SkillGate Limited

Mentoring and Coaching Management

Used for mentoring, coaching and/or observations, Coach! allows organisations a simple way to record face-to-face, one-on-one training interventions.

It can be used stand alone or integrated with SkillGate LMS, Performance Manager, Traffic Light and WhizzAuthor.


  • Option for delegates to ‘search and find’ a relevant coach.
  • Allows delegate to specify the requested objectives of the session
  • Asks coach for appropriate information, comments or skill score.
  • Reports on delegate progress; ‘matched’; ‘in progress’; ‘completed’ etc.
  • Integrates with the My Plan, Traffic Light, Performance manager systems.


  • Formalise and report on informal training
  • Coaches and mentors add their skills profiles
  • Delegates can search for a Mentor based on their profile
  • Administer and report on the mentoring process


£1500 to £4200 per unit per year

Service documents


G-Cloud 11

Service ID

8 7 8 6 9 1 8 6 3 4 4 7 9 7 8


SkillGate Limited

James Page


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Fully integrates with the full SkillGate Learning & Development product range.

LMS, Performance Management, Traffic Light, AIDm, Classroom Management
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements
  • Version control subject to minimum browser specification requirements
  • SSO subject to client server environment

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times subject to criticality hierarchy as laid out in the SkillGate Standard Service Level Agreement .
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
SkillGate offers three support packages: bronze, silver and gold.

Bronze includes access to system training, help videos, and support for site controllers.

Silver additionally offers assistance to site controllers with administration of training and users/groups.

Gold also includes access to telephone and online support for all end users of the platform.

Pricing is a function of number of users of the system.
Support available to third parties

Onboarding and offboarding

Getting started
When a client purchases a SkillGate system, they are provided with an implementation form to specify their particular settings. SkillGate uses this information to produce an implementation plan outlining a delivery schedule and any information required from the client. Before system launch, SkillGate will offer online training to administrators via webinar, and provide the option of onsite training to administrators and/or end users. The systems and its various modules are supported by comprehensive manuals and helpfiles.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
Video Training
End-of-contract data extraction
Clients have access to all data which can be extracted via their activity reports.
End-of-contract process
This would be subject to contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Administration can not be facilitated on smaller display mobile devices.
Service interface
Description of service interface
Service interface is available to service administrators via the Setup menu.
Accessibility standards
None or don’t know
Description of accessibility
SkillGate course formats have ‘text only’ option for content. This is provided via a request switch that supports accessibility especially for visually impaired delegates. These ‘text only’ pages are easily navigable and read by screen readers.
Accessibility testing
Customisation available
Description of customisation
Look and Feel
Course settings (e.g. cancellation options)
Administrators have the ability to customise the system.


Independence of resources
Service Level Agreement with server provider. We have the facility to increase capacity in a short space of time.


Service usage metrics
Metrics types
Subject to customisation settings. Can include e.g. Cancellation reports, No-Show Reports, Course Feedback.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Report generated .csv, .xlsx
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SkillGate aims to ensure that the System is available to Users for at least 99% of the Business Hours, aggregated over any calendar month. SkillGate will use its best endeavours to maintain the service 24 hours a day 7 days a week 365 days a year during the Subscription Period excepting necessary routine maintenance. SkillGate will use its best endeavours to schedule and to carry out routine maintenance outside UK Office Hours and in the event this is not possible SkillGate will advise Subscribing Members not less than 7 days in advance if and when such routine maintenance is scheduled. No compensation will be payable for service interruption that last for up to 7 days. Thereafter compensation will be payable in proportion to the unexpired part of the Subscription Period.
Approach to resilience
Available on request
Outage reporting
Email & telephone alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Permissions table controlled by single nominated user.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
QAS International
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
SkillGate offers clients a selection of security levels to suit the nature of the data they hold with us and risk levels they wish to support. Levels range from simple username/password access to encrypted VPN systems. Full details are available in the ‘SkillGate: Notes on Security, Data Protection and Resilience’ document.

We have a dedicated Information Security Officer who manages the ISO27001 controls within SkillGate and provides regular training to staff. The sessions aim to raise awareness around the potential for data breaches (malicious as well as accidental), and how to report incidents.

A key responsibility is monitoring access to ensure it is in line with our current security policies.
• Logs are kept of who and when privileged users access servers.
• Physical access is limited to authorised personnel
• A log is kept on system access, incidents and user activities.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Information Security Representative prepares evaluation form for change. Risk assessment carried out. After evaluation, requirements carried out as a result of evaluation process. Third party authorisation requested if required. Changes implemented and review date agreed. Evaluation recorded, review conducted on agreed date.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Details available on request
Protective monitoring type
Protective monitoring approach
Details available on request
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All incidents to be reported to the Information Security manager. Software malfunctions reported. Any symptoms/ messages noted. Computer to be isolated and usage stopped while incident is reported. Disconnected and removable media devices removed. Event is then fully investigated by information security officer, who will determine whether an incident has occurred and the required actions. An orderly response with will be outlined and an entry signed off in the incident reports once satisfactorily cleared.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£1500 to £4200 per unit per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑