WORKABLE

Workable Applicant Tracking System (ATS)

Workable is a SAAS company that provides an Applicant Tracking System that enables you to Find, Evaluate and Automate. Apart from the software itself, support and guidance are provided with both actively (dedicated account manager, onboarding) and passively (24/7 availability of support team, constant improvements and updates).

Features

  • Find - Find more ways, to find more candidates
  • Evaluate - What you need to interview and evaluate applicants
  • Automate - Workable automates process and manual tasks

Benefits

  • Reach as many potential candidates as possible.
  • Make the right hire through evaluations and interviews.
  • Reduce manual tasks and speed up processes of hiring.

Pricing

£99.00 a person

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hugh@workable.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

4 8 0 6 2 5 9 8 6 0 9 5 8 7 5

Contact

WORKABLE RFP Desk
Telephone: 02038268149
Email: hugh@workable.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
We undergo scheduled maintenance frequently at off-peak times.
System requirements
Latest two generations of most popular web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our average response time for working hours is 23 minutes, may be longer during weekends or holidays.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
We provide each customer with a dedicated Account Manager and access to our award-winning support team, available 24/7 via email, and during working hours, through telephone.
Support available to third parties
No

Onboarding and offboarding

Getting started
Initial set-up with Workable only takes a matter of hours, we also offer our full implementation package with a dedicated Account Manager. Our schedule usually takes around 4-6 weeks for full implementation and initial training through online sessions. Each week we will take you through various aspects and features of the platform, so you can start making the most out of your Workable account! During the kick-off call, we will walk through your account and plan the rest of the implementation process depending on your needs. We will also check-in regularly during the set-up and are available to help anytime to answer any questions. In the case of custom setups, we will involve our technical team to assist in any of these matters. We will also hold online training sessions and run final checks towards the end of the implementation process. We also make available the use of our blogs, webinars, instruction pages.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Whilst off-boarding, you may request a full extract of your data.
End-of-contract process
At the end of the contract, if no actions are taken, the account will expire. You may choose to downgrade to the read-only access if you wish. At this point, we can also provide you with full data export for no additional fee.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our dedicated award-winning mobile application has all the basic features necessary to progress your hiring whilst away from the office. Some more advanced features may not be accessible from the mobile app.
Service interface
No
API
Yes
What users can and can't do using the API
If you need to display your positions in different ways, or to extract additional information from your Workable account, we provide you with an API that gives you full control over your data.

The Workable API can be used in the following ways:

Extract information about your:
- account
- hiring members and recruiters
- pipeline stages
- jobs and questions
- scheduled events
- job's and/or candidate's activity

Manage your candidates by:
- Fetching candidates
- Extracting detail candidate info
- Creating candidates
- Updating candidates
- Execute various actions on candidates e.g. copy, relocate or disqualify
- Adding comments or ratings

Currently we do not support the following:
- Creating and viewing candidates in the Talent pool
- Offers
- Requisitions
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Workable provides robust functionality wrapped up in a very intuitive and user-friendly interface that is vastly adopted by Recruiters, HR managers and hiring managers alike. Our hosting providers (Google Cloud and AWS), are recognised and industry-leading and help us support customers of all sizes, whilst holding the capability to scale-up, when necessary.

Analytics

Service usage metrics
Yes
Metrics types
Workable offers an extensive Report Centre where you can see and demonstrate the value of the recruiting process. Recruiting metrics and reports help you prove business value.
We offer an extensive range of reports for you to view or export. We break our reviews down into two sections. Our Status Reports are current analytics to discover any bottlenecks, assess hiring managers, find urgent positions and realise your best sources for hires. Our Historical Reports enable you to analyse the effectiveness of your hiring team and recruitment process by displaying the duration of ads, open positions, filled positions and sourcing metrics.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
You may request a data export from your account manager.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee a 99.8% uptime excluding scheduled maintenance. We do not have a standard SLA, but one may be provided if necessary.
Approach to resilience
Available upon request
Outage reporting
We report service outages through our public dashboard and email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Only authorized Workable employees are given access to the resources that are required for their role, following the principle of least privilege. Access to data/systems/services is strictly on a need-to-know basis. There are stringent processes put in place to limit access to authorized personnel only.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISOQAR
ISO/IEC 27001 accreditation date
01/03/2018
What the ISO/IEC 27001 doesn’t cover
Outsourced development.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information security policies and procedure provide guidance on a number of areas relating to information security, including but not limited to:

Access Control Policy
Document Control Policy
Information Classification Policy
Acceptable Use Policy
Privacy Policy
IT SOP
Backup Policy
Mobile Device Policy
Incident Management, Nonconformity and Corrective Action Policy
Customer Data, Partners and Supplier Management Policy
Physical and Environmental Policy
Clear Desk Clear Screen Policy

We have dedicated procedures and guidelines to ensure that all processes and policies are followed correctly.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Workable maintains and updates an effective Change Request procedure to ensure that modifications on critical systems, services and applications are:
• Subject to an approval step
• Documented

The procedure has a determined workflow; the way and means through which the procedure is executed, ensure that:
• All steps are performed in the correct order
• All actions are logged
• All information is valid
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Workable invests in technical security assessments (web application pen testing, manual source code review, configuration audit, etc.), performed by third-party security expert companies. In parallel, our security team performs red teaming activities such as web application penetration tests, system/network vulnerability assessments and static code reviews on a regular basis. The outcomes are evaluated and an action plan dispatched across all affected teams in order to mitigate all potential vulnerabilities according to their risk.
Protective monitoring type
Undisclosed
Protective monitoring approach
We maintain an extensive, centralized logging environment in our production environment. Pertaining to security, monitoring, availability and access, and other metrics about our application ecosystem and microservices.
These logs are analyzed for security events and abnormalities via logical and technical controls. Furthermore, alerts and monitors are automatically notifying appropriate internal teams, thus ensuring visibility and responsiveness.

We have an incident management policy and procedure in place to effectively handle and address any disruption to data availability, integrity or confidentiality. Should a situation arise, we'll notify you and any applicable regulator of a suspected data breach according to our privacy policy.
Incident management type
Undisclosed
Incident management approach
We have an Incident reporting and corrective action procedure in place. This procedure defines our actions in such scenarios, vaguely:
- Preparation
- Identify
- Assess
- Respond
- Recover
- Learn Lessons
- Evidence retention.

Users may contact Workable to report on any incidents and we make public any relevant incidents through our status page.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£99.00 a person
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
With our free trial, you can post a job in minutes and quickly fill your pipeline with qualified candidates, schedule interviews, gather feedback, make offers and more! Limited to one job and the trial has a limit of 15 days.
Link to free trial
https://www.workable.com/free-trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hugh@workable.com. Tell them what format you need. It will help if you say what assistive technology you use.