Altis Consulting

Bloom Thrive

A cloud based Learner Analytics system for tracking student engagement at Higher Education Institutions. This system tracks 38 triggers that relate to engagement and provide a cloud based reporting platform that allows student support teams at Universities to track students most at risk of disengagement. Built with University of London


  • Reporting and Data Visualisation
  • Analytical engine
  • Sentiment Analysis
  • Learner Analytics
  • Remote Access
  • Sentiment Analysis
  • Simple file based data feeds
  • Flexible reporting structures
  • Tableau Reporting platform


  • Tracking Student Engagement
  • Prioritisation of Student Intervention/Interaction
  • Quick setup and integration
  • Prediction of Student attrition
  • Track sentiment of Students/Courses/Faculties
  • Uses University of London/CoSector trusted infrastructure


£3000 to £4000 per licence per month

  • Free trial available

Service documents

G-Cloud 10


Altis Consulting

Chris Kearns

07704 957 438

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to ULCC's Thrive Service (Cloud provision of Moodle)
Cloud deployment model Private cloud
Service constraints Customers must be able to provide core data feeds in simple file formats (Altis will assist in this setup)
System requirements
  • Ability to reliably provide core data in flat file formats
  • Quality of data provided affects accuracy of Engagement score

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hours response during working hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Below support included as part of fee.

All response and resolution timespans are in Business Hours or Business Days:
Priority - Definition - Resolution Time -Thrive Scenarios
P1 Showstopper - significant business or user impact - 4 Hours - User-facing components (excluding receipt of data sources) completely unavailable
P2 High priority - impacting effective use of the service for a significant number of users - 2 Business Days - Unavailability, performance degradation or impaired functionality of user-facing components (excluding receipt of data sources) for a majority of users
P3 Normal priority - service impaired for a small number of users - 4 Business Days - Service impaired in any other way
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Consultants from Altis will provide 1 day on site setup assistance and training -and 2 days remote assistance . Documentation on File formats will also be provided
Service documentation Yes
Documentation formats Other
Other documentation formats
  • Excel
  • Word
End-of-contract data extraction All of the source data is provided to us by the user originally and so there is no need for us to extract the data and provide it back to the user.

If the User requests an extract of the copy of the data we hold - we can provide a flat file extract
End-of-contract process The user stops providing source files, we disable the user account and after a period of time delete the users data

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Layouts are optimised for Desktops but work through a mobile device
Accessibility standards None or don’t know
Description of accessibility No accessibility testing carried out
Accessibility testing None
Customisation available Yes
Description of customisation The files required to be provided allow the users to set up reporting hierarchies and groups.


Independence of resources We are using ULCC's data centre and rely upon their load balancing architecture which is laid out under their Core Bloom offering at:


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users use the web based reporting - which they can save and print
Data export formats
  • CSV
  • Other
Other data export formats JPG
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks We do not have one standard approach - but will work with the buyer to set up an appropriate standard - e.g. Secure FTP
Data protection within supplier network Other
Other protection within supplier network The database that the data is stored in - is password protected and encrypted

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% Availability means that the Bloom Thrive Service is unavailable for no more than forty-three (43) minutes (based on a 30-day month). Calculated as follows:

((Total number of minutes in month-Total duration of all Service Outages))/(Total number of minutes in month x 100)

If Availability is less than 99.9% in a given month then 5% of the following month’s BloomThrive Service fees will be credited.
Approach to resilience Available on request - provided on same data centre as ULCC's Bloom product: see
Outage reporting Email Alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Support channels - only nominated contacts can report issues
Reporting access - through username/password
Access restriction testing frequency Less than once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance certified Yes
Security governance standards Other
Other security governance standards Yes, assured by independent validation of assertion
Information security policies and processes Data Centre - Information security policies followed as part of ULCC procedures.
JISC code of conduct for use of Student data for Learner Analytics

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The components include ETL routines, Database and Tableau reporting.

Changes to Database and ETL are only made on request of a customer or to address a bug/issue and source code is controlled so can be rolled back.

Upgrades to Tableau are only made for critical security updates
Vulnerability management type Undisclosed
Vulnerability management approach Threats to the reporting interface are picked up through the software vendor Tableau.
Protective monitoring type Undisclosed
Protective monitoring approach We will respond within 24 hours to incidents
Incident management type Undisclosed
Incident management approach Nominated users can email or call the help desk or nominated contact for all incidents/issues

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Joint Academic Network (JANET)


Price £3000 to £4000 per licence per month
Discount for educational organisations No
Free trial available Yes
Description of free trial 1 month free trial


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑