ProTech Computer Systems Ltd

ProConnect E-Portfolio and CPD Management

Protech’s ProConnect e-portfolio and CPD management solution supports organisations to simplify the tasks within learning management and specifically e-portfolio and CPD management. Its software supports candidates to track and upload CPD progress through a consolidated e-portfolio view.


  • Provides a streamlined self-service online portfolio completion for learners
  • Allows candidates to manage their own learning
  • Enables members to record activities and upload evidence of learning
  • Online CPD and qualification enrolment
  • Automated administrative processes including communications and registration
  • Configure and track CPD points or time allocation
  • Reporting to demonstrate compliance, quality assurance and learner trends
  • Information in a single view showing learner progression and preferences


  • Enhanced learner experience from enrolment through to CPD completion
  • Eradicates time consuming manual processes
  • Provides learner with control of their own CPD journey
  • Improved and faster business decisions through accurate and timely information


£93.00 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 5 9 6 8 3 6 2 6 2 2 8 5 5 4


ProTech Computer Systems Ltd Kim Smith
Telephone: 01213252620

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The service is a standalone CRM system with additional options for a Content Management System (CMS) or integration to other third party solutions via web services.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
ProConnect customers are encouraged but not obliged to take software updates in line with the quarterly maintenance release schedule to benefit from continuing enhancements, new developments and support.
System requirements
  • Windows server licences
  • SQL server licences

User support

Email or online ticketing support
Email or online ticketing
Support response times
Protech's standard support level is from Monday - Friday 09:00-17:30 (excluding bank holidays). If necessary Protech can provide advanced and enhanced support levels in addition to the standard support level.
Protech's response time is in line with the priority of the issue and our Service Level Agreement is as follows:
Urgent/ Prority Issue: Telephone response within 30 minutes
High Priority Issue: Email response within 1 hour
Medium Priority Issue: Email response within 1 hour
Low Priority Issue: Email response within 1 day
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
All customers are afforded the same level of support from our dedicated support department within office hours, with additional out-of-hours or on-site support available on request.
Support available to third parties

Onboarding and offboarding

Getting started
As part of the onboarding services, Protech will provide documentation for all modules of the system that have been procured, alongside orientation and training sessions with end users to ensure a comprehensive understanding of all relevant aspects of the system.
Service documentation
Documentation formats
End-of-contract data extraction
Access to the SQL database is provided and data can be extracted via SQL queries.
End-of-contract process
Extraction of consumer generated data will be charged using the rates specified in the SFIA rate table. On termination of the service, customer data will be removed from the system.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
ProConnect web users are supported by our digital platform which is fully mobile responsive
Service interface
What users can and can't do using the API
Users can manage most aspects of the business functionality within the application and the back office. Having evolved over many implementations, this service is extended to suit the requirements on a per project basis and we would feel confident in adding additional functionality should the use case arise.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The essence of the platform and solution is that it is completely configurable so functionality can be enabled or disabled as required. Configuration of the platform is completed through the user interface, and part of the onboarding of a project would be to train senior users in how to use the configuration tools. This should allow them to become self-sufficient so that, within reason, they can evolve the platform to meet future requirements.


Independence of resources
Any tasks which users could complete which would create strain on the system (for example, reporting), are completed in a separate environment from the day to day user actions.


Service usage metrics
Metrics types
Our service management provides reporting of Cloud based usage on a regular basis. Reports are provided to show that availability levels were met or exceeded, capacity levels along with thresholds and any incidents or requests for change.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All record sets created from system generated reports or data profiles can be exported to standard formats such as Excel.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Strong Physical firewall
Regular scans
Limited Remote access
Segmented network traffic

Availability and resilience

Guaranteed availability
99.95, assured by independent validation of assertion
Approach to resilience
Backup, disaster recovery and resilience plan in place, available on request.
Outage reporting
Email alerts immediately provide any outage feedback to the client and the ProTech support team.

Identity and authentication

User authentication needed
User authentication
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
Dependent on the implementation, the solution may be accessed over the Public Services Network (PSN) only. This allows only named users, to access the system from a device that is connected to the PSN.

Where the customer does not require the solution to be housed on the PSN, the system is accessed using windows authentication.
Access restriction testing frequency
At least once a year
Management access authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Cyber Essentials
  • Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Protech are ISO27001 accredited. We maintain a risk log to highlight and keep track of potential security risks. The log is monitored regularly and processes are put in place to ensure that any identified risks are mitigated. Regular reporting is given at board level with ultimate responsibility sitting with the COO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ProConnect is subject to quarterly maintenance releases, where the software is built and regression tested for public release. All source control changes are tracked and monitored using Team Foundation Server.

ProConnect undergoes an IT Health Check each year in line with those maintenance releases to ensure that the system still meets its 'OFFICIAL' accreditation status.
Vulnerability management type
Vulnerability management approach
All security patches are applied by a group policy as and when suppliers publish these. We ensure that all patches are applied, we have a secure environment controlled by a physical firewall and all vulnerable ports are locked down. We receive regular updates from antivirus security forum to highlight potential threats, and take steps to mitigate these.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The firewall and antivirus highlight any potential intrusion. If any threats are identified all hardware is immediately disconnected from the network and individual PCs scanned and any potential threats mitigated.
Incident management type
Incident management approach
We have incident management processes prescribed by ISO27001 whereby any incidents are reported to the security officer, any threats are logged, and actions taken to mitigate any threats are recorded. Incident reports are produced periodically to ensure all staff are aware of any potential threats and actions they should take.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
Public Services Network (PSN)


£93.00 a user a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.