Rainmaker Solutions

Lightning Skills & Rapid Knowledge Transfer

Rainmaker delivers effective and efficient organisational wide training videos through a unique user led approach, which are hosted on our cloud platform. Taking users through a proven approach to ensure the videos address the most pressing user needs, we ensure knowledge is transferred efficiently and effectively across the whole organisation.

Features

  • Cloud hosted video platform with a wide feature base
  • User led and user focussed workshops
  • Professional knowledge transfer video creation
  • Wide and effective business change to unlock unknown benefits
  • Corporate knowledge available for the whole company to access
  • Helps ensure project benefits are realised
  • Users are more comfortable with new tools
  • Accessible on any device, cloud hosted
  • Business continuity throughout whole transition phase

Benefits

  • Greater level of benefits realised
  • User satisfaction is increased
  • Knowledge is maintained for years, not just until project end
  • Reduces business change costs
  • Reduces deployment timescales
  • Eases accessibility issues and cost for upskilling

Pricing

£35000 per unit per year

Service documents

G-Cloud 11

985799237990041

Rainmaker Solutions

Tenders Department

07810565056

tenders@rainmaker.solutions

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints NA
System requirements
  • Internet access
  • Modern web browser

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Within 1 business day.
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels Onsite support - Provided at standard day rate of £950 + VAT and expenses.
Email support - Variable price dependant on demand.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started A training video is provided with the platform, along with consultancy to support the business in it's adoption.
Service documentation No
End-of-contract data extraction At the end of the contract the videos held on the platform can be exported and shared with the client.
End-of-contract process There is no cost to end the contract. All content will be provided.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The user interface is responsive to the device used meaning it provides a simpler layout when viewed on a tablet or mobile.
Service interface No
API No
Customisation available No

Scaling

Scaling
Independence of resources Hosting will be elastic and therefore increases with demand. There will be no impact on the user.

Analytics

Analytics
Service usage metrics Yes
Metrics types Number of views per video.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can download videos from the platform or request copies.
Data export formats Other
Other data export formats MP4 or other video formats
Data import formats Other
Other data import formats MP4 or other video formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks All traffic between sites is encrypted by TLS supporting versions 1.0, 1,1, and 1.2. Wemvula supports a number of cipher suites, allowing the client to select the strongest it supports.

The service is internet facing with no PSN option.
Data protection within supplier network Other
Other protection within supplier network A Virtual Private Cloud with multiple security zones to protect data in transit internally within the service.
A future transition to a PaaS environment will place priority on PaaS able to provide security at rest compliant with UK Government Official requirements.

Availability and resilience

Availability and resilience
Guaranteed availability 95% during core working hours of 8am-6pm.
Approach to resilience We utilise multiple AWS Availability Zones within a region to ensure physical resilience and availability of the the service.
Outage reporting Email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Authentication of consumers to management interfaces and within support channels
Rainmaker doesn’t currently expose management interfaces to consumers.
Rainmaker will only accept support requests that relate to security aspects of the service from authenticated and authorised users.
Separation and access control within management interfaces
Role Based Access Controls are in place within the service to allow implementation of least privilege.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Rainmaker has established an information security governance framework that ensures a systematic approach to managing the confidentiality, integrity, and availability of company and customer information. It is based on board level periodic risk assessments appropriate to ever-changing threat scenarios. Details of our governance framework are available for review on request.
Information security policies and processes Rainmaker has established an information security governance framework that ensures a systematic approach to managing the confidentiality, integrity, and availability of company and customer information. It is based on board level periodic risk assessments appropriate to ever-changing threat scenarios.

Details of our governance framework are available for review on request.

The information security policies we utilise for the Lightning Skills service are available on request. Adherence with these policies is subject to board level annual assurance and review.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes to the Lightning Skills service (application and infrastructure) are subject to security review, testing and assessment.

The service application code and infrastructure configuration code are under configuration management and change control.

Further details are available on request.
Vulnerability management type Undisclosed
Vulnerability management approach All changes to the Lightning Skills service (application and infrastructure) are subject to security review, testing and assessment.

The service application code and infrastructure configuration code are under configuration management and change control.

Further details are available on request.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All activity is logged for Audit. Rainmaker uses automated and manual review and analysis mechanisms.

Incident response
P1 – within 30 minutes
P2 – within 4 hours
P3 – within 24 hours
P4 – within 72 hours

Further details are available on request.
Incident management type Supplier-defined controls
Incident management approach Rainmaker utilises an ITIL based incident management process to identify, triage, categorise and prioritise, manage, resolve and conduct lessons learnt on incidents.

Users can report incidents via the online service desk.

Incident response
P1 – within 30 minutes
P2 – within 4 hours
P3 – within 24 hours
P4 – within 72 hours

Incident update
P1 – hourly
P2 – every 2 hours
P3 – every 24 hours
P4 – every 24 hours

Communication
Online service status and service desk
Email (when required)
Phone (when required)

Major incident review: Incident Report

Further details are available on request.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £35000 per unit per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑