SkillGate Limited

Mentoring and Coaching Management

Used for mentoring, coaching and/or observations, Coach! allows organisations a simple way to record face-to-face, one-on-one training interventions.

It can be used stand alone or integrated with SkillGate LMS, Performance Manager, Traffic Light and WhizzAuthor.

Features

  • Option for delegates to ‘search and find’ a relevant coach.
  • Allows delegate to specify the requested objectives of the session
  • Asks coach for appropriate information, comments or skill score.
  • Reports on delegate progress; ‘matched’; ‘in progress’; ‘completed’ etc.
  • Integrates with the My Plan, Traffic Light, Performance manager systems.

Benefits

  • Formalise and report on informal training
  • Coaches and mentors add their skills profiles
  • Delegates can search for a Mentor based on their profile
  • Administer and report on the mentoring process

Pricing

£1500 to £4200 per unit per year

Service documents

G-Cloud 11

878691863447978

SkillGate Limited

James Page

01730815670

James.page@skillgate.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Fully integrates with the full SkillGate Learning & Development product range.

LMS, Performance Management, Traffic Light, AIDm, Classroom Management
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints N/A
System requirements
  • Version control subject to minimum browser specification requirements
  • SSO subject to client server environment

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times subject to criticality hierarchy as laid out in the SkillGate Standard Service Level Agreement .
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels SkillGate offers three support packages: bronze, silver and gold.

Bronze includes access to system training, help videos, and support for site controllers.

Silver additionally offers assistance to site controllers with administration of training and users/groups.

Gold also includes access to telephone and online support for all end users of the platform.

Pricing is a function of number of users of the system.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started When a client purchases a SkillGate system, they are provided with an implementation form to specify their particular settings. SkillGate uses this information to produce an implementation plan outlining a delivery schedule and any information required from the client. Before system launch, SkillGate will offer online training to administrators via webinar, and provide the option of onsite training to administrators and/or end users. The systems and its various modules are supported by comprehensive manuals and helpfiles.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats Video Training
End-of-contract data extraction Clients have access to all data which can be extracted via their activity reports.
End-of-contract process This would be subject to contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Administration can not be facilitated on smaller display mobile devices.
Accessibility standards None or don’t know
Description of accessibility SkillGate course formats have ‘text only’ option for content. This is provided via a request switch that supports accessibility especially for visually impaired delegates. These ‘text only’ pages are easily navigable and read by screen readers.
Accessibility testing TBA
API No
Customisation available Yes
Description of customisation Look and Feel
Functionality
Course settings (e.g. cancellation options)
Administrators have the ability to customise the system.

Scaling

Scaling
Independence of resources Service Level Agreement with server provider. We have the facility to increase capacity in a short space of time.

Analytics

Analytics
Service usage metrics Yes
Metrics types Subject to customisation settings. Can include e.g. Cancellation reports, No-Show Reports, Course Feedback.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Report generated .csv, .xlsx
Data export formats
  • CSV
  • Other
Other data export formats XLSX
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability SkillGate aims to ensure that the System is available to Users for at least 99% of the Business Hours, aggregated over any calendar month. SkillGate will use its best endeavours to maintain the service 24 hours a day 7 days a week 365 days a year during the Subscription Period excepting necessary routine maintenance. SkillGate will use its best endeavours to schedule and to carry out routine maintenance outside UK Office Hours and in the event this is not possible SkillGate will advise Subscribing Members not less than 7 days in advance if and when such routine maintenance is scheduled. No compensation will be payable for service interruption that last for up to 7 days. Thereafter compensation will be payable in proportion to the unexpired part of the Subscription Period.
Approach to resilience Available on request
Outage reporting Email & telephone alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Permissions table controlled by single nominated user.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QAS International
ISO/IEC 27001 accreditation date 15/04/19
What the ISO/IEC 27001 doesn’t cover Na
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes SkillGate offers clients a selection of security levels to suit the nature of the data they hold with us and risk levels they wish to support. Levels range from simple username/password access to encrypted VPN systems. Full details are available in the ‘SkillGate: Notes on Security, Data Protection and Resilience’ document.

We have a dedicated Information Security Officer who manages the ISO27001 controls within SkillGate and provides regular training to staff. The sessions aim to raise awareness around the potential for data breaches (malicious as well as accidental), and how to report incidents.

A key responsibility is monitoring access to ensure it is in line with our current security policies.
• Logs are kept of who and when privileged users access servers.
• Physical access is limited to authorised personnel
• A log is kept on system access, incidents and user activities.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Information Security Representative prepares evaluation form for change. Risk assessment carried out. After evaluation, requirements carried out as a result of evaluation process. Third party authorisation requested if required. Changes implemented and review date agreed. Evaluation recorded, review conducted on agreed date.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Details available on request
Protective monitoring type Undisclosed
Protective monitoring approach Details available on request
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All incidents to be reported to the Information Security manager. Software malfunctions reported. Any symptoms/ messages noted. Computer to be isolated and usage stopped while incident is reported. Disconnected and removable media devices removed. Event is then fully investigated by information security officer, who will determine whether an incident has occurred and the required actions. An orderly response with will be outlined and an entry signed off in the incident reports once satisfactorily cleared.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1500 to £4200 per unit per year
Discount for educational organisations No
Free trial available No

Service documents

odt document: Pricing document odt document: Terms and conditions
Service documents
Return to top ↑