Lightspeed Filter - Web Filtering Solution
Lightspeed Filter is a web filtering solution designed for schools and educational institutions. It offers comprehensive online safety, enabling administrators to block inappropriate content, monitor student activity, and ensure compliance with internet safety regulations. It provides customisable filtering policies and detailed reports to help maintain a secure digital learning environment.
Features
- Agent Filtering: device-level filtering without compromising performance, anywhere, anytime
- Easy SSL Decryption: Multi-OS SSL decryption without proxies or certificates
- Admin roles: limited administrative access; assign policy, report, data-control
- Database: AI & data scientists categorise websites ensuring safety
- SmartPlay: 187 million YouTube videos categorised
- Parent Portal: Gives parents insights and controls over children's internet
- Live Web Activity Report: to troubleshoot, test, validate policy updates
- Dashboards: Access dashboards and reports showing all on-device usage
- Flexible Policy Management: Locate and manage group policies
- Social Media Controls: Allow/block or enable read-only for groups
Benefits
- Dynamic Web Filtering: Filter inappropriate content in real-time
- Customizable Policies: Create flexible filtering rules to meet specific needs
- Comprehensive Reporting: Gain insights into user activity for data-driven decision-making.
- SSL Decryption: secure web traffic without requiring complex proxy configurations.
- Granular Control: Assign unique policies for different groups, classes, individuals.
- Cloud-Based Management: Manage filters from anywhere, reducing infrastructure overhead
- Alerts and Notifications: Receive real-time alerts for concerning online behavior
- AI-Powered Detection: Leverage AI to detect threats, ensuring proactive safety
- User-Friendly Interface: Intuitive dashboard simplifies monitoring and managing filter policies.
- Parental Involvement: Allow parents to view and control children's internet
Pricing
£4.00 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 2 7 9 2 8 9 6 9 4 2 7 6 8
Contact
GBM DIGITAL TECHNOLOGIES LIMITED
Amelia Stevens
Telephone: 0161 605 3838
Email: tenders@wearesync.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- No requirements.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Instantly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Through the chat tab pop-up that opens once you access the website. This pop-up is available in the bottom right corner of the web page at all times.
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
- Lightspeed Systems offers free customer support. Customers can access the customer portal for documentation or Knowledge Base access, available 24/7. The Lightspeed Systems Help Bot and the Lightspeed Systems Support Engineers are also available 24/7 to assist with any issues or questions.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Lightspeed Engineers can assist with deploying the solution and offer additional documentation for setup. Further training is also available to ensure users maximise the platform's benefits.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Online
- End-of-contract data extraction
- All data is removed in accordance with our data deletion policy. Customers may request a copy of their data which will be provided via a CSV export.
- End-of-contract process
- All data is removed in accordance with our data deletion policy.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- IOS
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- N/A
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data is encrypted at rest using Advanced Encryption Standard (AES) encryption.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported by CVS or Google Sheets.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Google Sheets
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Data is encrypted in transit using Transport Layer Security (TLS) protocol. Data is encrypted at rest using Advanced Encryption Standard (AES) encryption.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Data is encrypted in transit using Transport Layer Security (TLS) protocol. Data is encrypted at rest using Advanced Encryption Standard (AES) encryption.
Availability and resilience
- Guaranteed availability
- Lightspeed Systems provides hosted services including mobile device management, web filtering, app analytics, and classroom management for schools. Our services are available at least 99.9% of the time, with servers being continuously monitored for performance and availability.
- Approach to resilience
- Lightspeed Systems solutions are designed to be scalable and fault tolernet using multiple Availability zones and where applicable multiple Regions.
- Outage reporting
- Service disruptions are reported via our status.lightspeedsystems.com status page. Customer can subscribe to the alerts they wish to receive.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
- Lightspeed Systems can authenticate with the preferred directory source.
- Access restrictions in management interfaces and support channels
- N/A
- Access restriction testing frequency
- Never
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Lightspeed Systems holds a current SOC 2 Type 2 report
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Lightspeed Systems reviews its systems against the CIS Controls and NIST Frameworks, and any identified risks or gaps are addressed accordingly. We hold a SOC 2 Type 2 report.
- Information security policies and processes
-
Lightspeed Systems reviews its systems against the CIS Controls and NIST Frameworks, and any identified risks or gaps are addressed accordingly.
We have a designated Data Governance team that holds periodic meetings to ensure data integrity.
We have implemented various policy documents across the Organization for data protection, such as, but not limited to: Incident Response Plan, Security Policy, Vulnerability Remediation Policy, IT Standards Policy and Data Deletion Policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change management policies are documented to address the design, development, acquisition, testing, approval, and implementation of system changes and patches.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Lightspeed Systems has a Vulnerability Remediation policy to identify and remediate vulnerabilities according to the risk they present. We utilize patch management software to monitor systems and ensure patches are implemented.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Lightspeed Systems has deployed logging and monitoring solutions to identify and investigate possible security events. Lightspeed Systems have successfully completed our SOC 2 Type II audit as of March 22, 2024. An independent firm has verified that we meet the SOC 2 standards. Lightspeed Systems follows the AICPA’s Trust Services Criteria and has established policies and processes to ensure the security, availability, processing integrity, confidentiality and privacy of the services we provide. You can request for a copy of our SOC 2 Type 2 report by emailing privacy@lightspeedsystems.com and the report will be provided upon signing an NDA.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We have a written Incident Response Plan which details the processes for detecting, reporting, identifying, analyzing, and responding to Security Incidents impacting Lightspeed Systems networks and Customer Data.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Lightspeed Systems creates social value by ensuring safe, responsible, and inclusive online environments for students and educators. Through its advanced filtering and monitoring technology, Lightspeed Systems promotes digital well-being by preventing access to harmful content and identifying online threats, including cyberbullying and self-harm. This fosters a safer and more conducive space for learning and communication. By empowering educators and administrators to ensure a secure digital experience, Lightspeed Systems contributes to a more positive and focused educational atmosphere, reinforcing the importance of online safety and digital citizenship.
Pricing
- Price
- £4.00 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Trial licenses are available upon request and review. Trial licenses are fully active licenses for set period of time to conduct testing.