Mentoring and Coaching Management
Used for mentoring, coaching and/or observations, Coach! allows organisations a simple way to record face-to-face, one-on-one training interventions.
It can be used stand alone or integrated with SkillGate LMS, Performance Manager, Traffic Light and WhizzAuthor.
- Option for delegates to ‘search and find’ a relevant coach.
- Allows delegate to specify the requested objectives of the session
- Asks coach for appropriate information, comments or skill score.
- Reports on delegate progress; ‘matched’; ‘in progress’; ‘completed’ etc.
- Integrates with the My Plan, Traffic Light, Performance manager systems.
- Formalise and report on informal training
- Coaches and mentors add their skills profiles
- Delegates can search for a Mentor based on their profile
- Administer and report on the mentoring process
£1500 to £4200 per unit per year
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
Fully integrates with the full SkillGate Learning & Development product range.
LMS, Performance Management, Traffic Light, AIDm, Classroom Management
|Cloud deployment model||
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response times subject to criticality hierarchy as laid out in the SkillGate Standard Service Level Agreement .|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
SkillGate offers three support packages: bronze, silver and gold.
Bronze includes access to system training, help videos, and support for site controllers.
Silver additionally offers assistance to site controllers with administration of training and users/groups.
Gold also includes access to telephone and online support for all end users of the platform.
Pricing is a function of number of users of the system.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||When a client purchases a SkillGate system, they are provided with an implementation form to specify their particular settings. SkillGate uses this information to produce an implementation plan outlining a delivery schedule and any information required from the client. Before system launch, SkillGate will offer online training to administrators via webinar, and provide the option of onsite training to administrators and/or end users. The systems and its various modules are supported by comprehensive manuals and helpfiles.|
|Other documentation formats||Video Training|
|End-of-contract data extraction||Clients have access to all data which can be extracted via their activity reports.|
|End-of-contract process||This would be subject to contract.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Administration can not be facilitated on smaller display mobile devices.|
|Accessibility standards||None or don’t know|
|Description of accessibility||SkillGate course formats have ‘text only’ option for content. This is provided via a request switch that supports accessibility especially for visually impaired delegates. These ‘text only’ pages are easily navigable and read by screen readers.|
|Description of customisation||
Look and Feel
Course settings (e.g. cancellation options)
Administrators have the ability to customise the system.
|Independence of resources||Service Level Agreement with server provider. We have the facility to increase capacity in a short space of time.|
|Service usage metrics||Yes|
|Metrics types||Subject to customisation settings. Can include e.g. Cancellation reports, No-Show Reports, Course Feedback.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Report generated .csv, .xlsx|
|Data export formats||
|Other data export formats||XLSX|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||SkillGate aims to ensure that the System is available to Users for at least 99% of the Business Hours, aggregated over any calendar month. SkillGate will use its best endeavours to maintain the service 24 hours a day 7 days a week 365 days a year during the Subscription Period excepting necessary routine maintenance. SkillGate will use its best endeavours to schedule and to carry out routine maintenance outside UK Office Hours and in the event this is not possible SkillGate will advise Subscribing Members not less than 7 days in advance if and when such routine maintenance is scheduled. No compensation will be payable for service interruption that last for up to 7 days. Thereafter compensation will be payable in proportion to the unexpired part of the Subscription Period.|
|Approach to resilience||Available on request|
|Outage reporting||Email & telephone alerts|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Permissions table controlled by single nominated user.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||QAS International|
|ISO/IEC 27001 accreditation date||15/04/19|
|What the ISO/IEC 27001 doesn’t cover||Na|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
SkillGate offers clients a selection of security levels to suit the nature of the data they hold with us and risk levels they wish to support. Levels range from simple username/password access to encrypted VPN systems. Full details are available in the ‘SkillGate: Notes on Security, Data Protection and Resilience’ document.
We have a dedicated Information Security Officer who manages the ISO27001 controls within SkillGate and provides regular training to staff. The sessions aim to raise awareness around the potential for data breaches (malicious as well as accidental), and how to report incidents.
A key responsibility is monitoring access to ensure it is in line with our current security policies.
• Logs are kept of who and when privileged users access servers.
• Physical access is limited to authorised personnel
• A log is kept on system access, incidents and user activities.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Information Security Representative prepares evaluation form for change. Risk assessment carried out. After evaluation, requirements carried out as a result of evaluation process. Third party authorisation requested if required. Changes implemented and review date agreed. Evaluation recorded, review conducted on agreed date.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Details available on request|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||Details available on request|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||All incidents to be reported to the Information Security manager. Software malfunctions reported. Any symptoms/ messages noted. Computer to be isolated and usage stopped while incident is reported. Disconnected and removable media devices removed. Event is then fully investigated by information security officer, who will determine whether an incident has occurred and the required actions. An orderly response with will be outlined and an entry signed off in the incident reports once satisfactorily cleared.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£1500 to £4200 per unit per year|
|Discount for educational organisations||No|
|Free trial available||No|