SHL Group Limited

Talent Assessment

We help organisations address the most pressing talent priorities by providing an unparalleled view of their workforce. Our assessment service, benchmark data, and analytic technology enable companies to influence genuine organisational change and drive tangible business outcomes from having the right people in the right roles at the right time.

Features

  • Entry Level Solutions; select and hire best fit talent
  • Early/Graduate Career Solutions; attract next generation of top talent
  • Professional Solutions; recruit and retain critical talent
  • Managerial Solutions; unlock managerial potential
  • Workforce Review; diagnose and close talent gaps
  • Leader Assessment/Development; develop an effective leadership strategy
  • High Potential Identification and Development; uncover your future leaders
  • Succession Planning; build effective talent pipelines
  • Talent Analytics; externally benchmark your workforce
  • Training/Enablement; up-skill HR and Line Managers

Benefits

  • The largest data-set on people in the world
  • Deliver a dynamic and engaging candidate experience
  • Effective and efficient recruitment and talent processes
  • Drive business results through objective, unbiased decision making
  • Align talent strategy to business strategy
  • Predict on-the-job success for every role
  • Translate people data into targeted actions
  • Science, rigour and innovation in your talent processes
  • The most safe, secure and trustworthy assessment provider globally
  • Experienced global consultancy/Customer Service teams delivering impactful people insights

Pricing

£4100 per licence per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

151698284525632

SHL Group Limited

Gemma Lowe

02083358272

gemma.lowe@shl.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Maintenance schedules clearly articulated on our website. The schedule is published six months forward. Additional hours may be reserved for system upgrades as published in our maintenance schedule. SHL reserves the right to conduct emergency maintenance, without impact on availability, and will try to provide as much notice as possible.
Our monthly maintenance window allows up to six hours of downtime. SHL aims to achieve an overall 99.8% monthly average availability for its systems (excluding scheduled maintenance and scheduled upgrades)
System requirements
  • 56Kb, or faster, Internet connection to get the best experience
  • 1Mb per second, or faster, Internet connection for video-based assessments.
  • Requires an internet browser connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 8 hours SLA during working week
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels SHL provides round the clock support, maintenance and monitoring services for SHL Talent Assessments and related services. The goal of SHL Support is to support our clients to resolve any usage issues that occasionally arise and be agile in resolving them.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Webinar based system training, E-Learning, video tutorials and user guides are available.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Powerpoint
  • .csv
End-of-contract data extraction Contact our Chief Data Protection Officer
A formal request should be submitted that data should be deleted from SHL systems. Client data is not automatically purged from our systems.If the client does not explicitly include a data retention period in their agreement or explicitly request for their data to be deleted, then we will keep their data indefinitely.
End-of-contract process Stipulated in order/contract documentation.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Only some of our tests are available on a mobile device. Typing tests, call center simulations, and other skills tests are examples of tests that will not work on mobiles.
API Yes
What users can and can't do using the API TalentCentral web service interface uses well defined schemas for a partner system to implement. This web service provides a web interface (includes web methods) to perform certain actions on TalentCentral through industry standard transports such as HTTP and SOAP. A partner system will integrate these calls into its workflow to consume TalentCentral services exposed via this web service interface. The partner system will expose web method to consume the any notifications that are published by TalentCentral web service. These web method are well defined as part of the TalentCentral web service interface.
API documentation No
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Branding of the user interface is available.
Assessment content and outputs can be created specifically for the organisation (at extra cost).

Scaling

Scaling
Independence of resources For robust service delivery, information systems must meet anticipated capacity requirements at SHL. The system’s development and operational teams are responsible for determining anticipated hardware requirements and capacity and for monitoring system capacity performance. This includes disk usage and size, network traffic load, load balancing, necessary processing power, and necessary memory requirements

Analytics

Analytics
Service usage metrics Yes
Metrics types Uptime reports can be provided upon client request.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Other
Other data at rest protection approach Data at rest is encrypted utilising TDE
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Information regarding users is available to the project administrator in report and dashboard form. Applicants cannot see their own data directly but can be provided with reports by the administrator, which are designed for applicant usage.

Data subjects can submit a request to view, change, or delete their data via email, however as the client is the data controller, SHL requests consent from the client to process the participants request.
Data export formats
  • CSV
  • Other
Other data export formats PDF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our monthly maintenance window allows up to six hours of downtime. SHL aims to achieve an overall 99.8% monthly average availability for its systems (excluding scheduled maintenance and scheduled upgrades).
Approach to resilience For robust service delivery, information systems must meet anticipated capacity requirements at SHL. The system’s development and operational teams are responsible for determining anticipated hardware requirements and capacity and for monitoring system capacity performance. This includes disk usage and size, network traffic load, load balancing, necessary processing power, and necessary memory requirements
Outage reporting SHL follows its incident management process in such scenarios.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Access follows the principle of elast privilege and is provided on a need to know basis.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 19/10/2018
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • ISO22301
  • ISO20000
  • ISO9001
  • Cyber Essential Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our IT security Policy document is available upon request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our Change Management Process is based on ITIL foundations and best practices. All processes are documented and categorised based on four types of requests for change; the most commonly used procedures to track and implement system and technology changes. Operational metrics are gathered through key defined and agreed metrics for a variety of systems.

IT Change Management process currently covers both hardware and software related activities. All changes are reviewed through a weekly meeting and captured and recorded for compliance. Changes and problems are audited by internal and external auditors quarterly. The findings are then presented to the compliance board.
Vulnerability management type Supplier-defined controls
Vulnerability management approach SHL employs third party web application testing across several internet-facing applications, performed by WhiteHat Security Sentinel Services. In addition to common application vulnerabilities, Sentinel covers the OWASP Top Ten web site security vulnerabilities. Vulnerabilities are remediated as per the vulnerability management policy.
Critical vulnerabilities – 30 days
High vulnerabilities – 60 days
Medium vulnerabilities – 90 days
Low vulnerabilities – 120 days
Protective monitoring type Supplier-defined controls
Protective monitoring approach SHL has signature- and behavioural-based detections using IPS that are distributed at all Internet inbound and outbound connections. IPS tuning helps us ensure alerts are real and actionable.
The Information Security Team uses a combination of regular internal and external scanning process for ongoing vulnerability assessments. Review meetings are held to review scan results, issues are documented, and remediation is prioritised. Information Security also performs compliance monitoring and reporting across servers and workstations.
Incident management type Supplier-defined controls
Incident management approach SHL’s incident management policy serves as a formal process for reporting, investigating, and analysing all information security events, weaknesses, and incidents. The policy further ensures that lessons are learned so preventive controls can be identified and implemented.
In addition to the policy, SHL also has a comprehensive incident response process based on industry best practice.
Clients are notified within 48 hours in the event of a confirmed security breach, not a suspected one.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £4100 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Access to certain tests can be provided for a handful of users upon request in order to understand the candidate experience. Sample reports are also available to show example outputs.

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑