Explosive Learning Solutions

IBM Learning Management System & Learning Content Management System

IBM learning and development solutions provide the technology and services for achieving top employee performance. Within this Service, Premier Partner Portal offers the Smarter Workforce range of products: Learning Management System, Social Learning, Learning Content Management System, Talent Framework. ELS offer transition management and succession planning for end-to-end Change Management.

Features

  • Training Delivery: blended-learning material design and educational support
  • Learning Management System and Learning Content Management System
  • Organisational Design and Development, structures and processes for operational success
  • Business Readiness Assessment identifying the organisation’s on-boarding requirements
  • Business Process Review identification and prioritization of structures and practices
  • Business Process Review and Improvement (BPR&I) Projects management and support
  • Project specification analysis report design and project selection criteria statement
  • Facilitation of meetings and workshops to develop and record solutions
  • Change and transition management end-to-end change agent support services

Benefits

  • Deliver specifically tailored blended-learning personnel development solutions
  • Reduced need for formal learning courses
  • Analyse and design of training solutions for safety critical services
  • Return on investment for L&D departments
  • On-going support for projects and people in change programmes
  • Facilitation and management service requirement definition through user group interaction
  • Deliver effective employee learning content that can be reused
  • Define organisational transition processes and pathways bringing technology into service
  • Change project specification and management of processes

Pricing

£2.12 to £25.92 per user per year

  • Free trial available

Service documents

G-Cloud 9

452794573410653

Explosive Learning Solutions

James Convery

01235 861805

jconvery@explosivelearningsolutions.com

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Learning Management Systems (LMS) and Learning Content Management Systems (LMCS)
Cloud deployment model Public cloud
Service constraints Initial Client discussions will seek to identify any potential contraints
System requirements
  • Hosted, Windows-based solution
  • End users can access with any OS and browser configuration
  • Users can have mobile access.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response to 95% of Incidents within ½ hour for Critical Business Impact incidents and within 1 hour for all others.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AAA
Phone support No
Web chat support No
Onsite support No
Support levels Learn support is electronic only, offered through our Service Request tool on the Support Portal. Phone support is not available for technical support incidents.
Support is exclusively offered to named callers from the company which has purchased the product, not to end users. As long as the customer agrees for the third party to have access to their ICN, they can be a named contact for the customer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started ELS and IBM are stood by to assist in all aspects of adopting a LMS or LMCS, as well as wider Change requirements and training services.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Microsoft Word
  • Powerpoint
End-of-contract data extraction CSV, Excel and other formats
End-of-contract process IBM Kenexa LCMS Premier on Cloud Author includes the Author function that enables development of reusable content in a collaborative environment for multi-modal delivery; manages and reuses content
with searching, client-based metadata, dynamic taxonomy, object tracking, and reporting capabilities; can import, tag, track, and manage external, or legacy, content; and can author content for single-sourcing.
This Cloud Service includes entitlement to one production site and one non-production site (i.e. a staging site).
Optional Features for LCMS Premier on Cloud Author (available after initial implementation services) include:
- Cloud Dynamic Delivery - Allows e-learning to be delivered directly from LCMS using AICC standards or other supported methods.
- Cloud Additional Report - Provides an additional report beyond the included standard supported reports.
- Additional Authoring Template - Provides one additional template that contains standards for authoring content in support of specific Customer requirements.
- Additional Microsoft Content Conversion - Provides one additional mapping file that enables the importing and conversion of a specified formatted Word or PowerPoint file into native LCMS format
- Additional Language
- Additional Non-Production Hosted Site - Entitles the client to an additional staging site they can use for internal testing or training purposes

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The Hot Lava Mobile Delivery Engine for publishing mobile content, editing user permissions for access, and tracking delivery of mobile content.
Accessibility standards WCAG 2.0 AAA
Accessibility testing WCAG (Web Content Accessibility Guidelines) and W3C (World Wide Web Consortium) Compliance has been added to ForceTen 5.0.
API Yes
What users can and can't do using the API Get going fast on any device, anywhere-
With no programming required, you can quickly configure administration, manager and learning environments, taking the cost out of implementation and maintenance. Built-in wizards make complex administration, such as ad-hoc reports, course imports and auto-enrolments, a breeze. And on the front end, the system makes it easy to support multiple audiences and administrations personalising the experience for everyone. Plus you can access the system anytime, on any device. IBM Kenexa LMS supports desktop and mobile learners, with tracking and delivery support for any basic cell phone, smart phone or tablet.
Empower your users- With IBM Kenexa LMS, we offer learners, managers and administrators capabilities that make the learning experience a positive one. For learners, our simple searches, easy enrolment, personal education plans and progress tracking make formal, social and mobile learning a breeze. Our solution allows managers access to enable automated enrolment and progress monitoring to track learning of direct reports. Administrators can manage eLearning, mobile and instructor-led content, and quickly customise the interface by enabling only needed features. Plus with such an easy-to-use system, you can be sure that end-user support requirements will be reduced and administrative functions will be broadly shared.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation With no programming required, you can quickly configure administration, manager and learning environments, taking the cost out of implementation and maintenance. Built-in wizards make complex administration, such as ad-hoc reports, course imports and auto-enrolments, a breeze. And on the front end, the system makes it easy to support multiple audiences and administrations personalising the experience for everyone. Plus you can access the system anytime, on any device. IBM Kenexa LMS supports desktop and mobile learners, with tracking and delivery support for any basic cell phone, smart phone or tablet. This allows you to start delivering content to a variety of devices and users in no time.
Administrators can manage eLearning, mobile and instructor-led content, and quickly customise the interface by enabling only needed features. Plus with such an easy-to-use system, you can be sure that end-user support requirements will be reduced and administrative functions will be broadly shared.

Scaling

Scaling
Independence of resources IBM Kenexa is one of the most used learning management systems in the World and support.

Analytics

Analytics
Service usage metrics Yes
Metrics types Ad hoc reporting to generate custom success metrics including content utilization, organizational readiness and learner compliance.

•Data drill-downs to review test scores, determine proficiencies and identify learning gaps.

•Provides e-commerce capabilities, when training is a business, including discounts at an organizational or learner level, and the option to purchase an entire catalog at a discount.

•Integration with LDAP and HRS using out-of-the-box tools.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold IBM Kenexa LMS/LCMS

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Typically in CSV or Excel format but other formats are available
Data export formats
  • CSV
  • Other
Other data export formats Excel Spreadsheets
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel spreadsheets
  • Specified formatted Word or PowerPoint file

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability ELS & IBM provides the availability service level agreement (“SLA”) for the Cloud Service as specified in its in the Transaction Document.

This would work based on Availability credits being awarded at 5% if Availability falls below 99.2% to 93%, and 10% credits if Availability falls below 93%.

Availability, expressed as a percentage, is calculated as: the total number of minutes in a Contracted Month minus the total number of minutes of Downtime in a Contracted Month divided by the total number of minutes in a Contracted Month.
Approach to resilience This can be made available on request
Outage reporting All fault reporting is via the IBM Support portal. This site provides access to the troubleshooting knowledge base, product and technical documents, support incident tracking system, FAQs, demonstrations of common functions, and more.
Severity 1 issue reports can be reported to IBM 24 hours a day, 7 days a week. Severity 1 issues are defined as: "A business critical software component is inoperable across all clients, or the service is down for all clients. This only applies to a production environment and indicates you are unable to use the program, resulting in a critical impact on operations." If IBM hosts your licensed software in our managed hosting facilities, our objective is to have a technical expert contact you within 1 actual hour of receiving your support incident. For all other SaaS customers, our objective is to have a technical expert respond to you within 2 business hours of receiving your incident.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. All connections are encrypted channels when accessing client data.
There is no usage of WIFI within the IBM data centers that support this Cloud Service.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Can be provided on request
ISO/IEC 27001 accreditation date Can be provided on request
What the ISO/IEC 27001 doesn’t cover Can be provided on request
ISO 28000:2007 certification Yes
Who accredited the ISO 28000:2007 Can be provided on request
ISO 28000:2007 accreditation date Can be provided on request
What the ISO 28000:2007 doesn’t cover Can be provided on request
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • SAML 2.0
  • ISO 9000
  • List X (UK MoD)
  • SSL

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s SafeHarbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
Information security policies and processes Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process
and are separately reviewed by the IBM security staff before implementation. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly
conducted by authorized administrators to help detect and resolve potential system security exposures.
Anti-virus detectionsystems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples
include HTTPS/SFTP/FTPS. Backup data intended for off-site storage is encrypted prior to transport.

ELS are fully conversant with the requirement to secure the Confidentiality, Integrity and Availability of Government information. Access control policies will be applied on a 'need to know' and project specific basis. The ELS IT network and assets have been certified compliant to Cyber Essentials and Cyber Essentials +. Where appropriate, these requirements will be flowed down to 3rd party suppliers engaged on Government projects issued to ELS.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers. Assessments and audits are conducted regularly to confirm compliance with its information security policies. Workforce security education and awareness training is completed by IBM’s employees and vendor employees on an annual basis. Personnel are reminded of their job objectives and their responsibility to meet ethical business conduct, confidentiality, and security obligations on annual basis
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £2.12 to £25.92 per user per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Guest access to a 'sandbox' environment can be provided to evaluate parts of the service

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑