thereafter until the incident is resolved.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

We operate as a highly distributed company, with many employees working remotely. This minimises our need for physical office space and the requirement for our employees to commute, minimising our corporate energy footprint. We incorporate environmental sustainability practices into our operations where feasible through e.g., leasing office space in Energy Star labelled and/or LEED certified properties and using Energy Star equipment where practicable.
We encourage employees to adhere to energy saving practices including turning lights off in unused spaces, turning computers off and printers to idle when not in use, providing recycle bins in common areas/break rooms, using energy efficient light bulbs and installing window shades to reduce heat. As part of our commitment to minimising the environmental impacts of our business, we recently formed an Employee Affinity Group focused on Sustainability. Members of this group will work to identify and roll out sustainable business practices, promote sustainability and engage with local communities to help support sustainable practices.
We are also partnering with “Greener Litigation”, an initiative to reduce the environmental impact of dispute resolution, and we are promoting its Greener Litigation Pledge with our clients. This commits clients to take active steps to minimise the environmental impact of their practices and to reduce emissions in line with the objective of restricting global warming to 1.5°C through four actions defined within the pledge.
Covid-19 recovery

Covid-19 recovery

We recognise the need to support our local communities in their Covid-19 recovery. We plan to retain our more flexible, remote delivery model for staff, including outsourced review, rather than return to a centralised, office-based approach. Through Covid-19, we have recognised that we are able to maintain service, quality and security, whilst delivering in a manner that is adaptable to the needs of working families, the less able and others who find it difficult to attend city-centre office locations full-time. This provides greater opportunities to a wider range of community members, including those who, through no fault of their own, can struggle to find suitable skilled employment.
We are also committed to investing financial resources, offering staff time (including mentoring via the Social Mobility Foundation) and making charitable donations. Our staff committee agree on the charities we support annually and examples of our charitable work in 2022 includes participation in The London Legal Walk (which provides life-changing legal advice to those in need) and the Royal Parks Half Marathon (raising money for over 1,000 UK charities including the Royal Parks, British Heart Foundation, Cancer Research UK, GOSH, Mind, and Tommy's) and charitable donations to AgeUK, Mind and (selected due to their focus on community support and recovery from Covid-19).
We have teamed with several schools and sixth form organisations to provide work experience placements and career talks, and offer three work experience placements every school year.
We have also signed the Save the Children pledge calling on governments around the world to fully fund a global vaccine programme. This will allow countries with more vaccines than they need to share their surplus provision with other countries to ensure global vaccine supply meets demand.
Tackling economic inequality

Tackling economic inequality

All vacancies are publicly advertised using a wide range of fora and we use double blind shortlisting to prevent unconscious bias. Our offices are wheelchair accessible and all requests for reasonable adjustments are accepted. Our platforms have accessibility features including high contrast displays, large fonts, and screen readers and Braille display compatibility. We provide free training on eDisclosure via the Social Mobility Foundation, which we developed specifically to support the disadvantaged into skilled employment. We retain contact with course participants, providing advice and mentorship as they move towards their career goals.
We use consultants EmployAbility to improve inclusivity and have created training to improve understanding of disability in the workplace. We are an Armed Forces Covenant signatory. We encourage applications from ex-law enforcement and veterans (via the Career Transition Partnership and Forces Families Jobs Forum). We have adopted the Halo Code to ensure that our policies do not unintentionally prevent diversity and have signed BITC’s Race at Work charter. We also work with Aspiring Solicitors (part of the Diversity Access Scheme) to help diverse candidates secure training contracts with UK law firms. We work with Amber, a charity for young homeless and long-term unemployed people, supporting them by providing counselling sessions, fundraising for bed space and providing IT basics training sessions. We also help DABD support NEETs in London achieve employment and social mobility by helping them with their events.
Equal opportunity

Equal opportunity

Our Client Advisory Board (CAB) includes representatives from 13 corporate and law firm customers who are part of their organisations’ leadership teams and actively involved in D&I work. The CAB provides guidance, with all parties sharing ideas and advice for improvement. In 2021 we launched a programme to provide clients with diversity metrics for the teams assigned to their matters.
Our group has had a Diversity & Inclusion (D&I) programme since 2018. We are a group signatory of the CEO Action for Diversity & Inclusion, the largest CEO-driven business pledge to advance these values within the workplace. We report and analyse the demographic metrics of our workforce annually. In 2020, our group launched a series of campaigns to encourage more employees to voluntarily self-identify their diverse characteristics, including race/ethnicity, gender, veteran status, age and disability status. The objective of those efforts was to gather more complete data on Priority Groups to improve our ability to analyse and set goals. Now that we have obtained more complete data, we are able to develop benchmarks for our recruiting, hiring, promoting and overall workforce composition. To foster our culture of inclusion and provide support to a diverse workforce, we have established several different employee affinity groups. We support dozens of VCSE organisations whose missions are to promote diversity, equality, and inclusion, as well as those that provide resources for underserved members of our communities. This support includes both financial contributions and the donation of time and talent by our employees. We also promote D&I in our professional communities through marketing campaigns and social media. One example is delivering lunches to the healthcare professionals who support our communities. This year, our group has supported LawWorks UK, London Legal Support Trust and AgeUK to name a few.


Our Health & Wellness Affinity Group’s mission is to help our staff grow a strong foundation of health & wellness through best practices, provide appealing integrative programmes and direct the investment of business resources in ways that promote healthy, sustainable working practices. Examples of initiatives include virtual 5k events, meditation, our Employee Assistance Programme, on-demand wellness classes (provided by Wellbeats) and free, independent financial advice on tax, budgeting and pensions.
We have introduced a series of webinars on stress management, which are designed to give our staff tools to support them in everyday life and achieve a better work-life balance. In addition, we also have monthly training sessions on business and wellbeing subjects, such as Health & Safety when working from home, Equality & Diversity and LGBTQ+ awareness. Staff are encouraged to attend the monthly session with their peers, to stimulate participation.
Our staff are also automatically enrolled to our healthcare provider Medicash, which offers many health related benefits. Medicash also provides a 24/7 support hotline allowing our employees to have unlimited access to information, advice and emotional support throughout the year.


£10 a gigabyte a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.