Wyoming Interactive Ltd

Cheyenne Learning Management System

Cheyenne is a cloud-based learning management system, highly configurable to manage learners in various industry sectors. It offers easy-to-use content authoring, granular data analytics collection and an intuitive, responsive user-interface. Supports interactive quizzes, video, pdf/ppt and other formats by arrangement. System supports single sign-on connection via consultancy and configuration service.


  • Remote access
  • Customisable and configurable
  • Granular data analytics
  • Granular user security
  • Single sign-on supported
  • Easy content editing and curation
  • Detailed reporting
  • Responsive design
  • Supports a wide variety of media
  • Multi-sector support


  • Publish content from multiple devices
  • Facilitates easy learning
  • Helps to manage learning processes
  • Rich analysis for business decision-making
  • Engaging and intuitive layouts stimulate learning
  • Highly configurable so supports many use cases
  • Track progress and target additional content and remedial work
  • Interactivity for deeply engaged learning


£8,000 to £61,000 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.innes@wyoming-interactive.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 8 2 5 3 1 1 8 2 2 5 3 6 5 6


Wyoming Interactive Ltd Rob Innes
Telephone: +441313227000
Email: rob.innes@wyoming-interactive.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our learning management system can be configured to work with different SSO tools, different Human Resource Management applications, separate Document Management Systems and separate Digital Asset Management systems. Or it can work as fully standalone service.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
The platform is cloud-based and supports a wide range of browsers. However, some legacy browsers may require additional customisation.

The platform is responsive, however, fall-back content may be required in some contexts depending on the source material.

Linking to external identity management systems, document management systems, and the like, will require additional customisation depending on the extent of integration.
System requirements
  • Browser-based
  • Per-user licensing
  • Requires content to be supplied or originated at additional cost
  • Per-instance licensing

User support

Email or online ticketing support
Email or online ticketing
Support response times
Online ticketing support is provided and acknowledgements are issued near instantly. Response times are generally within 24 hours, Monday to Friday, but can be up to 72 hours at weekend.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Standard support is provided as part of the per-seat licence cost.

Extended support is available, subject to separate contract, depending on requirements. Factors that influence the extended support cost include, number of sites, hours of operations, integrations required, etc.

By separate contract, a technical account manager can be made available, depending on requirements. This is expected to relate more to content generation / learner development rather than platform performance, however the specification is available for discussion.

Happy to support, by separate contract, implant staff from customer organisation to the Wyoming office to learn more about the application and become an in-house expert. Similarly, first line support can be passed over to customer organisation, if desired.

Happy to support 'design days', by separate contract, maximising the impact of content on learner performance. Design days can be organised at customer site, or Wyoming site, as required. Whilst not strictly 'support', design days help to reduce the support burden for organisations by using good design to avoid user learning issues / on-boarding, etc.
Support available to third parties

Onboarding and offboarding

Getting started
Considerable effort has been invested to create an intuitive environment and Learner Users should require little or no training to user the system. For Content Authors, there is more to learn as they will be creating content for Learner Users. Online training is available to onboard Content Authors.

Also supplied are Job Aids to cover key tasks in curating learning materials. Video walk-throughs are available to cover important processes such as creating new content, publishing content, re-versioning content, running reports, etc.

A documentation pack is provided for new Content Authors and Administrators and conference call sessions, via for example, Webex, are scheduled to bring on these users.

As mentioned under Support, 'design-days' are available, by separate contract, at Wyoming facilities or at customer site. Design days allow Content Authors and Administrators to learn best practice learning design to maximise the use of interactive learning environments, optimise media choices and otherwise smooth the process of transferring new skills to achieve behaviour change. Further, design-days can help Content Authors and Administrators to organise learner materials to suit the different learning needs in their sector, so that the learning environment feels natural to learners - an extension of their work environment.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Video Walk-throughs
  • Job Aids
  • Process Flow Diagrams
  • Training Documents
End-of-contract data extraction
A service request is made to Wyoming to extract the data. This is provided in CSV or XML format and delivered securely to a nominated individual. There is no limit to the number of requests that can be made, however, if regular extracts are required, a custom data exchange process can be enabled, by separate contract, to allow Administrator Users to self-serve data extracts.
End-of-contract process
There is a per user charge, levied monthly, for all users. Learner Users are charged at a different rate to Content Authors and Administrators. Included in the cost is the ability to create and publish learner materials using content supplied by the client organisation.

Not included services: creating new content forms, the development of custom presentation methods, the generation of third party content either copy, design, video, podcast, webinar or other content materials. Connection to additional services such as document management, collaboration, SSO, etc. are available but at extra cost.

At the end of the contract, the client stops paying on the agreed date, the service becomes unavailable and data is archived. At all times, data concerning learners, their progress through learning materials, is owned by the client and ownership never passes to Wyoming.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The platform is responsive, managing display transitions between different viewport sizes, without users losing capability.

The learner experience has been focused on mobile first design and works well on a wide variety of recent devices.

There are a few features which are easier for users on a desktop, for example, running and viewing reports. The features are available on mobile, but designing reports on small screens can be more challenging. Similarly, content creation is possible on mobile but easier on a larger canvas.

Some complex content designed for desktop may require fallback content for mobile, e.g. tables fallback to cards.
Service interface
Customisation available
Description of customisation
Content to display to learners can be highly customised. Custom question types can be created by expert users to be used by content authors when creating training materials.

The look and feel of the application, images, backgrounds, etc. are able to be customised.

Learner users have no ability to customise the service however, content authors have control over certain elements. Admin users can add custom content types for subsequent use by content author users.


Independence of resources
The hosting environment is designed to scale to support a wide number of users. Learner interactions are designed to be light-weight and the data payload in most instances is very small. The application design takes this into account and significant effort has been invested to design an application that has low bandwidth requirements and serves content with low latency for all users. Heavy bandwidth content, e.g. Video is offloaded to dedicated video serving platforms, e.g. Vidyard, Vimeo, Brightcode, etc. Organisations concerned about performance can request a custom install instance, segregated from all others, by separate contract.


Service usage metrics
Metrics types
By default, Google Tag Manager is added to each install, using a fresh account if none provided by client.

At additional cost, the service can be configured to use additional analytics packages.

The service collects data on individual learners, as they progress through learning materials. Depending on the content created by the client, the data collection can be granular, question by question, data. This data can be rolled up to user, territory, job role, institution, and the like, depending on client data model. Additional reporting of learning material suitability is possible, e.g. how well does Q57 work for new users.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Because of the complexity of the data structure, exports are currently enabled by support staff. Contacting Wyoming is the route to access an export.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Availability is dependent on cloud service provider, e.g. AWS. There has been no period of unavailability impacting Wyoming with AWS during 2019 (at time of writing, May 6). The application is rigorously tested in a dev environment before any code releases are migrated up to production. We expect very high availability but do not guarantee availability. Any outage experienced by users would result in a refund of licence fees for the period of the outage.
Approach to resilience
Considerable time effort has been invested to ensure resilience with data centre partners, e.g. AWS. Details of specific security and resilience measures are available on request.
Outage reporting
Private dashboards.
Notification services, via email and SMS.

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
We support a number of authentication services. For example, one client uses Gigya as an identity management service and we securely pass-off authentication to the client. Upon successful completion, the application opens for that user. User specific data is stored in the client's domain, not within the application. Training materials and non-personal data, e.g. answers offered, duration of session, etc. are stored in the secure application data store. The authentication method is determined at set-up and configured to suit the requirements of each client.
Access restrictions in management interfaces and support channels
User accounts start off with minimal access rights. Roles can be assigned to some users that allow extended rights, for example, content editing and reporting. For administrators, an admin role can be assigned that allows, for example, the application to be taken offline.

Support channels use granular security to access only those tickets rightfully viewable by users.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
We provide planning and consultancy services, which are an associated service to our product engineering and configuration services. The planning and consultancy falls outwith CSA STAR.
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Security access is granted on a job-needed basis and access is retired when the job no longer requires access.
We employ third party penetration test experts to regularly review our installation and procedures.
We adopt client mandated security approaches and procedures on a project by project basis.
A member of the board has responsibility for security governance and the board regularly discuss maintaining cover and protection.
Information security policies and processes
We have an information security policy which is regularly reviewed. This is shared with all employees and it is a requirement of employment that employees comply with the policy. The policy has been audited by client organisations and operates across all teams and all projects.

Access to client data is provided on a minimum-required basis, i.e. the minimum access required to conduct a task is provided and no more.

A clear reporting line exists right up to a board member.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All configuration changes and code releases are managed through a structured process. In many case, we adopt change management processes governed by clients and adopt their systems and reporting tools. If no client-mandated process is required, we strictly adhere to our process of carefully planning changes, testing those changes and validating security prior to migrating through environments to production.
We conduct regular penetration tests using a third party vendor.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats are assessed on a case by case basis, depending on severity.

Patches, if required, are deployed at the earliest possible moment but not before ensuring, wherever possibly, that the fix does not have unintended consequences.

Philosophically, we would rather take the service offline for a short period of time, acknowledging the inconvenience this would have, in order to prevent any exposure. Once the situation has been addressed, the system would be activated.

We rely on multiple sources for information on potential threats, including client organisations, third party security professionals, news media and security blogs.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
To be reviewed later
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
To be provided later

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£8,000 to £61,000 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
Depending on the organisation requirements, we will offer a free trial of seven days, allowing content to be created and tested. Trial will not include integrations, e.g. SSO and will not include custom content generation. One Content Author user and one Learner user role is supported.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.innes@wyoming-interactive.com. Tell them what format you need. It will help if you say what assistive technology you use.