Essential Computing


A Learning Management System (LMS) for the Modern Digital Workplace integrated and designed specifically for Office 365.

A modern, cloud (SaaS) based and secure learning experience which enables users to learn through Teams, SharePoint and mobile devices.

This ensures businesses can keep track of all aspects of training and compliance


  • Simple course creation leveraging the Office 365 platform
  • Integrates directly into Azure AD to facilitate employee on boarding
  • Intuitive excel and Power Bi based real time reporting
  • Single sign on with Office 365 (AD Authentication)
  • Maintain regulatory compliance with time bound competencies and certification
  • User access through Teams, SharePoint and mobile
  • Supports multiple types of content (SCORM/AICC etc.)
  • Design LMS365 with your business practices utilising Power Apps
  • Flexibility to leverage Power Automate to merge business operations
  • Supports multiple languages to provide a truly global LMS


  • An integrated LMS user experience utilising the familiarity of O365
  • Blend online learning, classroom and live webinar based training
  • Personalised user dashboards with a seamless experience
  • Organise courses into user-centric training plans
  • Advanced analytics and PowerBI dashboards to track activity
  • Flexibility to incorporate employee on-boarding
  • Incorporate CPD, certification and competency tracking
  • Automate compliance learning, management and reporting
  • Modern API enables connection with HRIS,ERP and CRM solutions
  • Gamification and leader boards to ensure user engagement


£7.50 to £45 per person per year

Service documents


G-Cloud 11

Service ID

3 2 5 4 7 9 5 5 6 4 1 7 2 9 4


Essential Computing

Clare Drew

01275 343199

Service scope

Software add-on or extension
What software services is the service an extension to
Office 365 SharePoint, Outlook and Teams
Cloud deployment model
Private cloud
Service constraints
Only available for organisations with a live Office 365 tenant.
System requirements
  • Office 365 E3
  • Azure Active Directory

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email based support- response within one hour Monday- Friday 9am-10pm UK time.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We provide a Support Service, which includes: email, phone and remote access support from our Bristol based offices, Mon-Fri, 9-5.30pm .

Technical support is provided by our trained technical support team, backed by the vendor teams as needed.

Installation and configuration services are carried out by our certified Technical Consultants, who hand over to the support team following planning, install and configuration to suit your organisations needs.

Where subsequent on site support is needed this would be quoted as needed on a day rate basis.

Your customer account manager will work closely with Support to help and advise following initial technical installation and set up.
Support available to third parties

Onboarding and offboarding

Getting started
We can work with your team remotely or on site (though typically we do most of the work remotely). We work with the relevant people in your teams to plan, design and install and configure the LMS structure. We'll do some hands on training as part of this service, to show how to build courses and use the functionality. Then we hand over to you- with our team on hand remotely to help and advise as you start building out your learning platform. Everything is done within a familiar SharePoint or Teams interface, using common Office 365 applications to create content. User documentation and an online knowledgebase are also available to support you.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
The content your organisation creates is all owned by you, and can be simply saved elsewhere.
End-of-contract process
Just advise us 12 weeks before contract end, and we'll close everything off contract wise.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The application has been designed to provide the same experience across mobile and desktop.
Service interface
What users can and can't do using the API
Built natively inside Office 365, your LMS is already fully integrated with most of your IT landscape.

Additionally, our modern API allows you to connect your LMS data seamlessly with your HRIS solution, your ERP system, your CRM data, and much more.
•Well documented and extensive API
•Use Logic Apps & Flow to integrate your LMS data with other applications
•Extract your data using Odata
•Fully integrated with AD (Azure Active Directory)
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The corporate and user dashboards can be customised within SharePoint and Teams.

Corporate branding, ensure the interface looks and feels like your own

Personalised user dashboards- ensure users see their assigned training, and build their own learning paths.

Management dashboards- assign management roles so that team leads can view their team progress.


Independence of resources
The platform is built into your own Office 365 tenant, so is not dependant or impacted by other users.


Service usage metrics
Metrics types
The service enables the organisation to monitor and manage usage and engagement by both content and by user.
Reporting types
Real-time dashboards


Supplier type
Reseller providing extra support
Organisation whose services are being resold
ELearning Force

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The course content and certificates can be easily saved or exported to another file location.
Data export formats
Other data export formats
  • PDF
  • PowerPoint
  • Word
Data import formats
Other data import formats
  • AICC
  • PowerPoint
  • Word
  • Excel
  • Sway
  • PDF
  • Video

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The Vendor, EFI provides the following commitment:

EFI will provide Customer access to the SaaS production application on a twenty-four hour, seven days a week (24x7) basis at a rate of 99.7% (“SaaS Services Uptime Metric”).

The SaaS Services Uptime Metric commences on the start of the LMS365 License. “The Go Live Date” is the date at which the customer has activated the license(s).

On a quarterly basis, the SaaS Services Uptime Metric will be measured using the measurable hours in the quarter (total time minus planned downtime, including maintenance, upgrades, etc.) as the denominator.

The numerator is the denominator value minus the time of any outages in the quarter (duration of all outages combined) to give the percentage of available uptime (2,193 actual hours available / 2,200 possible available hours = 99.7 availa-bility).

An “outage” is defined as two consecutive monitor failures within a five-minute period, lasting until the condition has cleared
Approach to resilience
The datacentre is geo-resilient across two or more European Azure datacentres.
Outage reporting
Via the customer forums and support site.

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role based access controls are in place to determine appropriate access according to role.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We utilise the ISO/IEC 27001 Code of Practice for Information Security Management as a framework for guiding our approach to managing security. Continually review our use of security measures so that we can improve the way in which we protect our business. Protect and manage our information assets to enable us to meet our contractual, legislative, privacy and ethical responsibilities. Our internal framework includes: Staff education and training, company policy, regular review processes, Director ownership of policy and processes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The Change Management team utilise Jira change control systems and framework. The key objective is to protect the client production services from outage and disruption resulting from change.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have our own internally defined management processes which cover planned and as-needed scanning, identification, notification, remediation and reporting.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have defined our own protective monitoring processes in line with contract and customer requirements.
Incident management type
Supplier-defined controls
Incident management approach
Any security or data breach event must be reported immediately to the CTO. The organisation will notify its commercial insurance provider. If a security incident or data breach event involves a customer tenant, the customer must be promptly notified in writing. We will investigate all reports of security incidents and data breaches.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£7.50 to £45 per person per year
Discount for educational organisations
Free trial available
Description of free trial
30 day free trial available. PowerBI dashboards not included.
Link to free trial

Service documents

Return to top ↑