IBM Kenexa Assessments
An expansive portfolio of assessments that assess innate traits, learned skills, and job, culture, organisational fit for individuals, managers, and leaders. Includes solutions for both selection (pre-hire) and developmental (post-hire) needs. Designed to predict, for example, performance, turnover, engagement and solve unique challenges such as hire quality and process efficiency.
- Content library with over 200,000 cognitive, personality and behavioural items
- Library of 1,500+ Skills Assessments
- Measure skills, culture, fit, motivation, ability, personality, and situational judgment
- Adjusts to fit screen size for computers, tablets and mobile
- Delivered via Highly Configurable Cloud Platform Including Reports
- 160+ Business Psychologists for adapted or bespoke design
- Computer adaptive testing available
- Supports client branding for an applicant’s engaging experience
- Proven ROI
- Available in Multiple Languages
- Predictive assessments that reduce recruitment costs and time to hire
- Provide realistic job previews to set realistic role expectations
- Identifying high-potential candidates with validated results drives hire quality
- Identifies needs and learning styles for accelerated onboarding and development.
- Accurately identifies top talent that has potential and will perform
- Allows sifting through large volumes of applicants efficiently and effectively
- Ensures the retention of the best and brightest
- Supports the building of a leadership pipeline
- Helps create a standardised, fair and valid process
- Provide exceptional candidate experience through combining tests in one sitting
£15.34 to £356.00 per unit per year
- Free trial available
IBM United Kingdom Ltd
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||IBM Kenexa Assessments are cloud-based, and can be deployed as stand-alone, or integrated with IBM Kenexa Talent Acquisition Suite (including IBM Kenexa BrassRing on Cloud), or multiple third-party providers. The highly configurable assessment platform offers excellent user-interface, seamless digital experiences, a substantial content library and intuitive reporting.|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Severity 1 - Within 1 business hour
Severity 2 - Within 2 business hours
Severity 3 - Within 1 business day
Severity 4 - Within 2 business days
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Standard Global Support Center Model – The Help Desk of our Global Support Center (GSC) provides the first line of technical support. Customers funnel support requests through a limited number of employees who serve as their designated contacts with our GSC. (No extra charge)
Outsourced Support Model – In our standard support model, customers funnel support requests through a small number of employees who serve as your designated contacts with the Global Support Center. In the outsourced support model, the GSC will serve as your internal help desk for all employees. (No extra charge)
(Optional) Named GSC Resource – If a client purchases a Named Resource, requests that require assistance beyond the initial support call will be handled by a named individual who will assist with all client escalations and will maintain proactive contact with client.
For larger contracts: In addition to the Help Desk, an IBM Client Success Manager (CSM) will serve as the main point of contact regarding ongoing satisfaction with the product (no extra charge). An optional arrangement may be scoped for a customer to have a dedicated CSM can work on site.
|Support available to third parties||No|
Onboarding and offboarding
Dependent on the type and volume of assessments and the scope of the project (off the shelf / bespoke / integrated etc.), IBM can provide in-person and telephone/webinar training regarding the competencies that are being measured, how to interpret the assessment results, and how to use the results as a basis for developmental planning after a candidate is hired. All training offerings are delivered by IBM in English.
Interpretation training involves a summary review of the validity behind the tool, how the overall score and subscale scores are calculated, and what individual candidate profiles look like. Time is spent on establishing cutoff (or minimum qualification) scores for your organisation.
Where applicable (when Assess is integrated) we can provide functionality training for users of the Assess platform. This includes how to create and edit administrator accounts, how to administer assessments remotely (via email) or locally (in a proctored setting), and how to search for results and run report queries. Additional areas covered include how to change or reset passwords and how to access the online Quick Reference Guide and assessment descriptions.
We can also provide Level A/B Testing at an additional cost.
|End-of-contract data extraction||IBM will return customer data in the CSV format via a secure FTP server.|
The term of the Cloud Service begins on the date IBM notifies the client of their access to the Cloud Service, as documented in the Proof of Entitlement Document (PoE). The PoE will specify whether the Cloud Service renews automatically, proceeds on a continuous use basis, or terminates at the end of the term. For automatic renewal, unless the client provides written notice not to renew at least 90 days prior to the term expiration date, the Cloud Service will automatically renew for the term specified in the PoE. For continuous use, the Cloud Service will continue to be available on a month to month basis until Client provides 90 days written notice of termination. The Cloud Service will remain available to the end of the calendar month after such 90-day period.
Numerous factors are taken into consideration when determining IBM Talent Management software and implementation pricing fees and annual subscription fees. The software subscription fee and implementation fee is primarily determined by overall employee size and scope of the project. Discount levels are provided for term of contract and for customers purchasing multiple solutions.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The features and functions of IBM Talent Management solutions can be rendered for mobile platforms (iOS, Android, Blackberry) and do not require an app for access.|
|What users can and can't do using the API||Assess provides an API that is used by BrassRing to create assessment sessions and request reports and results from Assess. The API consists of a number of method calls: Request Assessment List, Request a Session, Request Results, Request Session Status, and Retrieve Report. The APIs or web services are based on the REST protocol.|
|API documentation formats|
|API sandbox or test environment||No|
|Description of customisation||
Individual Assessments: Many of our off the shelf assessments can be customised for clients. We are also able to design assessments from scratch to meet individual requirements.
Assess Platform: During implementation, IBM works with clients to complete a specifications form. This form is used to initially configure the system for rollout. After rollout, client system administrators are trained to update or modify configurations on behalf of the organization.
|Independence of resources||We have employed a modular and redundant design for the IBM assessment system. The system is fully scalable on an ongoing basis, and our load-balanced application server architecture gives us the ability to grow rapidly to meet any demand.|
|Service usage metrics||Yes|
The system is continuously monitored and tested regularly by the Performance Testing team in a dedicated test environment.
Cloud Operations uses a combination of third-party and internal monitoring to ensure the integrity of production sites. The production site undergoes continuous monitoring of performance through the use of tools that provide real-time monitoring of response times and issue alerts when important performance thresholds are reached. Members of the product team use tools to continuously watch performance in real time.
The Quality Assurance and Performance Engineering teams evaluate the performance of each application suite build. Performance testing focuses on evaluating response times.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Other data at rest protection approach||
Field Level Encryption: Assess offers field-level 128-bit AES encryption.
Database encryption: Assess: Passwords are hashed in the database using SHA-512.
Backup encryption: All backups for all IBM Talent Management solutions is encrypted.
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||IBM will return customer data in the CSV format via a secure FTP server.|
|Data export formats||Other|
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
|Other protection within supplier network||
While all data is encrypted in public transit, not all internal traffic between tiers is encrypted. Where interfaces between tiers are not encrypted, internal traffic is secured using firewalled networks.
Logical segregation: IBM segregates customer data logically using unique client IDs that prevent other customers from accessing a client’s data.
Field-level encryption: Assess offers field-level 128-bit AES encryption.
Database encryption: Passwords are hashed in the database using SHA-512.
Availability and resilience
|Guaranteed availability||IBM provides SLAs for availability in our standard agreement. For most IBM Talent Management applications, we agree to deliver 99.2% or better system uptime within each calendar month, excluding scheduled downtime for regular maintenance. Should availability fall below the 99.2% threshold in a calendar month, we offer prorated credits of the applicable service fee for that month as the sole remedy. The Service Description for each offering details whether this standard SLA for availability is provided.|
|Approach to resilience||Cloud Operations support personnel are on call to maintain availability. Critical components are protected against failure through redundancy where available. Failover-capable components are used where available. Non failover-capable components are provisioned with stand-by equipment where possible. Cloud Operations deploys tools to monitor network, system, and application components. Components are monitored with alerts of failed components being issued to Cloud Operations support personnel. Under normal operating conditions, response is usually within 15 minutes of the failure alert.|
IBM can notify users immediately of any maintenance or downtime via email and upon access, and also notify users by email when the system is available again.
When the system is down—for example, during regular system maintenance—a message regarding the outage will be posted at the login page. Note that downtime messages can be configured by our customers.
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Single sign-on is an option for all IBM Talent Management SaaS solutions.|
|Access restrictions in management interfaces and support channels||
IBM limits access to customer data to personnel with a business need to know. Various security mechanisms control access to those authorized, with application access controlled through our centralized “gatekeeper” process. Access requests are tracked through the IBM Control Desk. Anyone who has access to customer data is either an employee who signs a confidentiality agreement or, rarely, a consultant or third party who has agreed contractually to protect the privacy of our data.
System access is controlled at the server, database, application, and network levels. The Cloud Operations, Database Administration, and Software Configuration Management teams have standing access.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Bureau Veritas Certification Holding SAS – UK Branch|
|ISO/IEC 27001 accreditation date||IBM’s ISO 27001 certificate for the IBM Talent Management SaaS applications was renewed in Q4 2015.|
|What the ISO/IEC 27001 doesn’t cover||
The following ISO 27001 controls were deemed not applicable because they are managed by our data centres.
- Section A.11 Secure Areas
- Section A.11.2 Equipment
All other ISO controls in sections 5 through 18 were covered in the IBM Talent Management SaaS applications audit. The controls under the two sections referenced above are covered in the ISO 27001 certification for the data centres in question and are addressed through data centre management controls rather than application controls.
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Audit for compliance with SOC 2 standards annually|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
IBM has an information technology (IT) security policy that establishes the requirements for the protection of IBM's worldwide IT systems and the information assets they contain, including networks and computing devices such as servers, workstations, host computers, application programs, web services, and telephone systems within the IBM infrastructure.
IBM’s IT security policy is supplemented by standards and guidelines, such as the Security Standards for IBM's Infrastructure, the Security and Use Standards for IBM Employees and the Security Guidelines for Outsourced Business Services. Our security policies and standards/guidelines are reviewed by a cross-company team led by the IT Risk organization at least annually.
The offices of the Chief Privacy Officer (CPO) and Vice President of IT Security collaborate regarding protection of data. The information security policy is enforced through protocols, regularly scheduled certification processes, technological controls, and management and staff dedication.
Our “Data Security and Privacy Principles for IBM Cloud Services” is available on IBM’s public website at https://ibm.biz/BdHtui. In addition, IBM provides clients with product-specific information systems security overviews.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
The development and security of SaaS applications follows industry standards. Standards-based processes are built into every step of the SDLC for products. Product teams use OWASP guidelines, SANS and IBM standards for web application security and review source code using a reputable standardized tool. Applications undergo annual security assessments and periodic independent application and infrastructure penetration and vulnerability testing.
Products are upgraded with new functionality on a regular release cycle. Major releases includes functionality added in minor builds and projects timed specifically for the release.
Notification for any visible change is completed before each build, and client enablement is provided.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
IBM conducts regular internal application and network scans and have engaged a third party to perform regular application scans. All critical findings are remediated to close.
The installation of patches and updates to the operating system is controlled and centrally managed. Patches are deployed either during regularly scheduled downtime or, for serious threats, fast tracked to prevent exploitation of the vulnerability. All patches and updates undergo QA testing prior to general installation.
All IBM systems and workstations are protected by antivirus software that performs real-time scans. Updates to virus definitions are checked and installed automatically on a daily basis.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||The Hosting Environment has redundant firewalls at its perimeter. Inbound firewall security policy limits access to essential services necessary to access application functionality and to remotely manage the systems. All other types of traffic are denied. A network-based intrusion detection system is enabled and a reputable managed service provider provides monitoring, correlation, and notification to the Cloud Information Security and Cloud Operations teams.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
The IBM data incident response process serves to properly report and retain documentation for events, begin remediation, discover root causes, learn lessons, and prevent similar occurrences.
IBM has a Computer Emergency Response Team (CERT) which encompasses each department’s role based on the incident. The team is composed of specifically trained and equipped employees who, working with the software business teams and other subject matter experts manage an incident until resolution.
Should an incident occur while a client’s information is in IBM's possession, the client is notified of security breaches of customer data within two business days.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£15.34 to £356.00 per unit per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||We do not provide a free trial of the product. However, we do provide demonstration versions of the assessments to allow our clients to see the types of questions, how the questions are configured and how they are randomised to prevent cheating and ensure validity.|