SHL Group Limited

Talent Assessment

We help organisations address the most pressing talent priorities by providing an unparalleled view of their workforce. Our assessment service, benchmark data, and analytic technology enable companies to influence genuine organisational change and drive tangible business outcomes from having the right people in the right roles at the right time.

Features

  • Entry Level Solutions; select and hire best fit talent
  • Early/Graduate Career Solutions; attract next generation of top talent
  • Professional Solutions; recruit and retain critical talent
  • Managerial Solutions; unlock managerial potential
  • Workforce Review; diagnose and close talent gaps
  • Leader Assessment/Development; develop an effective leadership strategy
  • High Potential Identification and Development; uncover your future leaders
  • Succession Planning; build effective talent pipelines
  • Talent Analytics; externally benchmark your workforce
  • Training/Enablement; up-skill HR and Line Managers

Benefits

  • The largest data-set on people in the world
  • Deliver a dynamic and engaging candidate experience
  • Effective and efficient recruitment and talent processes
  • Drive business results through objective, unbiased decision making
  • Align talent strategy to business strategy
  • Predict on-the-job success for every role
  • Translate people data into targeted actions
  • Science, rigour and innovation in your talent processes
  • The most safe, secure and trustworthy assessment provider globally
  • Experienced global consultancy/Customer Service teams delivering impactful people insights

Pricing

£4100 per licence per year

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

1 5 1 6 9 8 2 8 4 5 2 5 6 3 2

Contact

SHL Group Limited

Niccolas Newey

07854 371 539

Niccolas.Newey@shl.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Maintenance schedules clearly articulated on our website. The schedule is published six months forward. Additional hours may be reserved for system upgrades as published in our maintenance schedule. SHL reserves the right to conduct emergency maintenance, without impact on availability, and will try to provide as much notice as possible.
Our monthly maintenance window allows up to six hours of downtime. SHL aims to achieve an overall 99.8% monthly average availability for its systems (excluding scheduled maintenance and scheduled upgrades)
System requirements
  • 56Kb, or faster, Internet connection to get the best experience
  • 1Mb per second, or faster, Internet connection for video-based assessments.
  • Requires an internet browser connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
8 hours SLA during working week
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
SHL provides round the clock support, maintenance and monitoring services for SHL Talent Assessments and related services. The goal of SHL Support is to support our clients to resolve any usage issues that occasionally arise and be agile in resolving them.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Webinar based system training, E-Learning, video tutorials and user guides are available.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Powerpoint
  • .csv
End-of-contract data extraction
Contact our Chief Data Protection Officer
A formal request should be submitted that data should be deleted from SHL systems. Client data is not automatically purged from our systems.If the client does not explicitly include a data retention period in their agreement or explicitly request for their data to be deleted, then we will keep their data indefinitely.
End-of-contract process
Stipulated in order/contract documentation.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Only some of our tests are available on a mobile device. Typing tests, call center simulations, and other skills tests are examples of tests that will not work on mobiles.
Service interface
No
API
Yes
What users can and can't do using the API
TalentCentral web service interface uses well defined schemas for a partner system to implement. This web service provides a web interface (includes web methods) to perform certain actions on TalentCentral through industry standard transports such as HTTP and SOAP. A partner system will integrate these calls into its workflow to consume TalentCentral services exposed via this web service interface. The partner system will expose web method to consume the any notifications that are published by TalentCentral web service. These web method are well defined as part of the TalentCentral web service interface.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Branding of the user interface is available.
Assessment content and outputs can be created specifically for the organisation (at extra cost).

Scaling

Independence of resources
For robust service delivery, information systems must meet anticipated capacity requirements at SHL. The system’s development and operational teams are responsible for determining anticipated hardware requirements and capacity and for monitoring system capacity performance. This includes disk usage and size, network traffic load, load balancing, necessary processing power, and necessary memory requirements

Analytics

Service usage metrics
Yes
Metrics types
Uptime reports can be provided upon client request.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Other
Other data at rest protection approach
Data at rest is encrypted utilising TDE
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Information regarding users is available to the project administrator in report and dashboard form. Applicants cannot see their own data directly but can be provided with reports by the administrator, which are designed for applicant usage.

Data subjects can submit a request to view, change, or delete their data via email, however as the client is the data controller, SHL requests consent from the client to process the participants request.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our monthly maintenance window allows up to six hours of downtime. SHL aims to achieve an overall 99.8% monthly average availability for its systems (excluding scheduled maintenance and scheduled upgrades).
Approach to resilience
For robust service delivery, information systems must meet anticipated capacity requirements at SHL. The system’s development and operational teams are responsible for determining anticipated hardware requirements and capacity and for monitoring system capacity performance. This includes disk usage and size, network traffic load, load balancing, necessary processing power, and necessary memory requirements
Outage reporting
SHL follows its incident management process in such scenarios.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access follows the principle of elast privilege and is provided on a need to know basis.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
19/10/2018
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • ISO22301
  • ISO20000
  • ISO9001
  • Cyber Essential Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our IT security Policy document is available upon request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our Change Management Process is based on ITIL foundations and best practices. All processes are documented and categorised based on four types of requests for change; the most commonly used procedures to track and implement system and technology changes. Operational metrics are gathered through key defined and agreed metrics for a variety of systems.

IT Change Management process currently covers both hardware and software related activities. All changes are reviewed through a weekly meeting and captured and recorded for compliance. Changes and problems are audited by internal and external auditors quarterly. The findings are then presented to the compliance board.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
SHL employs third party web application testing across several internet-facing applications, performed by WhiteHat Security Sentinel Services. In addition to common application vulnerabilities, Sentinel covers the OWASP Top Ten web site security vulnerabilities. Vulnerabilities are remediated as per the vulnerability management policy.
Critical vulnerabilities – 30 days
High vulnerabilities – 60 days
Medium vulnerabilities – 90 days
Low vulnerabilities – 120 days
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
SHL has signature- and behavioural-based detections using IPS that are distributed at all Internet inbound and outbound connections. IPS tuning helps us ensure alerts are real and actionable.
The Information Security Team uses a combination of regular internal and external scanning process for ongoing vulnerability assessments. Review meetings are held to review scan results, issues are documented, and remediation is prioritised. Information Security also performs compliance monitoring and reporting across servers and workstations.
Incident management type
Supplier-defined controls
Incident management approach
SHL’s incident management policy serves as a formal process for reporting, investigating, and analysing all information security events, weaknesses, and incidents. The policy further ensures that lessons are learned so preventive controls can be identified and implemented.
In addition to the policy, SHL also has a comprehensive incident response process based on industry best practice.
Clients are notified within 48 hours in the event of a confirmed security breach, not a suspected one.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£4100 per licence per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Access to certain tests can be provided for a handful of users upon request in order to understand the candidate experience. Sample reports are also available to show example outputs.

Service documents

Return to top ↑