SwiftTrack Assessment: LMS/CPD/eTRB
SwiftTrack Assessment is a business tool that allows managers to assess teams against a predefined list of requirements. It can be used as a powerful but simple to use training record for staff; giving organisations the ability to easily track and monitor competence and performance standards.
Features
- Works fully offline and syncs when connected to internet
- Work either app or desktop-based
- Fully customisable to your way of doing things
- Scaleable to your requirements
- Write your own attainments, competencies and resources
- Mobile, cloud-based assessment and learning resources
- Full HD Video, photo and audio-based evidencing as standard
- Ready to use right out of the box
- Customisable to your requirements
- Unlimited possibilities designed to work in any industry or application
Benefits
- Empower employees, trainees and assessors to perform assessments
- Quickly view progress of groups of people in one place
- Schedule assessments and set reminders to optimise time
- Share achievements, progress and accreditations with 3rd parties
- Record, access and share rich media evidencing of attainments
- Available on any modern mobile device
- Offer staff an ongoing CPD manager
- Give staff and assessors access to learning materials and resources
Pricing
£19.50 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 0 8 5 6 6 2 5 6 3 1 0 4 7 4
Contact
SwiftTrack
Matthew Riley
Telephone: +44 (0)800 689 3682
Email: enquiries@swifttrack.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Moodle, Xero
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Android V7+
- IOS 9+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Mon-Fri within an hour, when available on weekends
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
In addition to the support included in the standard set-up, SwiftTrack offers a range of additional services that can be purchased as and when required.
Additional training can be provided: £500/day
Additional content creation: £45/hour
10 hour additional support package: £400
20 hour additional support package: £700 - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide onsite training, a start pack and online training if required is available via Teams/Zoom.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- They can export all data into an excel spreadsheet, and visually as PDFs.
- End-of-contract process
-
These services are part of the contract:
• Initial project specification
• Data input
• 1 day's onsite training
Paid for:
• If required: Software development, including additional functionality
• If required: Additional training
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile application is designed for evidence gathering and self assessment. It gives users working in remote locations or without internet access the ability to still work and then sync data when they get internet connection.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- The API is a read only feature that allows data to pass to Moodle and accounting applications, such as Xero. It can also be configured to work with various CRM systems.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
The service is highly customisable, in terms of the Interface design, termininology and functionality.
Users have an admin panel from where they can perform customisation
Super administrators are the only ones with access to these tools
Scaling
- Independence of resources
- We use a scaleable cloud model
Analytics
- Service usage metrics
- Yes
- Metrics types
-
• Data storage
• User count
• Completion levels
• Bespoke metrics - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- A simple export to excel feature
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We guarantee that downtime will not exceed 8 hours in one year, which is > 99.9% uptime. We would discuss refunds on a case-by-case basis if it were ever to become an issue.
- Approach to resilience
- The service is housed on an extremely resiliant system architecure, with multiple fallbacks and self-healing properties. For security reasons we don't give this infortmation publicly but in certain cirtumstances we can make it available.
- Outage reporting
- Via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We don't do this.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
We have the following policies and processes in place, we ensure policies are followed by staff by providing adequate training and review processes. Infringments of policies relating to users are dealt with on a case-by-case basis,
Acceptable Use Policy
Security Awareness and Training Policy
Change Management Policy
Incident Response Policy
Remote Access Policy
Vendor Management Policy
Password Creation and Management Policy
Network Security Policy
Data Retention Policy
GDPR Policy
Mobile Device Management (MDM) Policy and Procedures
Bring Your Own Device (BYOD)
Encryption and Decryption Policy
SPAM Protection Policies
System Maintenance Policy
Vulnerability Management Policy
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We are currently reviewing our change management process with a third-party consultant, this will be completed and available from the 25th of May.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We are currently reviewing our vulnerability management process with a third-party consultant, this will be completed and available from the 25th of May.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We have bespoke software in-place to monitor any compromises or potential compromises. It uses an algorythmic approach and simulates prospective attacks or system failures which would lead to a compromise.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a fully documented incident management approach, for which we offer training as part of an induction. This document is fully available internally.
We report any data breaches, which lead to personal data being exposed, to the ICO.
Any incedents are written up and logged internally.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
N/A - Covid-19 recovery
-
Covid-19 recovery
N/A - Tackling economic inequality
-
Tackling economic inequality
N/A - Equal opportunity
-
Equal opportunity
N/A - Wellbeing
-
Wellbeing
N/A
Pricing
- Price
- £19.50 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 1 months free trail - fully functional.