Lightspeed Filter primary logo

Your biggest security threat isn't malware YouTube hotspots trust .

It's your students attempting to bypass your filter.

Proxy bypass now generates 7x more blocked activity than malware across K–12 networks — and it’s creating the cover attackers need.

Is your security posture built for the threat landscape you have?

Real-world data shows how frequently students probe, bypass, and redeploy around filtering systems.

Proxy requests blocked
0 B

The volume of bypass traffic has outpaced every other threat category.

NetTools requests blocked
0 M

Scanners and network utility tools used to test network boundarie

Proxy and security hostnames blocked
0 M

The same threats redeploying under new addresses to avoid detection.

Multi-Layer Bypass Prevention Across Every Attack Path

Bypass attempts don’t rely on a single method. Protection shouldn’t either. This approach reduces reliance on any single control, closing gaps attackers and students exploit.

10010110110100101110010110110001 01101010001111000101100101101111 11000111101000011110010010110010 01011000001111010110100101001110 Live Intelligence Stops exposure to inappropriate content withproxy detection and internet lockouts Zero Day Threat Protection Unknown site blocking by default and day-zeroclassification of new websites Granular Security Categorization Dynamic category-based blocking for proxies,top-level domains, unsafe search, and more ChromeOS App & Device Protection Filters native Chrome OS apps that bypassextensions On-Device + Network-Level Filtering Supports all major devices and OSs,on and off the network

Real-Time Proxy Detection and Blocking

When a student loads a proxy bypass site, Lightspeed Filter™ detects and blocks it by analyzing what’s executing in the browser, including tunneling methods, JavaScript behavior, and proxy libraries like Ultraviolet, Scramjet, and Rammerhead. These signals are evaluated in real time, with blocking triggered when thresholds are met and re-scanning to catch mid-session evasion, stopping bypass attempts that URL and text-based filtering miss.

How it works

01

Inspection

When a user accesses a page, the system analyzes the load in real time, evaluating DOM structure, network activity, and JavaScript execution. It detects proxy frameworks, tunneling methods, and hidden behaviors, including tools like Ultraviolet and Rammerhead.

02

Scoring

Each signal contributes to a weighted score. High-confidence indicators trigger immediate detection, while lower-confidence signals accumulate until a threshold is reached.

03

On-going scanning

The page is monitored throughout the session. If behavior changes or new scripts execute, signals are re-scored in real time to catch delayed or dynamic evasion techniques.

04

Feedback

Once thresholds are met, the system blocks or logs activity based on policy. All detections feed back into the model, with confirmed sites recategorized to strengthen protection across the platform.

Common Bypass Methods and How They're Stopped

Students use a range of methods to bypass filtering, from proxy tools to browser exploits. Here’s what those tactics look like and how Lightspeed stops them.

The Bypass ProblemWhat It Looks LikeHow Lightspeed Solves It
Game aggregatorsSites with tiled game libraries, embedded launchers, and unblocked access points to games and appsDetects aggregator patterns and libraries like Ruffle, Nebula, and Interstellar, blocking access in real time
Top-level domainsNewly registered or obscure domains used to host proxy tools or evade categorizationApplies dynamic categorization and blocks risky or uncategorized domains by default
Extension-less Chrome sessionsStudents use tricks like GitHub SSO to open a Chrome window that doesn't load extensionsRoutes traffic through cloud proxy, identifies proxy behavior even without extensions, and enforces filtering
Google SitesStudent-created or shared Google Sites used to host proxy links or embedded bypass toolsInspects page behavior and embedded content to detect and block proxy activity
Unsafe search sitesSites that provide links to proxies, unblocked content, or ways to bypass restrictionsUses category-based blocking and real-time detection to restrict access to unsafe search platforms
Domain sharing sitesPlatforms where users upload or share proxy links and bypass toolsIdentifies and blocks known sharing platforms and detects proxy behavior within shared content

Coverage That Fits Your Environment

Tune detection to match your policies, your users, and your risk tolerance.

Always-on Detection

Detection runs across all categories, allowing blocking to be adjusted without losing visibility into bypass attempts.

Per-Policy Sensitivity Control

Set detection sensitivity by policy. Choose "Relaxed" "Normal" or "Strict" for different user groups, grade levels, or staff.

Coverage for Known Proxy Frameworks

Detects widely used proxy tools such as Ultraviolet, Scramjet, and Rammerhead, regardless of where they appear. No dependency on domain or URL matching.

Game Aggregator Detection

Identifies sites used to access unblocked games and apps. Detects libraries like Ruffle, Nebula, and Interstellar, along with common aggregator patterns, using the same detection engine and policy controls

Approved Tool Exceptions

Combine allow lists and local recategorization to manage approved tools, excluding trusted platforms from blocking while maintaining detection.

How Does Your Filter Stack Up?

Not all filters catch the same threats. Here’s how the approaches compare.

CapabilityLightspeedLinewizeDeledaoGoGuardianSecurly
Live intelligence: bypass detectionFull coverageProxies + game aggregators; behavior-basedPartial coverageProxies only; text/content scan onlyPartial coverageProxies + games; text/content scan onlyPartial coverageProxies only; text/content scan onlyNo coverage
Blocking sensitivity control with always-on detectionFull coverageRelaxed / Normal / Strict; detection runs independentNo coverageNo coverageNo coverageNo coverage
Zero-day threat protectionFull coverageFull coveragePartial coverageAI on-device onlyFull coverageFull coverage
Granular security categorizationFull coverageFull coveragePartial coverageAI on-device onlyPartial coverageLess granular; categorizes proxiesPartial coverageLess granular; categorizes proxies
ChromeOS app & device protectionFull coveragePartial coverageOn-network onlyNo coverageNo coverageNo coverage
On-device, tamper resistant agentsFull coveragePartial coverageVPN-based; performance impactPartial coverageChrome-based onlyFull coveragePartial coverageSmartPAC proxy only; no native agent

your custom report

See what's getting through your filter right now

Run a proof of concept with your network. We’ll show you exactly what bypass activity looks like in your environment, and what your current filter isn’t catching.

We’ll reach out to set up your POC. No spam, no pressure. 

See what your filter is missing

Most filters tell you what they blocked. Yours won’t tell you what got through. A Lightspeed POC gives you visibility into bypass activity on your own network — using your data.

Detection methodURL filteringLightspeed
Known proxy domains
Newly generated proxy hostnames
Ultraviolet / Scramjet / Rammerhead
Mid-session evasion & re-routing
Game aggregator librariesPartial
Off-network / BYOD devices