Skip to main content

Help us improve the Digital Marketplace - send your feedback

Infosys Limited

AI powered learning solution and Talent Transformation - Infosys Wingspan

Infosys Wingspan is a Next-Gen AI-Powered Learning Solution That Helps Organisations Accelerate Their Talent Transformation Journey. A Cloud-First And Mobile-First Solution That is Designed to be Accessible Anytime, Anywhere and on Any Device. Organisations Using Wingspan can Facilitate a Culture of Learning and Collaboration for Employees.

Features

  • Synchronous Learning
  • Social Learning
  • Informal Learning
  • Schedulo – Scheduling calendaring
  • Content Recommendations
  • Quiz App
  • Virtual proctoring
  • Asynchronous Learning
  • Gen AI features
  • Learning pathways Navigator

Benefits

  • Anytime, Anywhere, Anydevice LEARNING
  • Impactful learning initiatives driven with insights
  • Curated evolving library. In-built authoring tool to create courses
  • leadership/strategy communication through live/recorded videos,podcasts
  • Collaborate with peers, experts. Create and share Learning Playlists.
  • Aggregate, integrate Organization Knowledge. Explore related topics and concepts
  • VIRTUAL LEARNING ASSISTANT-Powered by ML guided learning
  • Validate learning and hands-on capabilities anytime, anywhere
  • Fail safe environment to practice and code. ‘Simulated Labs’
  • Guided customised learning paths based on roles, skills, domain

Pricing

£32,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ukps@infosys.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 3 5 5 2 6 5 2 9 6 6 7 9 5 0

Contact

Infosys Limited Peter Gill
Telephone: +44 7391393866
Email: ukps@infosys.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Wingspan Platform is available as SaaS model on Public cloud only.
System requirements
  • Wingspan Platform is available as SaaS model on Public cloud.
  • HTML5 compliant Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs for different types of queries would be agreed with the client and the same would be adhered to
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support levels and coverage can be agreed with our customers based on their individual requirements
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation is provided as a part of the platform. We also do enablement sessions for users to get familiar to the platform and also to adopt the platform faster.
Service documentation
Yes
Documentation formats
Other
Other documentation formats
Github
End-of-contract data extraction
Individual users cannot extract data, however, at the end of the contract all user data will be downloaded and a dump of the same will be provided to the client
End-of-contract process
At the end of contract Wingspan instance will be decommissioned. Data dump would be provided to client. The end-of-the contract data dump is included in the contract

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference between mobile and desktop
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
N/A
Accessibility standards
None or don’t know
Description of accessibility
WCAG 2.1
Accessibility testing
We are happy to provide details depending on individual client requirements
API
Yes
What users can and can't do using the API
The platform is built on the API architecture and any APIs to be exposed for specific functionality will be developed by Wingspan Technical Team. The users can not make any setup/changes to the service through API
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The platform follows a multi-tenancy architecture and is built for internet type scale.

Analytics

Service usage metrics
Yes
Metrics types
Learning Analytics available through real time dashboards on Wingspan.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
The data is encrypted on rest and isolation is done between tenants by using different buckets and services for each client. Content on Wingspan exists primarily on AWS S3 and protected using the Amazon SSE-KMS where the keys used for encryption can be created, managed and rotated.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can not export their data. The data dump will be provided at either the end of the contract or at contract termination
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • Videos, courses, knowledge documents, case studies, podcasts
  • Create or extend content player to suit newer content formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
We have access restrictions that can be implemented through roles on the platform. This ensures to have access provided only to authorized personnel within the platform

Availability and resilience

Guaranteed availability
99.5%
Approach to resilience
Content on Wingspan exists primarily on AWS S3 and protected using the Amazon SSE-KMS where the keys used for encryption can be created, managed and rotated. The data is encrypted on rest and isolation is done between tenants by using different buckets and services for each client.

Database and user related data:
Database isolation on Wingspan is available on two models

1. Integrated Model
This is the default and common approach followed by Wingspan. The data of all clients exists on the same Database server and the isolation is done using the tenant ids among the different clients.

2. Isolated Model
In this model, Wingspan can be configured to connect to databases for each client separately where a client can be provided with a separate database.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication
Infosys supports two factor authentication to access any of client data. Access to client data is possible only within the Infosys network and to connect to the Infosys network, employees/contractors will have to connect through VPN using a two factor authentication. However, just this does not guarantee access to client data. Further access to client data is only for authorized users (an additional factor of authentication)
Access restrictions in management interfaces and support channels
Wingspan supports Form based authentication and Single Sign-On using MFA. Wingspan can be configured for MFA using Microsoft Azure AD. Apart from Azure AD, Wingspan can connect to other OAuth (Open Authorization) identity providers like Google, Twitter, Facebook, Instagram, Microsoft to name a few Wingspan websites is secure throughout by using HTTPS encryption.
Wingspan supports Form based authentication and SSO using Multi-Factor Authentication (MFA). Wingspan can be configured for MFA using Microsoft Azure AD. Apart from Azure AD, Wingspan can connect to other OAuth identity providers. Wingspan websites is secure throughout by using HTTPS encryption.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Bureau Veritas Holding SAS - UK
ISO/IEC 27001 accreditation date
2017
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The anti-advanced persistent threat (Anti- APT) solution based on FireEye’s web, email, endpoint, and file threat prevention platforms aim to defeat advanced targeted APT attacks, advanced malware, zero day, and known advanced threats. It also aggressively evades signature-based defenses and supplements traditional and next-gen firewalls, intrusion prevention system (IPS), antivirus, and gateways. Additionally, it also takes care of integrated multistage protection against today’s multi-vectored web, email, endpoint, and file-based advanced threats

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Provides systematic approach to control life cycle of all changes, facilitating beneficial changes to be made with minimum disruption to IT services. Change Management offers ITIL-aligned processes for normal, standard, and emergency change types.
Normal change: Follows complete change lifecycle including peer or technical approval, management, Change Advisory Board (CAB) authorization before being implemented, reviewed, closed.
Standard change: Frequently implemented, repeatable implementation steps, low risk, proven history of success.
Emergency change: Covers fix on fail or retroactive situations where impact to service has been experienced or fail situations where the impact to service is imminent if action is not taken.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Infosys has an organization wide Data Loss Prevention (DLP) solution that is implemented on Infosys network.GCloud specific policy can be configured on this solution to monitor data leakage via emails. Our network and applications are scanned for Vulnerabilities on a regular basis. We employ an independent third party to perform vulnerability tests. The frequency of such tests on the platform is every 6 months. Vulnerabilities are remedied by using a patch management process.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Pre-requisite of developing an effective data breach response plan requires: Definition of PIIs and Customer Sensitive Information that organization collects, regulations that are applicable, location of the individuals etc. Other inputs that should be considered are around the access provided to the database, logging mechanism put in place, encryption of data while storage and transmission etc. Infosys will create a customized plan for addressing a data security breach for its client data. During audits, real-time and historic event monitoring, if a breach is observed, initial level of incident categorization/grouping is done and necessary steps are taken for escalation and notification
Incident management type
Supplier-defined controls
Incident management approach
Definition of Personal Information and the Customer Sensitive Information that organization collects, regulations that are applicable, location of the individuals etc. Other inputs that should be considered are around the access provided to the database, logging mechanism put in place, encryption of data while storage and transmission etc. Infosys will create a customized plan for addressing a data security breach for its client data. During the audits, real time and historic event monitoring, if a breach is observed, initial level of incident categorization / grouping is done and necessary steps are taken for escalation and notification

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Infosys’ balanced approach to environmental, social, and governance (ESG) enabled the company to become carbon neutral as of 2023. The same approach will be taken with GCloud14, with a strong emphasis on governance and transparency.
Coupled with our strong governance approach and the environmentally sympathetic design of our delivery model, we can:
• Achieve Net Zero by 2028,
• Adopt UN Climate Neutral Now definition of Net Zero: “where a balance between anthropogenic greenhouse gas (GHG) emissions and removals is achieved”
• Identify 100% of emissions, from design to implementation, prioritising the elimination of emissions
• Offset emissions that cannot be eliminated
• Offsets assured by an external environmental consultancy
• Have our suppliers present an action plan to move from offset to elimination by 2029, setting course for a carbon negative future
In compliance with PPN 06/21, Infosys publishes its Carbon Reduction Plan which is available at Crown Commercial Website as well as Infosys’ own website: https://www.infosys.com/about/corporate-responsibility/documents/carbon-reduction-plan.pdf
For Call-Off Contracts, a baseline emissions level set prior to contract commencement will be created using data supplied by the incumbent supplier, Contracting Authority, and Environmental Contractor. This allows environmental performance to be measured against the previous approach. While the commitment to establishing carbon neutrality is set at 2028, granular targets depend upon consultation with the Contracting Authority, as reflected in the timeline.
Supply chain emissions management will be in place prior to contract commencement through the Contracting Partners’ procurement methodology. The reporting design on emissions will be supplied to the Contracting Authority, with aggregated subcontractor emission provided within an integrated biannual report. A sustainability manager will be aligned to the initiative, who will, working with the client, develop a project plan during the first month identifying, each obligation, associated event/activity and required resources (people, venue, collateral, rollout).

Covid-19 recovery

Infosys will invest in the local communities and in partnership through this contract will help create opportunities to tackle economic inequality, increase supply chain resilience and capacity thereby helping support COVID-19 recovery. Infosys has announced it will create 1,000 new Digital Jobs in the UK to support post -Pandemic Growth (Infosys to Create 1,000 Digital Jobs in the UK to Fuel Post-Pandemic Growth): https://www.infosys.com/newsroom/press-releases/2021/create-digital-jobs-uk.html

Tackling economic inequality

Infosys’ plan for GCloud14 contracts include addressing economic and aspirational inequality, ensuring end-users can forge a meaningful career and follow curated, individualised development paths toward success.
Infosys creates opportunities for personal growth through training and career development. Increased online training opens a wide range of options to those looking to enhance their skills or grow into a new field, particularly among under-represented demographics where classroom learning is unsuitable. This democratisation of knowledge will revolutionise how people of all backgrounds develop their career. The data on uptake of such training can ensure all demographics are reached and, where proven to be less effective, steps can be taken to identify why.
Infosys has long recognised the importance of tackling inequality; it is essential to creating a workplace where professional growth faces as few barriers as possible. We are adamant that what barriers remain are determined only by aptitude and hard work – never by background or physical characteristics.
This is evidenced by Infosys’ approach to Corporate Social Responsibility (CSR), with its global foundation investing £30 million last year on education in deprived communities, alongside its community-focussed Springboard learning platform and other philanthropic efforts. We have the commitment and expertise to deliver a transformation that has a meaningful impact on economic inequality.
Working with Local Authorities, including Brent and Sandwell Borough Councils, Infosys has made over 220 vocational courses available to the public free of charge. Local Authorities have adopted the technology as their skills platform of choice and are driving citizens towards the tool.
This will result in high-quality training reaching those in need, doubling the reach of the Infosys Springboard deployment in the UK. Furthermore, it will ensure that the co-morbidities of poor educational and health outcomes linked to economic inequality are addressed through a single tool.

Equal opportunity

Infosys supports businesses to create their modern slavery policy, helping them to map their supply chain and create robust procedures. This methodology ensures a proactive, compliant approach to modern slavery whereby action planning is reviewed and renewed to adapt to the changing practices.
The UK proudly boasts the highest ranking on Global Slavery Index as the most active country in the world fighting the practice. This achievement is the perfect expression of the values at the core of Britain’s democratic traditions; its global leadership in this area is a source of pride for colleagues working on this engagement.

We will contribute to this under-celebrated achievement by ensuring the Gcloud14 contracts result in net reduction of Modern Slavery. We will achieve this by keeping the practice out of our supply chain while taking targeted action to improve the lives of people most at risk of exploitation. We will build our approach with close reference to the UK Government guidance on modern slavery.

To ensure a clear understanding of the risks of modern slavery and human trafficking across our organisations, we conduct training with relevant members of the supply chain on staffing benefits and appropriate anti-sexual harassment policies. In line with the policies that apply to our own staff, we require our human resource suppliers to provide training to their employees on their rights, wages policy, benefits, and grievance redressal forums; this is periodically and randomly audited. We have also circulated to our supply chain management employees a training module to improve awareness on modern slavery and human trafficking –a core responsibility of their role.
The programme will be governed by the overall social value governance model under the Social Value Manager’s accountability, who will share a narrative report every six months with the contracting authority on supplier performance.

Wellbeing

At Infosys, employee’s health and wellbeing drives a culture of wellness.
Through our efforts, our employee well-being rates reached an all-time high of 91% among employees across locations, even with the virtual setup. The sense of connectedness stands at 88% because of the ability of different teams to come together and collaborate with each other emotionally. We successfully touched the lives of 150,000+ employees through 431+ initiatives, witnessing a three-fold increase in employee participation virtually.

We created three aspects essential to shaping employee experience:
1. Self-Help: Emphasises providing our employees the right tools and resources for them to take charge of their wellbeing.
2. Micro-Environment: Our objective is to create an environment that is conducive for individuals to work together, seamlessly.
3. Macro Environment: The focus here is on driving the programs centrally, conceptualising policies keeping the user at the centre.

Great Place to Work® and Fortune have recognised Infosys as one of the Best Big Companies to Work For™. In alignment with the organisations’ social value themes to ensure Employee wellbeing and health improvement, Infosys invests in following engagements:
• New approaches to focus on prevention, resilience supported by internal policies. For instance, digital platforms for scientifically validated therapies such as cognitive behavioural therapy (CBT) to improve access to care options.
• Infosys Employee Assistance Programme, powered by LifeWorks via Generali, a 24/7 service for our employees or eligible dependents.
• Infosys, in collaboration with Virgin Pulse are committed to augment health and wellness agenda of UK by providing free/subsidised memberships.
To monitor the effectiveness of these programmes our HR team conduct regular surveys, and as part of town halls take direct feedback. Data collected is used to ensure that the programmes are reaching the right people and are adjusted to meet the changing needs of our employees.

Pricing

Price
£32,000 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We have Wingspan Trial instance where users can be provisioned for access. The trial version is a subset of the full blown platform.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ukps@infosys.com. Tell them what format you need. It will help if you say what assistive technology you use.