Agylia Group Ltd

Agylia Learning Management Solutions

A mobile, scalable and secure Learning Management System (LMS) with optional mobile learning Apps for iOS and Android devices. Plus, an optional eLearning authoring module. Create, schedule, target, deliver and manage a wide range of learning content, including eLearning and microlearning courses, videos and performance support resources.

Features

  • Administration interface: schedule, target and deliver digital training resources
  • Rapid trouble free implementation
  • True cloud based LMS, allowing massive scalability
  • Integrated Learning Records Store: fuller reporting with Experience API
  • Branded learner portals and multiple separately branded sub-portals
  • Offline delivery and tracking of learning materials via mobile Apps
  • Social options including comprehensive learner forums and content ranking
  • Gamification options: points, achievement awards, rules and competitive leaderboards
  • Manage online and classroom-based training events
  • Collaborative authoring of HTML5-based eLearning courses

Benefits

  • Deliver learning and communications efficiently from a central point
  • Improve staff performance with training and support wherever needed
  • Publish content to PCs, laptops, tablets and smartphones
  • Track and measure all learning activities, not just SCORM
  • Easily access multiple forms of learning and reference materials
  • Deliver training immediately with no infrastructure / implementation complexities
  • Encourage use of resources with social and gamification options
  • Support large numbers of staff and/or people in your community
  • Target learning content to different user group’s specific needs
  • Create bespoke eLearning and support materials to improve productivity

Pricing

£4.60 per user per year

Service documents

G-Cloud 10

852145949279355

Agylia Group Ltd

Tim Buff

01454 269222

info@agylia.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No. Agylia will use commercially reasonable endeavours to ensure that the service is available 24 hours per day, 7 days per week, except during periods of downtime due to circumstances beyond Agylia’s control.
System requirements
  • Internet Explorer 11
  • Edge v13
  • Chrome v38
  • Firefox v28
  • Safari 8

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times are under 2 hours, across all severity levels.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Whilst subscribed to the service, customers will have access to standard support, which includes access to the Agylia Help Desk, user forums, FAQs, online training content, plus email and telephone support.

Agylia support services are available during standard United Kingdom business working hours (9:00am to 5:00pm), excluding weekends and United Kingdom bank holidays.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Agylia provides full individual support to new customers and will work with customer’s own staff to arrange a swift and trouble free implementation. In its standard form it can typically be live within 1 day of contracting, once requirements are confirmed. Any customisation and data migration required will take longer and Agylia will work with customers to agree a successful, fully project managed process.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Excel
End-of-contract data extraction Customer administrators can extract their company’s and employees’ data at the end of contract, by using the Agylia administration portal. This includes user data, content, and user learning history. A request at end of contract can also be made to Agylia for the return and erasing of customer data.
End-of-contract process At end of contract, the customer’s Agylia instance is de-provisioned and all data returned to the customer. The customer’s endpoint address is taken offline making it inaccessible. The customer instance and databases remain by default for a 12-month period after the contract ends, although data can be cleared earlier on request.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The Agylia learner portal is fully responsive, enabling users to access digital learning content from any device.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Tested manually and with JAWS.
API Yes
What users can and can't do using the API A secured, REST-based Web API enables external systems to programmatically create new user accounts within Agylia.
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation Agylia can be configured to meet the needs of specific customers.
Standard configuration includes - User interface: The colours, fonts and logo of the interface are defined by a customisable skin. Server address (URL): Each customer gets their own unique URL to their Agylia LMS server. Emails: Emails are template driven and the following can be configured; From address, Email subject line, Email body, Email signature and Email style / fonts. System name and support email addresses: Both can be configured based on the needs of a specific customer.

Scaling

Scaling
Independence of resources Agylia's content delivery network ensures that users have the best possible content access experience. Agylia can minimise network latency and maximise content response times for users by delivering content from servers that are closest to their geographic location.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Other
Other data at rest protection approach Employee laptops are encrypted.
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach The user database (or subsets based on applied filters) can be exported to CSV.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Agylia will use commercially reasonable endeavours to ensure that the service is available 24 hours per day, 7 days per week, except during periods of planned maintenance, or downtime due to circumstances beyond Agylia’s control.
Approach to resilience Available on request.
Outage reporting Any downtime due to circumstances beyond Agylia’s control, Agylia will distribute a notification via email to a nominated contact.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Agylia have a restricted number of administration accounts providing access to management interfaces and support channels. Agylia adopt the principle of least privilege when assigning account permissions and ensure that individual admin accounts are used for accountability i.e. no shared admin accounts.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ACS Registrars
ISO/IEC 27001 accreditation date 08/06/2016
What the ISO/IEC 27001 doesn’t cover Agylia's ISO 27001:213 certification is limited to its operation within the United Kingdom, it excludes its operations within other geographic locations (United States).
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Certified

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Agylia operate a comprehensive ISO 27001 compliant Information Security Management System (ISMS) that ensures policies are maintained, followed and regularly reviewed. Within our ISMS policies are divided into the following sections: Risk Assessment, Organisation of information security, Human resources management, Asset management, Access control, Cryptography, Physical and environmental security, Operations security, Communications security, System acquisition, development and maintenance, Supplier relationships, Information security incident management, Information security aspects of business continuity management and Compliance.

Security committee meetings occur monthly with two members of the security committee also sitting on the Agylia (CM Group) Board ensuring a top down application of processes and procedures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All significant, non-routine changes to organisational information processing facilities (hardware or software) are subject to change control. IS Managers are responsible for carrying out a risk assessment to identify potential risks. Change Managers are responsible for authorising the change to proceed. Where required by a risk assessment, fall-back procedures or a roll-back strategy must be prepared. A testing plan, with clear acceptance criteria is documented prior to the change testing. Business unit representatives must accept changes prior to completion of testing. Change Managers authorise transfer to the operational environment, ensuring business processes aren't disturbed and business continuity plans are updated.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identified vulnerabilities for organisational assets are prioritised as:

• Critical (immediate threat of data loss, corruption or unauthorised access)
• Urgent (non-immediate threat of data loss, corruption, or unauthorised access)
• Non-Critical (no current threat)

Agylia has the following timeline requirements for reacting to notifications of relevant vulnerabilities:

• Critical – 1 business day
• Urgent – 3 business days
• Non-critical – 5 business days

The Risk Committee receives monthly reports on vulnerability management, including information about the number of vulnerabilities in each organisational asset, what controls are in place, outstanding issues, and what's changed since the previous meeting.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The Risk Committee performs the risk assessment to identify the type and level of audit logging and monitoring that might be required for each individual information asset. The Network Manager is responsible for configuring the information systems to meet the requirements of this procedure.

System administrators are prohibited from erasing or de-activating logs. If investigating a fault, members of the IT Department are permitted to turn on additional audit logging. After investigation of a fault, they may return to the original configuration or leave the new logging in place, but may not reduce below the default configuration.
Incident management type Supplier-defined controls
Incident management approach Agylia operate an incident management procedure. Responsibilities are as follows:

• Agylia employees follow a standard procedure for reporting information security weaknesses or events.
• Information security events and weaknesses are reported to the IS Manager.
• Head of HR is responsible user training and events that can be used to support training activities.

IS weaknesses and events are reported using a Security Incident Log on Agylia’s internal SharePoint site. The IS Manager reports on how the event was dealt with and closed. Resolution notes are added to Security Incident Logs and security incidents are reviewed during risk committee meetings.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £4.60 per user per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑