Learning Management System
This is a cloud-based learning management system, highly configurable to manage learners in various industry sectors. It offers easy-to-use content authoring, granular data analytics collection and an intuitive, responsive user-interface. Supports interactive quizzes, video, pdf/ppt and other formats by arrangement. System supports single sign-on connection via consultancy and configuration service.
- Remote access
- Customisable and configurable
- Granular data analytics
- Granular user security
- Single sign-on supported
- Easy content editing and curation
- Detailed reporting
- Responsive design
- Supports a wide variety of media
- Multi-sector support
- Publish content from multiple devices
- Facilitates easy learning
- Helps to manage learning processes
- Rich analysis for business decision-making
- Engaging and intuitive layouts stimulate learning
- Highly configurable so supports many use cases
- Track progress and target additional content and remedial work
- Interactivity for deeply engaged learning
£39 to £219 per person per month
- Education pricing available
- Free trial available
3 7 4 2 6 2 1 9 7 1 3 9 5 5 8
Wyoming Interactive Ltd
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Our learning management system can be configured to work with different SSO tools, different Human Resource Management applications, separate Document Management Systems and separate Digital Asset Management systems. Or it can work as fully standalone service.|
|Cloud deployment model||
The platform is cloud-based and supports a wide range of browsers. However, some legacy browsers may require additional customisation.
The platform is responsive, however, fall-back content may be required in some contexts depending on the source material.
Linking to external identity management systems, document management systems, and the like, will require additional customisation depending on the extent of integration.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Online ticketing support is provided and acknowledgements are issued near instantly. Response times are generally within 24 hours, Monday to Friday, but can be up to 72 hours at weekend.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Standard support is provided as part of the per-seat licence cost.
Extended support is available, subject to separate contract, depending on requirements. Factors that influence the extended support cost include, number of sites, hours of operations, integrations required, etc.
By separate contract, a technical account manager can be made available, depending on requirements. This is expected to relate more to content generation / learner development rather than platform performance, however the specification is available for discussion.
Happy to support, by separate contract, implant staff from customer organisation to the Wyoming office to learn more about the application and become an in-house expert. Similarly, first line support can be passed over to customer organisation, if desired.
Happy to support 'design days', by separate contract, maximising the impact of content on learner performance. Design days can be organised at customer site, or Wyoming site, as required. Whilst not strictly 'support', design days help to reduce the support burden for organisations by using good design to avoid user learning issues / on-boarding, etc.
|Support available to third parties||Yes|
Onboarding and offboarding
Considerable effort has been invested to create an intuitive environment and Learner Users should require little or no training to user the system. For Content Authors, there is more to learn as they will be creating content for Learner Users. Online training is available to onboard Content Authors.
Also supplied are Job Aids to cover key tasks in curating learning materials. Video walk-throughs are available to cover important processes such as creating new content, publishing content, re-versioning content, running reports, etc.
A documentation pack is provided for new Content Authors and Administrators and conference call sessions, via for example, Webex, are scheduled to bring on these users.
As mentioned under Support, 'design-days' are available, by separate contract, at Wyoming facilities or at customer site. Design days allow Content Authors and Administrators to learn best practice learning design to maximise the use of interactive learning environments, optimise media choices and otherwise smooth the process of transferring new skills to achieve behaviour change. Further, design-days can help Content Authors and Administrators to organise learner materials to suit the different learning needs in their sector, so that the learning environment feels natural to learners - an extension of their work environment.
|Other documentation formats||
|End-of-contract data extraction||A service request is made to Wyoming to extract the data. This is provided in CSV or XML format and delivered securely to a nominated individual. There is no limit to the number of requests that can be made, however, if regular extracts are required, a custom data exchange process can be enabled, by separate contract, to allow Administrator Users to self-serve data extracts.|
There is a per user charge, levied monthly, for all users. Learner Users are charged at a different rate to Content Authors and Administrators. Included in the cost is the ability to create and publish learner materials using content supplied by the client organisation.
Not included services: creating new content forms, the development of custom presentation methods, the generation of third party content either copy, design, video, podcast, webinar or other content materials. Connection to additional services such as document management, collaboration, SSO, etc. are available but at extra cost.
At the end of the contract, the client stops paying on the agreed date, the service becomes unavailable and data is archived. At all times, data concerning learners, their progress through learning materials, is owned by the client and ownership never passes to Wyoming.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The platform is responsive, managing display transitions between different viewport sizes, without users losing capability.
The learner experience has been focused on mobile first design and works well on a wide variety of recent devices.
There are a few features which are easier for users on a desktop, for example, running and viewing reports. The features are available on mobile, but designing reports on small screens can be more challenging. Similarly, content creation is possible on mobile but easier on a larger canvas.
Some complex content designed for desktop may require fallback content for mobile, e.g. tables fallback to cards.
|Description of customisation||
Content to display to learners can be highly customised. Custom question types can be created by expert users to be used by content authors when creating training materials.
The look and feel of the application, images, backgrounds, etc. are able to be customised.
Learner users have no ability to customise the service however, content authors have control over certain elements. Admin users can add custom content types for subsequent use by content author users.
|Independence of resources||The hosting environment is designed to scale to support a wide number of users. Learner interactions are designed to be light-weight and the data payload in most instances is very small. The application design takes this into account and significant effort has been invested to design an application that has low bandwidth requirements and serves content with low latency for all users. Heavy bandwidth content, e.g. Video is offloaded to dedicated video serving platforms, e.g. Vidyard, Vimeo, Brightcode, etc. Organisations concerned about performance can request a custom install instance, segregated from all others, by separate contract.|
|Service usage metrics||Yes|
By default, Google Tag Manager is added to each install, using a fresh account if none provided by client.
At additional cost, the service can be configured to use additional analytics packages.
The service collects data on individual learners, as they progress through learning materials. Depending on the content created by the client, the data collection can be granular, question by question, data. This data can be rolled up to user, territory, job role, institution, and the like, depending on client data model. Additional reporting of learning material suitability is possible, e.g. how well does Q57 work for new users.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Because of the complexity of the data structure, exports are currently enabled by support staff. Contacting Wyoming is the route to access an export.|
|Data export formats||
|Other data export formats||XML|
|Data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||Availability is dependent on cloud service provider, e.g. AWS. There has been no period of unavailability impacting Wyoming with AWS during 2019 (at time of writing, May 6). The application is rigorously tested in a dev environment before any code releases are migrated up to production. We expect very high availability but do not guarantee availability. Any outage experienced by users would result in a refund of licence fees for the period of the outage.|
|Approach to resilience||Considerable time effort has been invested to ensure resilience with data centre partners, e.g. AWS. Details of specific security and resilience measures are available on request.|
Notification services, via email and SMS.
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||We support a number of authentication services. For example, one client uses Gigya as an identity management service and we securely pass-off authentication to the client. Upon successful completion, the application opens for that user. User specific data is stored in the client's domain, not within the application. Training materials and non-personal data, e.g. answers offered, duration of session, etc. are stored in the secure application data store. The authentication method is determined at set-up and configured to suit the requirements of each client.|
|Access restrictions in management interfaces and support channels||
User accounts start off with minimal access rights. Roles can be assigned to some users that allow extended rights, for example, content editing and reporting. For administrators, an admin role can be assigned that allows, for example, the application to be taken offline.
Support channels use granular security to access only those tickets rightfully viewable by users.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||Yes|
|CSA STAR accreditation date||14/05/2016|
|CSA STAR certification level||Level 1: CSA STAR Self-Assessment|
|What the CSA STAR doesn’t cover||We provide planning and consultancy services, which are an associated service to our product engineering and configuration services. The planning and consultancy falls outwith CSA STAR.|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Security access is granted on a job-needed basis and access is retired when the job no longer requires access.
We employ third party penetration test experts to regularly review our installation and procedures.
We adopt client mandated security approaches and procedures on a project by project basis.
A member of the board has responsibility for security governance and the board regularly discuss maintaining cover and protection.
|Information security policies and processes||
We have an information security policy which is regularly reviewed. This is shared with all employees and it is a requirement of employment that employees comply with the policy. The policy has been audited by client organisations and operates across all teams and all projects.
Access to client data is provided on a minimum-required basis, i.e. the minimum access required to conduct a task is provided and no more.
A clear reporting line exists right up to a board member.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
All configuration changes and code releases are managed through a structured process. In many case, we adopt change management processes governed by clients and adopt their systems and reporting tools. If no client-mandated process is required, we strictly adhere to our process of carefully planning changes, testing those changes and validating security prior to migrating through environments to production.
We conduct regular penetration tests using a third party vendor.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Threats are assessed on a case by case basis, depending on severity.
Patches, if required, are deployed at the earliest possible moment but not before ensuring, wherever possibly, that the fix does not have unintended consequences.
Philosophically, we would rather take the service offline for a short period of time, acknowledging the inconvenience this would have, in order to prevent any exposure. Once the situation has been addressed, the system would be activated.
We rely on multiple sources for information on potential threats, including client organisations, third party security professionals, news media and security blogs.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||To be reviewed later|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||To be provided later|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£39 to £219 per person per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Depending on the organisation requirements, we will offer a free trial of seven days, allowing content to be created and tested. Trial will not include integrations, e.g. SSO and will not include custom content generation. One Content Author user and one Learner user role is supported.|