Agylia Group Ltd

Agylia Learning Services: eLearning Creation

Bespoke eLearning, microlearning and digital learning content creation, covering a full range of subject areas. Individual courses or entire curricula designed and developed using responsive technologies for desktop, tablet and mobile delivery. Optional re-engineering of existing learning content.


  • Designed and developed using responsive technologies
  • SCORM 1.2 and Experience API (Tin Can) compliant
  • Content types: text, images, audio, animation, interactions and quizzes
  • Incorporated assessments to validate learning
  • Accessible on a variety of internet browsers
  • Full localisation options available
  • Fully disability enabled
  • Augmented with optional multimedia documents and eBooks
  • Review tools for effortless and tracked reviews
  • Delivery via a Learning Management System


  • Bespoke eLearning to meet user’s needs
  • Train staff / people in your community effectively
  • Improve staff performance with relevant training
  • Accurate training to assist staff and improve productivity
  • Fully branded for familiar look and feel
  • Encourage use of training resources with gamification options
  • Reduced travel costs and time away from job for training
  • Collaborative production for quick delivery
  • eLearning accessible on PCs, laptops, tablets and smartphones
  • Easy to update, future proofing training


£13000 per unit

Service documents


G-Cloud 11

Service ID

6 2 4 3 8 9 1 6 0 3 3 3 2 2 0


Agylia Group Ltd

Tim Buff

01454 269222

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to The eLearning content can be delivered via the Agylia Learning Management System (LMS).
Cloud deployment model Public cloud
Service constraints Agylia can provide support for customers using the Opera web browser. Costs for Opera support shall be agreed in advance.
System requirements
  • Internet Explorer 6 - 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Agylia will acknowledge issues reported to the Help Desk within 2 hours during standard United Kingdom business working hours (9:00am to 5:00pm).

Weekends and United Kingdom bank holidays can take longer.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Whilst subscribed to the service, customers will have access to standard support, which includes access to the Agylia Help Desk, user forums, FAQs, online training content, plus email and telephone support.

Agylia support services are available during standard United Kingdom business working hours (9:00am to 5:00pm), excluding weekends and United Kingdom bank holidays.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Agylia Learning Services' eLearning content can typically be live within 8 - 10 weeks* of contracting, once requirements are confirmed. *Subject to the timely supply by the customer of items including; source materials (Word and PowerPoint documents) subject matter expertise / content, branding guidelines, media (imagery and videos) and personnel for project review and approval. Agylia Learning Services will work with customers to agree a successful, fully project managed process.
In the event of a requirement to leave the service in the future, Agylia Learning Services commit to a full off-boarding process.
Service documentation No
End-of-contract data extraction Should the eLearning content be hosted on the Agylia Learning Management System: customer administrators can extract their company’s and employees’ data at the end of contract, by using the Agylia administration portal. This includes user data, content, and user learning history. A request at end of contract can also be made to Agylia for the return and erasing of customer data.
End-of-contract process Should the eLearning content be hosted on the Agylia Learning Management System: at end of contract, the customer’s Agylia LMS instance is de-provisioned and all data returned to the customer. The customer’s endpoint address is taken offline making it inaccessible. The customer instance and databases remain by default for a 12-month period after the contract ends, although data can be cleared earlier on request.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Depending on customer requirements, Agylia can design and develop individual courses or entire curricula using HTML5 for desktop and tablet delivery. Agylia can also design and develop individual courses,entire curricula or mobile learning content (using responsive HTML5), which is optimised for tablet and mobile delivery.
Service interface No
Customisation available Yes
Description of customisation ELearning content is designed to meet customers’ specific needs, depending on the level of interaction and production values required. Agylia Learning Services provides 3 levels of interactivity and content type. The 3 levels are; Engaging, Active and Immersive. Customisable content types include media such as video, audio and photography. Customisable interactivity types include animations, simulations and gamification.


Independence of resources Should the eLearning content be delivered via the Agylia Learning Management System: Agylia's content delivery network ensures that users have the best possible content access experience. Agylia can minimise network latency and maximise content response times for users by delivering content from servers that are closest to their geographic location.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Other
Other data at rest protection approach Employee laptops are encrypted.
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Should the eLearning content be delivered via the Agylia Learning Management System: the user database (or subsets based on applied filters) can be exported to CSV.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Agylia will use commercially reasonable endeavours to ensure that the service is available 24 hours per day, 7 days per week.
Approach to resilience Available on request.
Outage reporting Any downtime due to circumstances beyond Agylia’s control, Agylia will distribute a notification via email to a nominated contact.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Other
Other user authentication Should the eLearning content be delivered via the Agylia Learning Management System, users authentication includes: Username or password.
Access restrictions in management interfaces and support channels Agylia have a restricted number of administration accounts providing access to management interfaces and support channels. Agylia adopt the principle of least privilege when assigning account permissions and ensure that individual admin accounts are used for accountability i.e. no shared admin accounts.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ACS Registrars
ISO/IEC 27001 accreditation date 25/04/2019
What the ISO/IEC 27001 doesn’t cover Agylia's ISO 27001:213 certification is limited to its operation within the United Kingdom, it excludes its operations within other geographic locations (United States).
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Certified

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Agylia operate a comprehensive ISO 27001 compliant Information Security Management System (ISMS) that ensures policies are maintained, followed and regularly reviewed. Within our ISMS policies are divided into the following sections: Risk Assessment, Organisation of information security, Human resources management, Asset management, Access control, Cryptography, Physical and environmental security, Operations security, Communications security, System acquisition, development and maintenance, Supplier relationships, Information security incident management, Information security aspects of business continuity management and Compliance. Security committee meetings occur monthly with two members of the security committee also sitting on the Agylia Board ensuring a top down application of processes and procedures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All significant, non-routine changes to organisational information processing facilities (hardware or software) are subject to change control. IS Managers are responsible for carrying out a risk assessment to identify potential risks. Change Managers are responsible for authorising the change to proceed. Where required by a risk assessment, fall-back procedures or a roll-back strategy must be prepared. A testing plan, with clear acceptance criteria is documented prior to the change testing. Business unit representatives must accept changes prior to completion of testing. Change Managers authorise transfer to the operational environment, ensuring business processes aren't disturbed and business continuity plans are updated.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identified vulnerabilities for organisational assets are prioritised as: • Critical (immediate threat of data loss, corruption or unauthorised access) • Urgent (non-immediate threat of data loss, corruption, or unauthorised access) • Non-Critical (no current threat) Agylia has the following timeline requirements for reacting to notifications of relevant vulnerabilities: • Critical – 1 business day • Urgent – 3 business days • Non-critical – 5 business days The Risk Committee receives monthly reports on vulnerability management, including information about the number of vulnerabilities in each organisational asset, what controls are in place, outstanding issues, and what's changed since the previous meeting.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The Risk Committee performs the risk assessment to identify the type and level of audit logging and monitoring that might be required for each individual information asset. The Network Manager is responsible for configuring the information systems to meet the requirements of this procedure. System administrators are prohibited from erasing or de-activating logs. If investigating a fault, members of the IT Department are permitted to turn on additional audit logging. After investigation of a fault, they may return to the original configuration or leave the new logging in place, but may not reduce below the default configuration.
Incident management type Supplier-defined controls
Incident management approach Agylia operate an incident management procedure. Responsibilities are as follows: • Agylia employees follow a standard procedure for reporting information security weaknesses or events. • Information security events and weaknesses are reported to the IS Manager. • Head of HR is responsible user training and events that can be used to support training activities. IS weaknesses and events are reported using a Security Incident Log on Agylia’s internal SharePoint site. The IS Manager reports on how the event was dealt with and closed. Resolution notes are added to Security Incident Logs and security incidents are reviewed during risk committee meetings.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £13000 per unit
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑