Wyoming Interactive Ltd

Learning Management System

This is a cloud-based learning management system, highly configurable to manage learners in various industry sectors. It offers easy-to-use content authoring, granular data analytics collection and an intuitive, responsive user-interface. Supports interactive quizzes, video, pdf/ppt and other formats by arrangement. System supports single sign-on connection via consultancy and configuration service.

Features

  • Remote access
  • Customisable and configurable
  • Granular data analytics
  • Granular user security
  • Single sign-on supported
  • Easy content editing and curation
  • Detailed reporting
  • Responsive design
  • Supports a wide variety of media
  • Multi-sector support

Benefits

  • Publish content from multiple devices
  • Facilitates easy learning
  • Helps to manage learning processes
  • Rich analysis for business decision-making
  • Engaging and intuitive layouts stimulate learning
  • Highly configurable so supports many use cases
  • Track progress and target additional content and remedial work
  • Interactivity for deeply engaged learning

Pricing

£39 to £219 per person per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

374262197139558

Wyoming Interactive Ltd

Rob Innes

+441313227000

rob.innes@wyoming-interactive.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Our learning management system can be configured to work with different SSO tools, different Human Resource Management applications, separate Document Management Systems and separate Digital Asset Management systems. Or it can work as fully standalone service.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints The platform is cloud-based and supports a wide range of browsers. However, some legacy browsers may require additional customisation.

The platform is responsive, however, fall-back content may be required in some contexts depending on the source material.

Linking to external identity management systems, document management systems, and the like, will require additional customisation depending on the extent of integration.
System requirements
  • Browser-based
  • Per-user licensing
  • Requires content to be supplied or originated at additional cost

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Online ticketing support is provided and acknowledgements are issued near instantly. Response times are generally within 24 hours, Monday to Friday, but can be up to 72 hours at weekend.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard support is provided as part of the per-seat licence cost.

Extended support is available, subject to separate contract, depending on requirements. Factors that influence the extended support cost include, number of sites, hours of operations, integrations required, etc.

By separate contract, a technical account manager can be made available, depending on requirements. This is expected to relate more to content generation / learner development rather than platform performance, however the specification is available for discussion.

Happy to support, by separate contract, implant staff from customer organisation to the Wyoming office to learn more about the application and become an in-house expert. Similarly, first line support can be passed over to customer organisation, if desired.

Happy to support 'design days', by separate contract, maximising the impact of content on learner performance. Design days can be organised at customer site, or Wyoming site, as required. Whilst not strictly 'support', design days help to reduce the support burden for organisations by using good design to avoid user learning issues / on-boarding, etc.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Considerable effort has been invested to create an intuitive environment and Learner Users should require little or no training to user the system. For Content Authors, there is more to learn as they will be creating content for Learner Users. Online training is available to onboard Content Authors.

Also supplied are Job Aids to cover key tasks in curating learning materials. Video walk-throughs are available to cover important processes such as creating new content, publishing content, re-versioning content, running reports, etc.

A documentation pack is provided for new Content Authors and Administrators and conference call sessions, via for example, Webex, are scheduled to bring on these users.

As mentioned under Support, 'design-days' are available, by separate contract, at Wyoming facilities or at customer site. Design days allow Content Authors and Administrators to learn best practice learning design to maximise the use of interactive learning environments, optimise media choices and otherwise smooth the process of transferring new skills to achieve behaviour change. Further, design-days can help Content Authors and Administrators to organise learner materials to suit the different learning needs in their sector, so that the learning environment feels natural to learners - an extension of their work environment.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Video Walk-throughs
  • Job Aids
  • Process Flow Diagrams
  • Training Documents
End-of-contract data extraction A service request is made to Wyoming to extract the data. This is provided in CSV or XML format and delivered securely to a nominated individual. There is no limit to the number of requests that can be made, however, if regular extracts are required, a custom data exchange process can be enabled, by separate contract, to allow Administrator Users to self-serve data extracts.
End-of-contract process There is a per user charge, levied monthly, for all users. Learner Users are charged at a different rate to Content Authors and Administrators. Included in the cost is the ability to create and publish learner materials using content supplied by the client organisation.

Not included services: creating new content forms, the development of custom presentation methods, the generation of third party content either copy, design, video, podcast, webinar or other content materials. Connection to additional services such as document management, collaboration, SSO, etc. are available but at extra cost.

At the end of the contract, the client stops paying on the agreed date, the service becomes unavailable and data is archived. At all times, data concerning learners, their progress through learning materials, is owned by the client and ownership never passes to Wyoming.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The platform is responsive, managing display transitions between different viewport sizes, without users losing capability.

The learner experience has been focused on mobile first design and works well on a wide variety of recent devices.

There are a few features which are easier for users on a desktop, for example, running and viewing reports. The features are available on mobile, but designing reports on small screens can be more challenging. Similarly, content creation is possible on mobile but easier on a larger canvas.

Some complex content designed for desktop may require fallback content for mobile, e.g. tables fallback to cards.
API No
Customisation available Yes
Description of customisation Content to display to learners can be highly customised. Custom question types can be created by expert users to be used by content authors when creating training materials.

The look and feel of the application, images, backgrounds, etc. are able to be customised.

Learner users have no ability to customise the service however, content authors have control over certain elements. Admin users can add custom content types for subsequent use by content author users.

Scaling

Scaling
Independence of resources The hosting environment is designed to scale to support a wide number of users. Learner interactions are designed to be light-weight and the data payload in most instances is very small. The application design takes this into account and significant effort has been invested to design an application that has low bandwidth requirements and serves content with low latency for all users. Heavy bandwidth content, e.g. Video is offloaded to dedicated video serving platforms, e.g. Vidyard, Vimeo, Brightcode, etc. Organisations concerned about performance can request a custom install instance, segregated from all others, by separate contract.

Analytics

Analytics
Service usage metrics Yes
Metrics types By default, Google Tag Manager is added to each install, using a fresh account if none provided by client.

At additional cost, the service can be configured to use additional analytics packages.

The service collects data on individual learners, as they progress through learning materials. Depending on the content created by the client, the data collection can be granular, question by question, data. This data can be rolled up to user, territory, job role, institution, and the like, depending on client data model. Additional reporting of learning material suitability is possible, e.g. how well does Q57 work for new users.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Because of the complexity of the data structure, exports are currently enabled by support staff. Contacting Wyoming is the route to access an export.
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Availability is dependent on cloud service provider, e.g. AWS. There has been no period of unavailability impacting Wyoming with AWS during 2019 (at time of writing, May 6). The application is rigorously tested in a dev environment before any code releases are migrated up to production. We expect very high availability but do not guarantee availability. Any outage experienced by users would result in a refund of licence fees for the period of the outage.
Approach to resilience Considerable time effort has been invested to ensure resilience with data centre partners, e.g. AWS. Details of specific security and resilience measures are available on request.
Outage reporting Private dashboards.
Notification services, via email and SMS.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication We support a number of authentication services. For example, one client uses Gigya as an identity management service and we securely pass-off authentication to the client. Upon successful completion, the application opens for that user. User specific data is stored in the client's domain, not within the application. Training materials and non-personal data, e.g. answers offered, duration of session, etc. are stored in the secure application data store. The authentication method is determined at set-up and configured to suit the requirements of each client.
Access restrictions in management interfaces and support channels User accounts start off with minimal access rights. Roles can be assigned to some users that allow extended rights, for example, content editing and reporting. For administrators, an admin role can be assigned that allows, for example, the application to be taken offline.

Support channels use granular security to access only those tickets rightfully viewable by users.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 14/05/2016
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover We provide planning and consultancy services, which are an associated service to our product engineering and configuration services. The planning and consultancy falls outwith CSA STAR.
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security access is granted on a job-needed basis and access is retired when the job no longer requires access.
We employ third party penetration test experts to regularly review our installation and procedures.
We adopt client mandated security approaches and procedures on a project by project basis.
A member of the board has responsibility for security governance and the board regularly discuss maintaining cover and protection.
Information security policies and processes We have an information security policy which is regularly reviewed. This is shared with all employees and it is a requirement of employment that employees comply with the policy. The policy has been audited by client organisations and operates across all teams and all projects.

Access to client data is provided on a minimum-required basis, i.e. the minimum access required to conduct a task is provided and no more.

A clear reporting line exists right up to a board member.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All configuration changes and code releases are managed through a structured process. In many case, we adopt change management processes governed by clients and adopt their systems and reporting tools. If no client-mandated process is required, we strictly adhere to our process of carefully planning changes, testing those changes and validating security prior to migrating through environments to production.
We conduct regular penetration tests using a third party vendor.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats are assessed on a case by case basis, depending on severity.

Patches, if required, are deployed at the earliest possible moment but not before ensuring, wherever possibly, that the fix does not have unintended consequences.

Philosophically, we would rather take the service offline for a short period of time, acknowledging the inconvenience this would have, in order to prevent any exposure. Once the situation has been addressed, the system would be activated.

We rely on multiple sources for information on potential threats, including client organisations, third party security professionals, news media and security blogs.
Protective monitoring type Supplier-defined controls
Protective monitoring approach To be reviewed later
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach To be provided later

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £39 to £219 per person per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Depending on the organisation requirements, we will offer a free trial of seven days, allowing content to be created and tested. Trial will not include integrations, e.g. SSO and will not include custom content generation. One Content Author user and one Learner user role is supported.

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑