IBM Learning Management System & Learning Content Management System
IBM learning and development solutions provide the technology and services for achieving top employee performance. Within this Service, Premier Partner Portal offers the Smarter Workforce range of products: Learning Management System, Social Learning, Learning Content Management System, Talent Framework. ELS offer transition management and succession planning for end-to-end Change Management.
Features
- Training Delivery: blended-learning material design and educational support
- Learning Management System and Learning Content Management System
- Organisational Design and Development, structures and processes for operational success
- Business Readiness Assessment identifying the organisation’s on-boarding requirements
- Business Process Review identification and prioritization of structures and practices
- Business Process Review and Improvement (BPR&I) Projects management and support
- Project specification analysis report design and project selection criteria statement
- Facilitation of meetings and workshops to develop and record solutions
- Change and transition management end-to-end change agent support services
Benefits
- Deliver specifically tailored blended-learning personnel development solutions
- Reduced need for formal learning courses
- Analyse and design of training solutions for safety critical services
- Return on investment for L&D departments
- On-going support for projects and people in change programmes
- Facilitation and management service requirement definition through user group interaction
- Deliver effective employee learning content that can be reused
- Define organisational transition processes and pathways bringing technology into service
- Change project specification and management of processes
Pricing
£2.12 to £25.92 a user a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 9
Service ID
4 5 2 7 9 4 5 7 3 4 1 0 6 5 3
Contact
Explosive Learning Solutions
ELS Business Development Team
Telephone: 01235 861805
Email: busdev@explosivelearningsolutions.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Learning Management Systems (LMS) and Learning Content Management Systems (LMCS)
- Cloud deployment model
- Public cloud
- Service constraints
- Initial Client discussions will seek to identify any potential contraints
- System requirements
-
- Hosted, Windows-based solution
- End users can access with any OS and browser configuration
- Users can have mobile access.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response to 95% of Incidents within ½ hour for Critical Business Impact incidents and within 1 hour for all others.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.0 AAA
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Learn support is electronic only, offered through our Service Request tool on the Support Portal. Phone support is not available for technical support incidents.
Support is exclusively offered to named callers from the company which has purchased the product, not to end users. As long as the customer agrees for the third party to have access to their ICN, they can be a named contact for the customer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- ELS and IBM are stood by to assist in all aspects of adopting a LMS or LMCS, as well as wider Change requirements and training services.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Microsoft Word
- Powerpoint
- End-of-contract data extraction
- CSV, Excel and other formats
- End-of-contract process
-
IBM Kenexa LCMS Premier on Cloud Author includes the Author function that enables development of reusable content in a collaborative environment for multi-modal delivery; manages and reuses content
with searching, client-based metadata, dynamic taxonomy, object tracking, and reporting capabilities; can import, tag, track, and manage external, or legacy, content; and can author content for single-sourcing.
This Cloud Service includes entitlement to one production site and one non-production site (i.e. a staging site).
Optional Features for LCMS Premier on Cloud Author (available after initial implementation services) include:
- Cloud Dynamic Delivery - Allows e-learning to be delivered directly from LCMS using AICC standards or other supported methods.
- Cloud Additional Report - Provides an additional report beyond the included standard supported reports.
- Additional Authoring Template - Provides one additional template that contains standards for authoring content in support of specific Customer requirements.
- Additional Microsoft Content Conversion - Provides one additional mapping file that enables the importing and conversion of a specified formatted Word or PowerPoint file into native LCMS format
- Additional Language
- Additional Non-Production Hosted Site - Entitles the client to an additional staging site they can use for internal testing or training purposes
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The Hot Lava Mobile Delivery Engine for publishing mobile content, editing user permissions for access, and tracking delivery of mobile content.
- Accessibility standards
- WCAG 2.0 AAA
- Accessibility testing
- WCAG (Web Content Accessibility Guidelines) and W3C (World Wide Web Consortium) Compliance has been added to ForceTen 5.0.
- API
- Yes
- What users can and can't do using the API
-
Get going fast on any device, anywhere-
With no programming required, you can quickly configure administration, manager and learning environments, taking the cost out of implementation and maintenance. Built-in wizards make complex administration, such as ad-hoc reports, course imports and auto-enrolments, a breeze. And on the front end, the system makes it easy to support multiple audiences and administrations personalising the experience for everyone. Plus you can access the system anytime, on any device. IBM Kenexa LMS supports desktop and mobile learners, with tracking and delivery support for any basic cell phone, smart phone or tablet.
Empower your users- With IBM Kenexa LMS, we offer learners, managers and administrators capabilities that make the learning experience a positive one. For learners, our simple searches, easy enrolment, personal education plans and progress tracking make formal, social and mobile learning a breeze. Our solution allows managers access to enable automated enrolment and progress monitoring to track learning of direct reports. Administrators can manage eLearning, mobile and instructor-led content, and quickly customise the interface by enabling only needed features. Plus with such an easy-to-use system, you can be sure that end-user support requirements will be reduced and administrative functions will be broadly shared. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
With no programming required, you can quickly configure administration, manager and learning environments, taking the cost out of implementation and maintenance. Built-in wizards make complex administration, such as ad-hoc reports, course imports and auto-enrolments, a breeze. And on the front end, the system makes it easy to support multiple audiences and administrations personalising the experience for everyone. Plus you can access the system anytime, on any device. IBM Kenexa LMS supports desktop and mobile learners, with tracking and delivery support for any basic cell phone, smart phone or tablet. This allows you to start delivering content to a variety of devices and users in no time.
Administrators can manage eLearning, mobile and instructor-led content, and quickly customise the interface by enabling only needed features. Plus with such an easy-to-use system, you can be sure that end-user support requirements will be reduced and administrative functions will be broadly shared.
Scaling
- Independence of resources
- IBM Kenexa is one of the most used learning management systems in the World and support.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Ad hoc reporting to generate custom success metrics including content utilization, organizational readiness and learner compliance.
•Data drill-downs to review test scores, determine proficiencies and identify learning gaps.
•Provides e-commerce capabilities, when training is a business, including discounts at an organizational or learner level, and the option to purchase an entire catalog at a discount.
•Integration with LDAP and HRS using out-of-the-box tools. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- IBM Kenexa LMS/LCMS
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Typically in CSV or Excel format but other formats are available
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel Spreadsheets
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel spreadsheets
- Specified formatted Word or PowerPoint file
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
ELS & IBM provides the availability service level agreement (“SLA”) for the Cloud Service as specified in its in the Transaction Document.
This would work based on Availability credits being awarded at 5% if Availability falls below 99.2% to 93%, and 10% credits if Availability falls below 93%.
Availability, expressed as a percentage, is calculated as: the total number of minutes in a Contracted Month minus the total number of minutes of Downtime in a Contracted Month divided by the total number of minutes in a Contracted Month. - Approach to resilience
- This can be made available on request
- Outage reporting
-
All fault reporting is via the IBM Support portal. This site provides access to the troubleshooting knowledge base, product and technical documents, support incident tracking system, FAQs, demonstrations of common functions, and more.
Severity 1 issue reports can be reported to IBM 24 hours a day, 7 days a week. Severity 1 issues are defined as: "A business critical software component is inoperable across all clients, or the service is down for all clients. This only applies to a production environment and indicates you are unable to use the program, resulting in a critical impact on operations." If IBM hosts your licensed software in our managed hosting facilities, our objective is to have a technical expert contact you within 1 actual hour of receiving your support incident. For all other SaaS customers, our objective is to have a technical expert respond to you within 2 business hours of receiving your incident.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. All connections are encrypted channels when accessing client data.
There is no usage of WIFI within the IBM data centers that support this Cloud Service. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Can be provided on request
- ISO/IEC 27001 accreditation date
- Can be provided on request
- What the ISO/IEC 27001 doesn’t cover
- Can be provided on request
- ISO 28000:2007 certification
- Yes
- Who accredited the ISO 28000:2007
- Can be provided on request
- ISO 28000:2007 accreditation date
- Can be provided on request
- What the ISO 28000:2007 doesn’t cover
- Can be provided on request
- CSA STAR certification
- No
- PCI certification
- No
- Other security accreditations
- Yes
- Any other security accreditations
-
- SAML 2.0
- ISO 9000
- List X (UK MoD)
- SSL
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance accreditation
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s SafeHarbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
- Information security policies and processes
-
Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process
and are separately reviewed by the IBM security staff before implementation. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly
conducted by authorized administrators to help detect and resolve potential system security exposures.
Anti-virus detectionsystems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples
include HTTPS/SFTP/FTPS. Backup data intended for off-site storage is encrypted prior to transport.
ELS are fully conversant with the requirement to secure the Confidentiality, Integrity and Availability of Government information. Access control policies will be applied on a 'need to know' and project specific basis. The ELS IT network and assets have been certified compliant to Cyber Essentials and Cyber Essentials +. Where appropriate, these requirements will be flowed down to 3rd party suppliers engaged on Government projects issued to ELS.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and Oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers. Assessments and audits are conducted regularly to confirm compliance with its information security policies. Workforce security education and awareness training is completed by IBM’s employees and vendor employees on an annual basis. Personnel are reminded of their job objectives and their responsibility to meet ethical business conduct, confidentiality, and security obligations on annual basis
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- IBM certifies its privacy practices annually as consistent with the U.S. Department of Commerce’s Safe Harbor Principles: Notice, Choice, Onward Transfer, Access and Accuracy, Security, and oversight/Enforcement. Industry standard audit SSAE 16 Type (formerly SAS 70), or equivalent, is performed annually in our production data centers.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £2.12 to £25.92 a user a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Guest access to a 'sandbox' environment can be provided to evaluate parts of the service
Documents
- Pricing document
- Pricing document
- Skills Framework for the Information Age rate card
- Skills Framework for the Information Age rate card
- Service definition document
- Service definition document
- Terms and conditions document
- Terms and conditions document