Skip to main content

Help us improve the Digital Marketplace - send your feedback

DAMGEO LTD

KLEOS SOFTWARE: PERSONALISED CAREERS GUIDANCE, ADVICE AND SUPPORT

A dynamic careers guidance and employment support platform for all, providing vital personalised support powered by machine learning based on a robust diagnostic classification

Features

  • Our game changing dynamic and digital universal diagnostics
  • A personalised AI assistant supported by a robust data model
  • The customer centric content co-designed methodology
  • The rich dynamic and drillable dashboard

Benefits

  • Matches participants to suitable careers, based on their true ability
  • Enhances the employability of everyone
  • Listens to parents, enabling them to support their child’s employability
  • Enables careers advisors to provide informed & consistent careers guidance

Pricing

£4 to £10 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at damien.caldwell@damgeo.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 0 1 7 8 4 1 7 5 3 6 1 5 7 9

Contact

DAMGEO LTD Damien Caldwell
Telephone: 07809401589
Email: damien.caldwell@damgeo.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No service constraints.
System requirements
No system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 hours between 09:00 to 17:00 Monday to Friday and within 24 hours at all other times, including weekends and bank holidays.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
To test web chat accessibility, we recruited assistive technology users.

Created test scenarios covering key functions.

Set up a comfortable testing environment with needed assistive tools and the web chat application.

Guided participants to complete tasks while using their assistive technology, noting challenges and feedback.

Gathered insights through interviews or surveys post-testing.

Analysed results for usability and accessibility issues.

Iterated on improvements based on findings.

Documented findings, actions, and recommendations for ongoing improvement.
Onsite support
Yes, at extra cost
Support levels
Basic Support Level:
Cost: Included in the base subscription fee.
Features: Standard email support during business hours, typically with responses within 24-48 hours. Access to a knowledge base and community forums for self-service assistance.
Technical Account Manager/Cloud Support Engineer: Not provided at this level.

Advanced Support Level:
Cost: Additional 20% of the subscription fee.
Features: Priority email and phone support during extended business hours, usually with responses within 12-24 hours. Access to a dedicated support portal with enhanced resources and documentation.
Technical Account Manager/Cloud Support Engineer: Assigned technical account manager for proactive assistance and guidance.

Enterprise Support Level:
Cost: Additional 40% of the subscription fee.
Features: 24/7 phone and email support with guaranteed response times, such as 1 hour for critical issues. Access to a dedicated support hotline. Quarterly business reviews, personalised support escalation paths, on-site training, and priority access to new features.
Technical Account Manager/Cloud Support Engineer: Dedicated cloud support engineer available for immediate assistance and proactive support.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
For onsite training, we deploy experienced instructors to conduct interactive workshops tailored to specific user needs. Online training modules offer flexibility, accessible anytime, anywhere, with interactive elements to enhance engagement. User documentation comprises clear, concise guides and tutorials, accessible via the platform, ensuring seamless navigation and maximising user adoption. Through this multi-faceted approach, we ensure comprehensive support, catering to diverse learning preferences and enabling users to harness the full potential of our system effectively.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
When the contract concludes, users can effortlessly extract their data through our intuitive interface. Simply navigate to the 'Data Export' section within your account settings. From there, select the desired data format – whether CSV, Excel, or PDF – and specify the timeframe or categories for extraction. Our system swiftly compiles the requested data into a downloadable file, ensuring a seamless transition. Additionally, users have the option to utilise our dedicated support team for assistance throughout the process. With this streamlined approach, users retain full control over their data, facilitating continuity and enabling smooth transitions to alternative platforms or storage solutions.
End-of-contract process
There are no additional costs at the end of a contract, unless the client requests and agrees to additional services.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
No

Scaling

Independence of resources
To ensure users aren't affected by fluctuating demand, we employ robust infrastructure and scalable resources. Our system is designed to dynamically allocate resources based on demand, preventing performance degradation during peak usage. Additionally, we implement load balancing techniques to evenly distribute user requests across servers, maintaining optimal response times for all users. Continuous monitoring and proactive capacity planning enable us to anticipate spikes in demand and adjust resources accordingly. Moreover, we prioritise reliability and performance optimisation, investing in redundancy and failover mechanisms to mitigate potential disruptions. With these measures in place, users can rely on our service, independent of demand.

Analytics

Service usage metrics
Yes
Metrics types
With our system, users gain access to comprehensive service usage metrics, offering invaluable insights into their career development journey. Metrics include engagement levels such as frequency of logins, duration of sessions, and modules completed. Additionally, we track user interactions with personalised recommendations, providing feedback on the relevance and effectiveness of our guidance. Performance metrics measure outcomes, including job applications submitted, interviews secured, and career advancement milestones achieved. These metrics enable users to track progress, identify areas for improvement, and make informed decisions. Through data-driven analytics, we empower users to optimise their career strategies and maximise their potential for success.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Clients can easily export their data upon contract completion. Within the platform's settings, locate the 'Data Export' feature. Here, users select the desired format (CSV, Excel, or PDF) and specify parameters like date range or categories. The system swiftly compiles the chosen data into a downloadable file. Our user-friendly interface simplifies the process, ensuring accessibility for all skill levels. Additionally, our support team stands ready to assist throughout. This streamlined approach grants users autonomy over their data, facilitating seamless transitions and preserving valuable insights beyond the contract period. It's our commitment to empowering users every step of the way.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our service level agreement (SLA) guarantees a minimum level of availability to ensure users receive consistent access to our platform. We commit to maintaining a 99.9% uptime, calculated monthly. In the event that we fail to meet this standard, users are eligible for a refund based on the duration of the outage.

Refunds are calculated proportionally to the duration of the downtime. For example, if the platform experiences an outage lasting one hour, users are refunded for the equivalent fraction of their subscription fees covering that hour. Refunds are automatically credited to users' accounts within 30 days of the outage.

To ensure transparency and accountability, outage incidents are promptly communicated to users via email notifications and posted on our status page, along with updates on resolution efforts. Additionally, users have access to historical uptime data and outage reports for full visibility into platform performance.

We continuously monitor our infrastructure, employing redundant systems and proactive maintenance to minimise downtime risk. Our dedicated support team is available 24/7 to swiftly address any issues that arise, prioritising rapid resolution to uphold our commitment to availability and user satisfaction.
Approach to resilience
Our data centre setup is meticulously designed for resilience, ensuring uninterrupted service even in the face of potential disruptions. We operate redundant systems across multiple geographically dispersed data centers, minimising the risk of single points of failure. Each data center is equipped with backup power supplies, including generators and uninterruptible power supplies (UPS), to maintain operations during power outages.

Furthermore, our network architecture incorporates redundant connections from multiple internet service providers (ISPs) to mitigate the impact of network failures. Data replication mechanisms and regular backups safeguard against data loss, with failover systems in place to swiftly redirect traffic in the event of hardware or software failures.

Continuous monitoring and automated failover processes enable rapid response to incidents, with our dedicated operations team ready to intervene if necessary. Regular testing and simulations ensure readiness for various scenarios, allowing us to proactively identify and address vulnerabilities.

By prioritising resilience in our datacenter setup, we provide users with confidence in the reliability and stability of our platform, even under adverse conditions.
Outage reporting
Our service promptly communicates any outages through multiple channels, ensuring transparency and timely updates for users. We maintain a public dashboard accessible to all users, providing real-time status updates on platform availability and performance. This dashboard displays current system status, ongoing incidents, and historical uptime data for reference.

In addition to the public dashboard, users receive email alerts notifying them of any outages or service disruptions. These alerts include details such as the nature of the issue, estimated resolution time, and steps being taken to address it. Users have the option to subscribe to email notifications for specific types of incidents or updates tailored to their preferences.

Our goal is to keep users informed and empowered during outages, minimising impact and facilitating proactive communication. By leveraging both a public dashboard and email alerts, we ensure that users have access to timely information and can stay informed about any developments affecting our service.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We restrict access to management interfaces and support channels through strict access controls, employing role-based permissions and multi-factor authentication. Only authorised personnel with a legitimate need should have access to sensitive functions and data. Access to management interfaces is limited to designated administrators, while support channels are accessed through authenticated accounts with restricted privileges. Regular audits and reviews ensure compliance with access policies and identify any unauthorised access attempts for immediate remediation.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security governance is approached comprehensively, with clear policies, procedures, and controls established to protect sensitive data and mitigate risks. This includes regular risk assessments, compliance with industry standards, robust access controls, encryption protocols, and ongoing employee training. A dedicated security team should oversee implementation and enforcement, ensuring continual improvement and adaptation to emerging threats.
Information security policies and processes
We should adhere to a set of comprehensive information security policies and processes to safeguard our system and data. This includes policies covering data classification, access control, encryption, incident response, and employee training. A clear reporting structure should be established, with a designated Chief Information Security Officer (CISO) overseeing security operations and reporting directly to senior management or the board.

To ensure policy adherence, regular audits and assessments should be conducted, with findings reported to management for review and action. Access controls and monitoring systems should be implemented to track user activity and detect unauthorised access or breaches. Additionally, continuous employee training and awareness programs should reinforce security protocols and best practices. Regular updates to policies and procedures should be made in response to evolving threats and regulatory requirements, with a mechanism in place to communicate changes effectively throughout the organisation. By prioritising adherence to established policies and processes, we can maintain a robust security posture and mitigate risks effectively.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We implement a robust configuration and change management process to track service components throughout their lifecycle. This includes maintaining a centralised repository of configurations, documenting changes, and conducting thorough impact assessments, especially for security implications. Changes should undergo rigorous testing and review before implementation, with a focus on minimising disruption and ensuring continuity of service. By adhering to these processes, we can effectively manage and mitigate risks associated with changes to our system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We adopt a proactive vulnerability management process, continuously assessing potential threats to our services through regular security scans, penetration testing, and threat intelligence feeds.

Upon identifying vulnerabilities, we prioritise them based on severity and deploy patches swiftly through automated mechanisms. Information about potential threats is sourced from reputable security advisories, industry forums, and threat intelligence platforms, enabling us to stay ahead of emerging risks and maintain a secure environment for our services.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring process involves real-time monitoring of system activity, network traffic, and user behaviour to swiftly detect potential compromises. We utilise intrusion detection systems, anomaly detection algorithms, and log analysis to identify suspicious activities.

When a potential compromise is detected, we initiate a predefined incident response plan, involving isolation of affected systems, investigation to determine the extent of the breach, and remediation to mitigate further damage. Our response is swift, aiming to contain and resolve incidents within minutes to hours, depending on severity, to minimise impact and ensure the integrity and availability of our services.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management process entails pre-defined procedures for common events, outlined in our incident response plan. Users report incidents through a designated portal or contact point. Upon receipt, incidents are categorised, prioritised, and assigned to appropriate response teams.

We provide incident reports promptly after resolution, detailing the nature of the incident, actions taken, and preventive measures. For common events, standardised workflows expedite resolution. Complex incidents undergo thorough investigation, with findings documented for continuous improvement. Our transparent approach ensures timely communication and fosters trust in our ability to manage and mitigate incidents effectively.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

This system can contribute to tackling economic inequality in several ways. Firstly, by providing personalised career guidance and support, it empowers individuals from diverse backgrounds to make informed decisions about their professional paths, potentially leading to better job opportunities and higher incomes. By offering tailored advice based on machine learning algorithms, it can address the unique challenges and barriers faced by disadvantaged groups, such as minorities or individuals from low-income backgrounds.

Moreover, the system can help bridge the skills gap by identifying relevant training and development opportunities for users, regardless of their socio-economic status. Access to such resources can enhance employability and enable individuals to compete more effectively in the job market, thereby reducing disparities in income and opportunity.

Additionally, by offering both onsite and online training modules, the system ensures accessibility for users regardless of their geographical location or mobility constraints. This inclusivity can benefit marginalised communities with limited access to traditional career support services.

Furthermore, by providing transparent reporting on service usage metrics and outcomes, the system promotes accountability and allows stakeholders, including policymakers and advocacy groups, to track progress in addressing economic inequality. This data-driven approach facilitates evidence-based decision-making and targeted interventions to support those most in need.

Overall, by democratising access to career guidance, training, and support services, this system has the potential to level the playing field and create more equitable opportunities for economic advancement, ultimately contributing to a more inclusive and prosperous society.

Equal opportunity

This system can significantly contribute to promoting equal opportunity for all by providing personalised and tailored career guidance and support. Through machine learning algorithms, the platform can analyse vast amounts of data to identify trends, patterns, and opportunities that might otherwise be overlooked. This ensures that individuals from all backgrounds, regardless of race, gender, socio-economic status, or other factors, receive fair and equitable access to resources and opportunities.

Firstly, by offering personalised career advice, the system can cater to the unique needs, interests, and strengths of each individual, rather than relying on generic recommendations that may not be relevant or accessible to everyone. This personalised approach helps to level the playing field, allowing individuals to explore a wide range of career options and make informed decisions based on their own aspirations and capabilities.

Moreover, the system can help address systemic biases and barriers that often hinder equal opportunity in traditional career guidance and support services. By leveraging machine learning, the platform can identify and mitigate biases in the data and algorithms, ensuring that recommendations are based on merit rather than preconceived notions or stereotypes. Additionally, the platform can provide targeted support and resources to underrepresented groups, helping to address disparities in access to education, training, and employment opportunities.

Furthermore, the platform's accessibility features and multi-channel support ensure that individuals with disabilities or those facing other challenges can fully participate and benefit from the system. This inclusivity fosters a more diverse and equitable workforce, where individuals from all backgrounds have the opportunity to thrive and contribute to their full potential.

Overall, by leveraging technology to provide personalised, unbiased, and accessible career guidance and support, this system can play a crucial role in advancing equal opportunity for all, helping to create a more inclusive and equitable society.

Wellbeing

This system can significantly contribute to enhancing wellbeing in several ways. Firstly, by providing personalised career guidance and support, individuals can make more informed decisions about their professional paths, leading to greater job satisfaction and fulfillment. When people are engaged in work that aligns with their interests and skills, they tend to experience higher levels of overall wellbeing.

Moreover, the platform can assist users in navigating career transitions, whether it's switching jobs, industries, or even pursuing further education. This guidance can alleviate stress and anxiety associated with uncertainty about the future and empower individuals to take proactive steps towards their goals.

Additionally, by offering access to online training resources, the system promotes continuous learning and skill development. Research has shown that engaging in lifelong learning not only enhances professional growth but also contributes to cognitive health and overall wellbeing. Learning new skills can foster a sense of accomplishment and self-efficacy, which are important factors in promoting mental wellbeing.

Furthermore, the system's support channels and community features can provide users with a sense of belonging and connection. Networking with peers, mentors, and career coaches can offer emotional support, encouragement, and valuable insights, particularly during challenging times such as job loss or career transitions.

Finally, the platform's emphasis on data security and privacy ensures users' peace of mind, knowing that their personal information is protected. This can help alleviate concerns about privacy breaches and identity theft, which are increasingly common in the digital age.

In summary, this system has the potential to enhance wellbeing by empowering individuals to make informed career decisions, facilitating skill development, fostering a sense of community, and prioritising data security. By addressing various aspects of professional and personal development, the platform contributes to overall life satisfaction and happiness.

Pricing

Price
£4 to £10 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at damien.caldwell@damgeo.com. Tell them what format you need. It will help if you say what assistive technology you use.