SFIA and DDaT Skills Assessment Software by Lexonis
Optimise DDaT (Digital, Data and Technology Framework), SFIA (Skills Framework for the Information Age), and other frameworks. Utilise skills-based job templates or create them with integrated AI. Assess employee skills, pinpoint gaps, and uncover career development opportunities for personal development. Utilise skills intelligence for organisational capability/gap analysis and workforce management.
Features
- SFIA, DDaT and other framework skill assessments and analysis.
- Pre-built SFIA job profile templates for easy customisation.
- Technology skill definition and behavioural competency support.
- Visual career pathways and career development plans.
- AI-enabled tools to build up-to-date job profiles and skill definitions.
- Skills intelligence and job architecture views for strategic analysis.
- Intuitive administrative tools to build jobs and skill/competency definitions.
- Built-in consulting tools to capture SME feedback and buy-in.
- Robust and scalable hosting on Microsoft Azure Cloud.
- API’s, JSON, XML, Microsoft Excel, CSV options to exchange data.
Benefits
- Capability/Gap Analysis: view your organisation's SFIA/DDaT skills and gaps.
- Recognise Expertise: find employees for projects based on critical skills.
- Learning Needs Analysis: pinpoint business critical, high priority development areas.
- Personal Development Plans: build development plans based on job requirements.
- Career Development: identify development opportunities based on matching skills.
- Job Profile Templates: fast-track job creation with pre-built SFIA templates.
- Up-to-date Job Profiles: use AI to build new SFIA/DDaT profiles.
- Job Profile Rationalisation: review closely matching jobs based on skills.
- Skills-based Hiring: dynamically generate evidence-based interview guides based on skills.
- Career Coaching Guides: create best practice guides for managers.
Pricing
£4 to £110 a user a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 3 1 4 6 1 6 4 9 1 4 3 0 6
Contact
Lexonis Ltd
Andy Andrews
Telephone: 07584990167
Email: andy.andrews@lexonis.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Lexonis hosts on Microsoft Azure, other than that there are no known constraints.
- System requirements
-
- Internet Access.
- Web browser.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Depends on the severity and the terms agreed in the contract. The following are the terms available by default:
Severity 1: A Defect which causes a major failure of the Service, affecting all users of the Service -> 1 Business Hour (UK hours)
Severity 2: A Defect which has a severe impact on the provision of the Service to the Client -> 4 Business Hours
Severity 3: A Defect which has a moderate impact on the Client’s business -> 4 Business Hours
Severity 4: A Defect which has a minor impact on the Client’s business -> 1 Business Day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Third level support which is contractually defined as the provision of the services of one or more systems experts whose role is to address Defects in the Service; support for end users is provided via the client’s trained administrators.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
During the initial project launch meeting, a Lexonis consultant will discuss site functionality, configuration options and prepare an outline project plan. Once the plan is agreed the service will be provisioned for the client.
The consultant will then provide documentation that covers Customer Administrator and user functionality, and arrange for online Customer Administrator training. If the client specifically requests onsite training, this can be arranged.
In addition, a Lexonis' Prosci certified consultant will help the client's implementation with online sessions, provision of change management tools, communication templates and share best practice processes. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The provision of data may be amended in the terms of the signed contract. However, it is typical for functionality to be available on the client's site so that one of the client's administrators (with appropriate permissions) may download it. If a different format is required, the client's contact may request the data. This service may be subject to a fee, depending on the format required. If this is the case, a Lexonis consultant will extract the data in the agreed format and transfer it to the client via a secure file service. The client's data will be destroyed from all Lexonis systems within the number of days agreed in the contract.
- End-of-contract process
-
4.4.4 following the Termination Date, destroy or otherwise dispose of any or all of the Client Data in its possession (except where Lexonis is required by law to keep a copy) unless Lexonis receives, within three Business Days of notice of termination, a written request for the provision to the Client of a copy of the then most recent back-up of the Client Data held by Lexonis. If Lexonis receives such notice, it will use reasonable endeavours to provide that copy to the Client within 10 Business Days after the Termination Date in a format supported by the Service (access to such format by Client shall remain live for a maximum of 4 weeks after which Lexonis shall delete such Client Data without further notice to Client).
Lexonis reserves the right to charge reasonable costs for the provision of the Client data unless the file format, structure and fees have already been negotiated in the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile devices access the application through a web browser in the same way as for a desktop. The application does not rely on any desktop-specific functionality which is not easily replicated through a mobile interface (e.g., double-clicks are not used etc.). The application display changes to take into account screen width on both mobile and desktop, so that the application functions the same way when narrowing a browser on desktop as when viewing the site through a smaller mobile screen.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The application is accessed through a forms-based login screen (username/password), or if so-configured by SSO. Once logged-in, users are shown a set of tiles which can access the named functions. A navigation bar at the top of the screen allows users to navigate back to previous pages. Information is presented in text, table and occasionally graphic form.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Quality Assurance has been performed against the core user functionality on the site. This automatically identifies errors, contrast errors, alerts, structural elements, features and ARIA properties. Each report contains links which can be followed back to the relevant https://www.w3.org/ section. The QA testers review each report and raised bug-cases to the development team for review and fixing where a WCAG 2.1 AA violation is identified. Fixes are implemented through the secure development lifecycle process, including iterative re-testing until all errors have been fixed, or accounted for as false-positives.
- API
- Yes
- What users can and can't do using the API
- The Lexonis APIs use standard HTTP Basic Authentication over HTTPS/SSL per RFC 7617. Access to the APIs is restricted to designated security roles and permitted IPs which must be specifically configured (meaning that API functionality is inaccessible by default). By default numerous APIs are available and additional APIs can be created on a client-by-client basis.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
All the content in the software is customisable by users with the appropriate permissions.
The software application is deployed with a number of configuration options available to clients, enabling/disabling whole sets of functionality, or simply modifying how functionality works.
Client customer administrator users can perform some of these configurations themselves through a Site Settings function, potentially under the guidance/with the support of a Lexonis Consultant. Alternatively, certain configuration options can only be made by Lexonis Consultants, on the explicit request of the client.
Further bespoke changes can be made to the tool, but typically this will be discussed during the contracting process, and will be undertaken through Lexonis' standard secure development lifecycle process.
Scaling
- Independence of resources
-
Web applications are set to automatically scale and are monitored for availability using StatusCake, and performance using Microsoft Application Insights.
In addition, Lexonis' ISO 27001 certified ISMS operates a defined set of capacity management controls. As part of these controls Lexonis has carefully benchmarked its current usage against its current capacity to ensure it meets its SLAs.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Two types of metrics are provided for the service: end usage metrics; system availability metrics.
- Reporting types
-
- API access
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The application contains a number of different export capabilities in Microsoft Excel, Microsoft Word and PDF formats, and depending on the configuration of the site, end users will have access to at least some of these.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- DOC
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLSX
- DOC
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
By default, the Lexonis TalentScape Software Subscription guarantees 99.5% availability excluding scheduled maintenance and emergency maintenance, in reality the software service has averaged 99.99% availability for the past 12 months.
In the event that Lexonis does not meet the SLA for 3 consecutive months, the client may terminate the agreement and Lexonis will refund the client any fees paid by the client in advance in respect of the period following the termination date. - Approach to resilience
-
Application instances are always hosted across a pair of geographically distinct datacentres. Each datacentre is constructed with significant business resiliency in mind. UPS, large banks of batteries, onsite generators with dedicated fuel reserves are all in place, alongside dedicated teams of service persistence engineers who work around the clock. Furthermore the datacentres use extensive monitoring, service support, backup failover and incident management teams and processes to ensure ongoing service resilience.
Lexonis' application web/app service instances are configured for hot failover with the secondary datacentre automatically picking up the web/app service of a site if the primary web/app service becomes unresponsive.
Application instance SQL database hosting is provisioned to replicate between primary and secondary datacentres, but operates on a cold failover basis.
Database backups are taken locally, but at each datacentre, ensuring geographically separate backup capacity. - Outage reporting
-
All Lexonis application instances have three monitors created to track their uptime:
1. An overall site uptime monitor.
2. A primary web/app service monitor.
3. A secondary web/app service monitor.
All three monitors are configured to send automatic alerts to designated Lexonis employees to report downtime. Downtime in either (2) or (3) on their own do not generally impact the uptime for (1). (1) only reports downtime if either both (2) & (3) have failed, or if (2) fails and the failover to (3) also fails.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
The application controls user access based on assigned security roles. During implementation Lexonis will provision 1+ Customer Administrator (CA)users, and configure the site under instruction from its dedicated client contact. CAs are then able to provision users with elevated security roles (including other CAs). Ongoing management of security role permissions is the responsibility of the client.
Post-implementation site changes (configuration, development etc.) are carried out as projects, requiring formal approval from client contacts.
Support requests are raised through the application to Lexonis support staff. Site changes requested through support are fed back to client contacts for review. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- Authentication can also be provided using Single Sign On with SAML v2.0.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Assessment Limited
- ISO/IEC 27001 accreditation date
- 28/11/2023
- What the ISO/IEC 27001 doesn’t cover
-
The scope of Lexonis' ISO 27001 certification covers the following:
'The provision of competency-based HR solutions to international organizations and membership bodies, including software development, software maintenance, quality assurance, site provisioning, and consulting services'
Within the Information Security Management System's Statement of Applicability, the following controls are excluded as irrelevant to the above scope:
-Management of removeable media (Lexonis do not use any)
-Physical media transfer (Lexonis do not transfer physical media)
-Working in secure areas (Lexonis do not have any 'secure areas')
-Delivery and loading areas (Lexonis do not have any such areas)
-Restrictions on changes to software packages (Lexonis do not change software packages) - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Lexonis' ISO 27001 certified ISMS defines, implements and operates multiple infosec policies including:
-Information Security Policy
-Mobile Device and Teleworking Policy
-Access Control Policy
-Cryptographic Control and Key Management Policy
-Clear Desk and Screen Policy
-Information Backup Policy
-Information Transfer Policy
-Secure Development Policy
-Information Security Policy for Supplier Relationships
Processes and standard operating procedures associated with all policies are developed to ensure adequate implementation.
Policy following is assured by the following controls:
-Employee contracts requiring adherence to the ISMS
-Defined disciplinary processes for non-adherence
-Information Security training, including coverage of ISMS adherence
-Dedicated Corrective and Preventative Action (CAPA) process for recording and correcting/preventing non-compliance events
-Regular, structured Information Security Committee reviews of ISMS Objectives, Access Rights, Personal Information processing, Supplier Services, Intellectual Property, ISMS Resourcing and GDPR obligations.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Lexonis operates a defined set of change management controls including:
-ISMS Processes: Changes managed through processes and procedures defined in the ISMS. These processes incorporate security impact considerations in their design.
-Projects: General Project changes are handled by the Project Management Operating Procedure. Software development is governed by the Software Development Lifecycle Operating Procedure, which includes functional, security and regression testing processes. All projects involve an explicit InfoSec assessment phase, and may trigger a DPIA.
-No Pre-existing Procedure: Non-project changes falling under no pre-existing Operating Procedure/ISMS Process are handled by implementing a full Risk Assessment and treatment plan process. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Lexonis' ISO 27001 certified ISMS includes a number of vulnerability management controls. Lexonis products are developed against a defined threat model which considers the most significant risks against the confidentiality, integrity and availability of information assets. All software development projects require an information security assessment, which may require a formal DPIA process being invoked. The Lexonis security team subscribes to a number of industry recognised security feeds which inform both the threat model and information security assessment phase. Security patches are deployed to application instances based on the highest priority.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Lexonis maintains platform, web, application, database, hosting, storage, network and firewall logs, aggregated within the Microsoft Security Centre application against which security policies and alerts are set, and logs reviewed and audited. This application automatically reports designated events and thresholds to the CTO and Information Security Manager.
Log alerts which could realistically indicate the actual Confidentiality/Integrity/Availability compromise of an asset, or a weakness which might allow for such, are raised within the ISMS-defined InfoSec Incident handling process. Incidents are actioned for immediate mitigation, logging/backup requirements, resolution and root-cause analysis. Confidentiality issues are addressed as the highest priority. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All employees are required to report (including relevant highlighting end-user support requests) any plausible compromise of the Confidentiality/Integrity/Availability of an information asset, or weakness which might allow such a compromise to the Incident Response Team. These security events are evaluated to determine if the compromise/weakness are real, and raised as security incidents if so.
Incidents are reviewed for immediate mitigation, logging/backup requirements; resolution plans are developed and actioned and post-incident root-cause analysis carried out. Any data breaches are reported using formal Data Breach records by email to the ICO and clients within 72hrs of detection, as required by GDPR.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Supports new methods of remote working and service delivery that help organisations working towards net zero greenhouse gas emissions.Covid-19 recovery
Supports organisations and businesses who have been adversely impact by COVID-19 and who have members of their workforce at risk of losing their jobs, to identify new career opportunities and re-train accordingly. Also supports use of sub-contractors who have skills for identified skill gaps.Tackling economic inequality
Creates employment and re-training opportunities, particularly for people who wish to be employed in industries where there are acknowledged skill gaps and/or are in high growth sectors.Equal opportunity
Supports people including the disabled and those from disadvantaged or minority groups to develop new skills and to plan their careers; also helps organisations to recognise their skills within the workplace and new work and growth opportunities.Wellbeing
Encourages mental wellbeing through good communication between managers and employees in respect of utilising employee’ strengths and closing skills gaps, project assignment and career development opportunities.
Pricing
- Price
- £4 to £110 a user a year
- Discount for educational organisations
- No
- Free trial available
- No