Digital Evidence Gathering and Assessment
A rounded platform used by NHS England, universities and professional bodies. Used to collect evidence which can be assessed for an individual or an organisation. Can deliver ePortfolio, Foundation Year Assessment, Organisation Compliance, Skills Passports, CPD, Digital Badges and Logbook solutions. Solution userbases from 100's to 1 million users.
Features
- One platform underpins all our solutions
- Scalable largest deployment has over one million users
- ePortfolio implementations
- Dental and Pharmacist Foundation Year implementation for NHS England
- Digital Badges
- Skill Passports for London and nationally
- Performance Management and Career Progression
- Logbooks for student workplace experience and assessment
- Accreditation of Practice by NHS England and UK Professional Bodies
- Organisational Compliance evidence and assessment
Benefits
- Secure including Security Operations Centre 24/7 monitoring
- Dashboards to summarise complex data
- Ability to replicate your data and business rules
- Complete customisation of user interface
- Formal and informal assessment relationships
- Complete flexibility in data gathering form design
- User attachments with virus scanning
- Single Sign On supported
- Mobile-first, all modern browsers and devices supported
- Multi-Factor Authentication
Pricing
£0.41 to £9.10 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 9 5 8 6 5 7 5 7 7 6 2 4 9 0
Contact
AXIA DIGITAL LTD
Richard Etheridge
Telephone: 07887954199
Email: richard@axia.email
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Our solutions are accessible via a web browser, built mobile-first we are device, platform, and browser agnostic. If you have a browser and an internet connection you can access our solutions.
- System requirements
-
- Internet Connection
- Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our SLA is one business day, we have escalation options as well
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support is always agreed as part of our contracting however we offer second-level technical support by either email or telephone, our standard service level response time is one business day. We provide an out-of-hours telephone number for critical issues. One of the team will take on responsibility for account management once the solution is live. We provide intensive support with access to the development team during the initial months after service go live.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We find that no two solutions are the same, we use our core platform to deliver your solution. This is normally the configuration and development of the user interface and applying your business rules.
It is normal for a short project to take place where we capture your requirements and implement them within our platform to delivery your solution. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We can provide exports to individual service users or we can export your data. This is normally in XML but we are happy to work with our clients to find a suitable data format for the export.
- End-of-contract process
- Export of your data in XML is included in the price. Other formats or export requirements would be charged at our standard daily rate, that being £750 excluding VAT. We would agree to a fixed price in advance of any export work being carried out, this would be managed in our standard change control processes.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None, our solutions are built mobile-first, you only need a browser to access them,
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- As part of the delivery we customise the service interface to your needs, we can surface the relevant data to users as you require.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- This is usually carried out on a case-by-case basis as the actual user interface is developed to your specific needs.
- API
- Yes
- What users can and can't do using the API
-
We have developed a REST-based API that can be configured for each client to push and pull data from the solution. Some clients use the service to push additional user data such as relationships between users, and or details of pathways that should be accessible within the solution to them.
Other clients use the REST API to pull data from the solution, we have internal warehouse tables that summarise client critical information about each user's ePortfolio. These are synced via the API to our client's DataLakes where they carry out further analysis.
In short, we can create a service that allows you to push or pull the required data between our solution and your in-house systems. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
We customise the services to meet your requirements.
We can customise the response data format (json, XML etc) and the data that is returned.
We can customise our solution to accept the data you wish to push to us and consume that data within the solution we deliver for you.
The client can customise the request made to our service such as the frequency, the batching of data pushed or pulled and period for which to request data.
Scaling
- Independence of resources
- Our hosting environment is shared across our client base with large and small customers benefitting from the collective hosting investment. We can manage resources in several ways depending on the size of the solution being procured, it can be delivered within our shared environment or we can create a dedicated server instance to deliver your solution. With the environment being cloud based it is possible to scale up resources as required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We implement Google Analytics to show standard web-based analytics of user interaction. We supply specific reporting on user progress depending upon the solution deployed. We can report on the specific targets for your userbase, this may be simply interaction or progress to defined outcomes.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Data export is related to the user type and their permissions and end users will have access to export their data, this is normally via a PDF or in some circumstances a zip file.
Administrative users have the level of export you define during the build configuration. It could simply allow high-level access to progress against business metrics or an outcome matrix, but it is possible to allow access to full user-generated data or an export of that data in bulk. The format can be CSV, XML, JSON depending on the complexity of the data within the export. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Service level is agreed when contracting for a solution, our standard SLA is 99.9% availability. Penalties are agreed during contracting.
Critical Priority: The application is not available from more than one location /network. Response time within 30 minutes to acknowledge the incident and a fix time as soon as possible, this type of issue would be escalated within the AD team and updates would be provided every hour until a resolution is found and implemented.
High Priority: A major function that is critical to all “end” users of the site. Response time within 1 hour to acknowledge the incident and a fix time as soon as possible, this type of issue would be escalated within the AD team and updates would be provided every hour until a resolution is found and implemented.
Normal Priority: A minor function of the application is not operational. Response time - 1 working day. Fix time would be agreed with the client on a case-by-case basis depending on the severity.
Low Priority: A user has questions about the application. Response time - 1 working day. Fix time would be agreed with the client on a case-by-case basis depending on the severity. - Approach to resilience
-
We have a fully redundant environment, every server is either load balanced as in the case of the web servers, or is configured as an active/inactive pair designed to switch seamlessly. Backups are stored locally and off-site for up to 12 months. The following describes our environment: Sucuri Web Application Firewall
2 Failover Firewalls
2 Failover Load Balancers
3 Load Balanced Web Servers
2 Failover SQL Servers
2 Failover Domain Controllers
Backup
16 x SQL 15-minute onsite backups (4 hours)
20 x SQL hourly onsite backups (20 Hours)
30 X Daily all servers off-site back
12 x Monthly all servers off-site backup - Outage reporting
- Should an outage happen the support team are gathered and the outage is investigated. An email is sent to all clients affected to inform them of the issue. Hourly updates are provided until such time as a resolution is found.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- We can deploy Single Sign On where required, we do this with some of our clients such as the Association of Chartered Certified Accountants, the Royal Pharmaceutical Society, and the College of Radiographers.
- Access restrictions in management interfaces and support channels
- Our core platform has roles and groups, roles control "what you are able to do" and groups control "who you can do it to" We build complex user relationships in all our solutions which can include assessor/manager access to users and peer access to users to support the development and authentication of the users' data. Administrators can be limited by the same roles and groups enabling a flexible approach to access management.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- We can deploy Single Sign On where required, we do this with some of our clients such as the Association of Chartered Certified Accountants, the Royal Pharmaceutical Society, and the College of Radiographers.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation ISOCertification Limited
- ISO/IEC 27001 accreditation date
- 28/11/2019
- What the ISO/IEC 27001 doesn’t cover
- The whole business is covered by the certification, therefore there is nothing not covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have all the policies and procedures in place to achieve and maintain ISO 27001. These policies can be shared. Each month the ISO Audit team meets to undertake an internal audit. The audit is designed to ensure all elements are audited every 12 months and that all Statements of Applicability are audited over a 36-month period.
We are externally audited each year, our last audit was carried out on 08/03/2024, we passed with 30 positive observations and the auditors did not identify any non-conformances.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Scope – completed by a member of the technical team in consultation with a client. Analysis – The development team determines the best way to deliver the requirement within the platform. Security and impact on existing functional components are assessed. Development – a developer will then be assigned the task. Testing QA – QA servers have examples of many of the different solutions to allow testing of the new code and possible impact on core functional components. Deploy Production – code is moved from our development servers. Testing Production – code is tested in our production environment.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
A copy of our core build is tested monthly using an automated AppCheck PEN test tool provided by precursor, we have found this more thorough than human PEN testing.
Our Web Application Firewall protects our environment and logs are sent to our VSOC team who not only monitor the logs but monitor our hosting environment 24/7. Our lead developer is linked to various security groups and reports on latest threats and vSOC also informs us of issues we should be aware of. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our Web Application Firewall protects our environment and logs are sent to our vSOC team who not only monitor the logs but monitor our hosting environment 24/7. Our hosting providers monitor the server environment from their network operations centre 24/7. We monitor our environment externally from 7 locations worldwide checking for availability.
Any incident affecting the whole environment or impacting the availability of a single solution is considered a critical event. SLA 30 minute response time. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our process has been defined in our SLA, a shortened version has been provided to a previous question.
Incidents are reported using a ticket system to ensure transparency and audit trail of the incident.
Critical incidents can be reported 24/7 via our out-of-hours telephone number.
Normal and lower incidents are reported via the ticket system. Critical and High are reported at regular intervals by email by the incident team dealing with the incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
We believe in people and have provided opportunities for individuals to take on roles where they have demonstrated capability but may not have the qualifications. We therefore have a team who come from various educational backgrounds, some have been our apprentices, some university graduates but many have developed the skills required without formal qualifications but demonstrate and commitment to excellence in all parts of their work.
The solutions we develop enable individuals to build portfolios of evidence that allow them to improve their careers in vocational settings.
Pricing
- Price
- £0.41 to £9.10 a user a month
- Discount for educational organisations
- No
- Free trial available
- No