View360Global. Immersive & Experiential Learning Platform (Multilingual)
View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising
Features
- Facilitator-led training both in-person and remotely
- In built video functionality
- Instant monitoring & evalaution
- Engaging multimedia content formats: text, audio and video
- Multilingual participation (100+ languages)
- Downloadable reports in both native and translated languages
- Web browser access - no additional software required
- Facility to include observers to contribute to learning
- Intuitive interface and easy to use by all demographics
- Use on Laptop or Desktop only
Benefits
- Improves cognitative retention
- Immerses and engages participants
- Safe learning environment for critical decision making
- Ideal for training & exercising up to board level
- No geographical or linguistic barriers to delivery
- Enables agile debriefing and reduces training time
- Avoids traditional learning methods and brings learning to life
- Provides time and cost effective training options
- Benefits an organisation training home workers
- Government standard encryption provide reassurance
Pricing
£14,995 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 2 9 5 4 7 2 3 8 2 5 2 9 4 9
Contact
COGNITAS GLOBAL LIMITED
Lawrie Day
Telephone: 01474 555507
Email: hello@cognitasglobal.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Windows Laptop / Desktop or Mac Laptop / Desktop
- Video camera and microphone in hardware (preferably inbuilt)
- Windows or Mac OS
- Chrome / Firefox or Edge Browser Access
- Internet Access - Minimum 5mbps+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We can respond within 30 minutes if urgent with direct access to a support person. High priority is 1 hour, medium - 2 hours and Low - 4 hours. This is stated with our Service Level Agreement (SLA).
Response times are the same at weekends. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide either offsite or onsite support. The nature of the architecture of the platform means that resolution should be achieved by offsite support as we use no installed hardware for the user.
All offsite support of free of charge
On site support is charged at £100 +VAT per hour plus travel expenses (if beyond 50 miles) and will be provided by a cloud / platform Support Engineer - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- As part of our service we provided on or off site training for users with additional support programs that are negotiated within the licence fee, depending on organisational requirements. Training recipients receive user documentation which they retain. We are currently reviewing our online user documentation and media strategy but its use is not predicated on the existance of online user materials.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Users have the option of downloading data that they have uploaded to the platform.
We ensure that all data that is required by the organisation is supplied if requested then having given an appropriate notice period off no less than 1 month we will delete all data in accordance with GDPR provisions - End-of-contract process
-
The Licensee agrees that the Licensor does not retain any content used or stored within the cloud-version of the Product and this is the responsibility of the Licensee to maintain backed-up copies at all times. At the conclusion of the contract (as specified in the EULA) the licensee shall ensure that prior to the termination date, all content has been downloaded from within the Product and safely saved or stored in a location of the Licensee’s election.
The processing of data for the purposes of using the immersive learning platform is included in any licence fee or consultancy arrangement and there are no further or hidden charges for date retention, management or disposal. All data relating to the client is deleted at the end of any contract. There are no charges for the offboarding of a client
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- We offer a service to brand the interface and platform and provide a customised URL for each client. We provide these services, the client cannot do this themselves
Scaling
- Independence of resources
- We are using AWS serverless technologies which enable limitless automatic scaling of resources and therefore this has no impact in terms of affecting other users performance
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Users have a feature to download the media that they originally upload in to the platform and can download. The media is uploaded in JPEG, PDF, MP3 and MP4 files.
Following the running of a session, a session log is created within the platform that can be downloaded in Word format. If the user has participated in a native language then the log can be download as a verbatim version (capturing all languages used) and also downloaded into a translated version where Google Translate API has been used to translate the text. No other data is exportable - Data export formats
- Other
- Other data export formats
-
- PDF/A1
- MS Word
- Data import formats
- Other
- Other data import formats
-
- MP3
- MP4
- PDF/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We have an SLA that details our sets out the that the assumption that the platform is available 24 hours per day, 365 days per year, together with the service and support arrangements.
Licence holders and those using the platform under the provison of a consultancy services contract are protected by clauses written within the EULA and contracts relating to breaches of both. - Approach to resilience
- Available on request
- Outage reporting
-
In additon to our system being monitored by our development team, our system will provide alerts by email. Email alerts are a crucial component of our outage reporting mechanism. We configure automated alerts to notify designated stakeholders via email in the event of a service outage or performance degradation.
These email alerts include details such as the nature of the outage, affected components or services, estimated time to resolution (if available), and any mitigating actions being taken by the operations team.
Stakeholders receiving these alerts typically include members of the operations team, technical support staff, product managers, and other relevant personnel responsible for incident response and communication
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- All management interfaces and support channels are accessed using username and password controls. We are in the process of implementing 2 factor authentication. All users are regulalry referred to NCSC advice resources such as - https://www.ncsc.gov.uk/collection/passwords/updating-your-approach
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Certificated NCSC CIE Provider (using platform)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We adopt the principle of ISO27001.
We have also recently been scrutinised in respect of our governance by CREST on behalf of the NCSC as part of our successful application to become an NCSC Assured and Certified Provider of Cyber Incident Exercising (CIE) - https://www.ncsc.gov.uk/organisation/cognitas-global-ltd/about-cognitas-global-ltd - Information security policies and processes
-
Our processes are supported by company policies that cover the following:
GDPR and the UK Data Protections Act 2018 and the processing and management of all data.
Access to sensitive data and systems is likely restricted based on job roles and responsibilities. This minimises the risk of unauthorised access or misuse of information and is adhered to as part of our Cyber Essentials criteria.
Employees are trained on information security best practices, including password management and phishing awareness. This empowers employees to identify and avoid security risks.
As part of our application become Assured NCSC CIE providers (https://www.ncsc.gov.uk/organisation/cognitas-global-ltd/cyber-incident-exercising) we were subject of scrutiny of all of our information security policies and demonstrated to a high standard that we have the necessary policies and processes in place.
As an SME, our reporting procedure is simple and the CEO is informed directly of any incident or security matter. he will then deal with the matter in accordance with our company incident management plans and policies. He is also the Data Manager and will make any disclosures if required to the ICO
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We utilise a version control system like Git to track changes to our codebase. Each component of our services, including backend APIs, frontend interfaces, and databases, is stored in repositories. We use dependency management tools like npm to track and manage external dependencies for our codebase. This ensures that we can easily reproduce the environment and dependencies required for each component. All code changes are recorded. Any change to the platform goes through a formal change request process considering rationale and impact, implementing peer review and QA, testing and ensuring a rollback plan in the event of unforseen issues
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The architecture does not invite many vulnerabilities. However, the application is hosted on the AWS platform which mitigates any potential vulnerabilities that. But, for third-party packages that we do install and use within our software, we use npm-audit to report any known vulnerabilities. If any vulnerabilities are found, then the impact and appropriate remediation will be calculated, and we can apply remediations accordingly. Our software, deployed to AWS, is regularly updated.
https://docs.npmjs.com/cli/v10/commands/npm-audit - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use AWS GuardDuty which is capable of analysing over a trillion Amazon Simple Storage Service (Amazon S3) events per day to monitor and detect suspicious activities. We continuously monitor network activity, starting with VPC Flow Logs, from serverless workloads to detect threats such as AWS Lambda functions maliciously repurposed for unauthorised cryptocurrency mining or compromised Lambda functions that are communicating with known threat actor servers. In the extremely unlikely event of finding a potential compromise we would immediately lock down the service, triage the issue and prohibit access until it was resolved, ensuring to communicate with our stakeholders
- Incident management type
- Supplier-defined controls
- Incident management approach
- We have predefined processes for incidents (although not common to our operations in our experience) that include, system outages, performance issues, security incidents and content delivery issues. Potential issues such service downtime and resource overload is mitigated by the fact we are using AWS cloud services, such as DynamoDB and Lambda. Our licence holders can report issues directly to our team by email or phone or via our online ticketing system and where we use the platform for consultancy related delivery our staff are on site.We provide written feedback to our users and maintain our own case incident reports
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are committed to achieving Net Zero emissions and aligning with the UK Government's ambitious targets of 85% progress by 2035 and Net Zero by 2050.
In 2022 Cognitas Global Ltd commissioned a Carbon Footprint Report from Sustainability and Business Services Ltd. The carbon emissions data is based solely on electricity consumption as there is no gas supply to the shared business centre we operate from. The report calculated that Cognitas Global Ltd has a Scope 1 & 2 carbon footprint of 7.88 tCO2e for the year 01.01.21 to 31.12.21. Since this report Cognitas Global Ltd has consolidated its office usage from 3 to 2 offices which will have further reduced the carbon footprint. In addition, we can visit client sites using electric vehicles thanks to the company's salary sacrifice EV scheme.
We have also reviewed our working from home practice and have implemented a policy that provides for at least 30% of our staff to reduce their carbon footprint in terms of transportation by working more days from home.Tackling economic inequality
We can combat economic inequality by focusing on our employees and business practices. We can ensure fair wages and competitive benefits that offer financial security. We can strive for a diverse and inclusive workforce through unbiased recruitment and equal opportunities for advancement. By investing in training and development programs, we empower employees to reach their full potential and increase their earning power. Offering flexible work arrangements can improve work-life balance, particularly for those with childcare needs or juggling multiple jobs.Equal opportunity
Cognitas Global has a diverse workforce and fosters a continuous learning environment for its employees. This commitment is underscored by five core values: Security, Respect, Opportunity, Fulfilment, and Effective Voice. We are conscious, as a Small Medium Enterprise that retention of staff and operational effectiveness relies on a well-paid and valued workforce. Our company has a suite of polices that are designed to protect the rights of employees and support them. We do not engage anyone on zero hours contracts.Wellbeing
We are a certified disability confident employer and have afforded both physical and metal wellness support through external programs to our staff. We employ a flexible working program for all our staff. We do not ‘fire and rehire’ people. Staff retention for a SME is critical to the business so we offer our staff programs of development, incentivisation and reward in addition to building team spirit through external events
Pricing
- Price
- £14,995 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No