GeniusATS® - Applicant Tracking & Candidate Management Software for Recruitment (SaaS)
GeniusATS® is a cloud based applicant tracking solution (ATS), designed to support hiring managers and recruiters with seamless candidate and talent management, whilst providing candidates with an experience like no other. GeniusATS@ features automated candidate selection, psychometric level assessments, job board integration, talent management, comprehensive reporting, unlimited users and more.
- Web based platform
- Talent Management
- Real time, comprehensive reporting
- True evolving & learning AI
- Microsoft Azure Cloud Hosting
- Password protected
- ISO 27,001 Certified
- GDPR compliant
- Heightened candidate engagement
- Psychometric level assessments, for deeper candidate understanding
- Quick apply
- AI Profiling
- Automatically match candidates to key criteria through AI
- Drag & Drop user interface
- Unlimited users
- Talent management
- Reduce time to hire
- One click job posting, with job board integrations
£17000 per licence per year
7 1 3 5 2 8 5 2 2 0 0 9 6 7 1
Genius Group Limited
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
Line Manager Portal,
|Cloud deployment model||Private cloud|
|Service constraints||GeniusATS® is supported on the current and all major releases of the following browsers - Edge, Google Chrome, Firefox and Safari|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
We aim to respond to email requests within 30 minutes during office hours, Monday-Friday 8am - 5pm.
Phone calls to our service support are answered 7 days a week.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Hosting, updates and service patches are fully inclusive within GeniusATS's annual licence fee.
All clients are assigned a dedicated Project & Account Manager, with full access to our IT, Technical and Development teams.
|Support available to third parties||No|
Onboarding and offboarding
Once agreement to proceed has been reached, our Project Management teams will work with your teams to scope out the system. This will involve every person who forms part of the steering group. For the ATS, this may include marketing, recruitment, HR, resourcing, IT, security, operations and L&D.
Throughout the entire process, we work together to build the front facing website and the system, liaising though weekly calls and monthly meetings where possible. Our Project Managers are on hand to ensure the smooth flow of the project and will act as a direct contact between our designers, developers, asset collection, copywriting, accounts and integrations teams.
Once the project is complete, full onsite and web based training sessions are delivered along with an agreed SLA (where needed) and at least quarterly updates and reviews. We can also provide user documentation to assist with ongoing support alongside our helpdesk.
|End-of-contract data extraction||The extract requirements, would be scoped with the Account Manager. they will discuss the format, extraction and details with the client as part of the set up agreement|
|End-of-contract process||The price of the contract includes, a one-off set up fee plus a rolling annual licence fee. The only additional optional cost is SMS, which can be either our own, or your supplier.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Candidates of GeniusATS can interact with the full journey as it would be on a desktop.
Control panel users can use GeniusATS® down to a mobile tablet device.
|What users can and can't do using the API||The entire application runs on APIs, and while the APIs are not intended to be used outside of the provided software they can be used separately if necessary.|
|API sandbox or test environment||Yes|
|Description of customisation||
The entire candidate experience is client branded to build trust.
The control panel is customisable to suit the needs of the business, in the form of mapping in the processes; workflows, vacancy templates, contracts, assessments, hierarchy, locations, sectors, grades and more, which is all pertinent to the client. It is not however, brand-able from a control panel (back-office perspective)
The customisation is set up initially by our team (building the website, setting up the system etc) but ongoing access in order to edit, update and upload new documentation can also be given to the client.
This follows a full collaborative scoping process to assess the needs of the individual client to ensure we produce a solution that suits specific needs.
|Independence of resources||All client data are on logically separate resources, however all share a common API.|
|Service usage metrics||Yes|
Various activity within the system
Custom report can be scoped.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||N/A|
|Data export formats||Other|
|Other data export formats||N/A|
|Data import formats||Other|
|Other data import formats||N/A|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
GeniusGroup shall use reasonable endeavours to ensure that the uptime for the Hosted Services is at least 99% during each calendar month.
In respect of each calendar month during which the services uptime is less than that specified, the Customer shall earn service credits in accordance with the following provisions;
GeniusGroup shall deduct an amount equal to the service credits due to the customer from amounts invoiced in respect of the charges for the services. All remaining service credits shall be deducted from each invoice issued following the reporting of the failure to meet the uptime commitment, until the service credits are exhausted.
Service credits shall be the sole remedy in relation to any failure by GeniusGroup to meet the uptime guarantee, except where failure amounts to a material breach. Upon termination, the customer’s entitlement to service credits shall cease, save the service credits earned by the customer shall be offset against any amounts invoiced by GeniusGroup following termination. Downtime caused directly or indirectly by a Force Majeure Event, a failure of the Internet or any public telecommunications network, a failure of the customer’s computer systems or networks or scheduled maintenance, shall not be considered during the calculations.
|Approach to resilience||Available on request|
If there is a service outage relating to our hosted services we are notified by Microsoft Azure through status pages.
Clients are then notified directly by email alerts.
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Access to management interfaces and support channels limited to key senior developers, using MFA.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||QMS International|
|ISO/IEC 27001 accreditation date||9th August 2017|
|What the ISO/IEC 27001 doesn’t cover||GeniusGroup is fully covered and has been approved for security management systems that apply to the design, development and implementation of career websites, HR and recruitment solutions.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
All our policies and procedures are available to view upon request.
All policies are audited annually, with staff annually reviewing and signing their agreement to them also.
We adhere to and follow ISO 27,001, which is audited externally and internally on a annual and monthly basis respectively.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All configuration and change management go through a formal process, including review and logging.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
The hosting platform is based on PaaS, with the patching handled by Azure.
Monitoring and reporting services provide alerts of any unusual or suspicious activity.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
All APIs run through a WAF.
Monitoring and reporting services provide alerts of any unusual or suspicious activity.
The SLA defines incident response times, based on assigned priority.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We do have a pre-defined process for common evens, which is documented within our Information Security Incident reporting Policy.
All Information Security Incidents should be reported to the Information Security Officer with the following information; date, time and location of the incident, who discovered the incident and the systems affected.
Incidents classified as ‘High’ will have a closure report logged. Any risks identified as a result of the incident will be recorded on the Information Security Risk Treatment Plan and assigned for corrective and/or preventative actions. All incidents will be summarised in a monthly report.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£17000 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|