Skills development platform
Skills mapping platform, built to layout for IT leaders, L&D leads and HR departments the digital skills existing within your organisation. Build role profiles, career pathways and demonstrate development opportunities for your staff, all built around the SFIAplus framework, or your own frameworks such as Government Digital and Data..
Features
- Real-time reporting
- Remote access
- Additional frameworks can be added and used for role creation
- Industry standard role profiles
- Visibility of skills currently within the organisation
- Creation of development lists and plans
- Single sign on functionality available
- Benchmarking against frameworks
- Benchmarking against multiple role profiles
- Access to SFIAplus framework
Benefits
- Ability to focus learning budgets on priority areas
- Increase staff retention
- Industry standardised role profiles for all users
- Can be used across multiple departments within an organisation
- Visibility of skills needed for the future
- Assist with organisation planning
- Career pathways
Pricing
£3,830 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 5 9 3 6 4 9 6 0 8 5 7 9 2
Contact
BCS LEARNING & DEVELOPMENT LIMITED
Nicole Church
Telephone: 01793417493
Email: nicole.church@bcs.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Notification will be sent to key contacts ahead of planned down time and updates provided on unplanned downtime.
- System requirements
-
- System license to access the tool
- User licenses for each user to log into the system
- Latest version of Edge or Chrome
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Responses within 1 working day. Working day is 9am - 5pm Monday to Friday except for Bank Holidays and from Christmas Eve to the first working day of the New Year.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Project management and account management support available throughout deployment of the system within an organisation. General query support is included as part of the deployment and agreed proposal/contract.
Technical support is available for escalated issues where the query cannot be resolved by project manager or account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite, virtual and training documentation is available to users to access the system and carry out the required activities. On initial deployment of the system BCS will upload user details and trigger a registration email to be sent to users, users will need to register including setting up of a password before access the system.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Word
- Videos
- End-of-contract data extraction
- Exports available in the system for details to be exported ahead of end of contract date.
- End-of-contract process
- BCS will clear all data from the system for the client at the end of the contract. There is no extra cost for this.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Web browser interface
Users will be set up in the system and sent a registration link to be able to access the system to carry out role profile creation, framework and role profile benchmarking.
Security levels are set within the system to restrict who is able to see users details and the ability to make changes to the contents of the system - role profiles, organisation frameworks - Government Digital and Data. - Accessibility standards
- None or don’t know
- Description of accessibility
- Using a URL
- Accessibility testing
- We are working towards ensuring the system is WCAG 2.1AA compliant and will be carrying out the testing needed to achieve the standard.
- API
- No
- Customisation available
- Yes
- Description of customisation
- Deployments of RoleModelplus will be scoped and tailored to the customers requirements - completion date, budget and approach. Train the trainer is available for certain sections of a deployment.
Scaling
- Independence of resources
- We guarantee the system to be available 98% of the time. Clients have their own unique site and usage is monitored by BCS.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Last user log in details, also developing the system to provide details of changes in skills gaps over time.
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Using the export options available in the system. Reports can be run and exported by Customer Administrators.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Word
- Xls
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We guarantee the system to be available 98% of the time. Clients have their own unique site and usage is monitored by BCS.
- Approach to resilience
- Available on request
- Outage reporting
- Email notification and message on the log in page to the system
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Security levels for all users can be set by BCS/client administrator to ensure only those users who need additional access are provided with access. Users can only access the system once set up and have registered to use the system. A registration email will be sent to all users to set their access up and set a password.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Lloyds
- PCI DSS accreditation date
- 12/06/2023
- What the PCI DSS doesn’t cover
- Details available on request
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Mandatory training for all staff on security policies. Security policies and processes are available to all staff through an intranet page and if needed from their manager.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Software components are tracked through Git repository version control. IaaS components are managed via AWS Systems Manager. New sites are pen tested and then again after major changes. All systems get regular vulnerability scans.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Systems are frequently or continually scanned using vulnerability scanning tools. New sites and new infrastructure are pen tested and then again after major changes. High and Critical level security patches are always applied within 14 days of release. Threat information comes from our suppliers (WAF, Managed IDS etc), NCSC Web Check findings, monitoring of supplier security blog posts and general IT security news.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- On call team available 24/7 to receive and immediately respond to security alerts from our own alarms (e.g. root access using, unusual authentication errors) and from our Managed Detection & Response (IDS) provider. Security log data such as WAF logs are regularly reviewed and potential threats mitigates with new WAF or rate limiting rules.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Procedure is reviewed at least annually and covers:
Unplanned interruption to IT service, reduction in the IT quality, configuration failure item that has not yet affected an IT service but may do in future.
Pre-defined incident procedure exists for ownership, categorisation, prioritisation, investigation, resolution, escalation, documentation, and closure of incidents. Malware response procedures applied if the categorisation of the incident requires.
Incidents are reported via:
Alerting monitors and alarms
Users of services report incidents to Service Desk in person, by telephone or by email.
Incident reports created and reviewed by assigned owner of incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Cycle to work and car share schemes are in place and staff encouraged to use them. Lightening in the offices are controlled and lighting is split into sections ensuring lights are only on in areas they are needed.Equal opportunity
BCS has an equal opportunity policy in place ensuring no-one is discriminated against for their sex, marital status, age, religion, colour, race, nationality, ethnic origin or disability.Wellbeing
Wellbeing support is available to all BCS staff to help with mental and physical health. There are a number of mental health trained first aiders with additional training being provided to managers.
Pricing
- Price
- £3,830 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full access to the system for two weeks. Deployment option made available will be agreed with account manager and client.