Intelligent Enterprise Products

iNgenuity Learning Management System

A software application for the administration, documentation, tracking, reporting, automation, and delivery of educational courses, training, and learning and development programs.
Designed to identify training and learning gaps, using analytical data, and reporting, focused on online learning delivery but supports a range of uses as a platform for online content.

Features

  • Organise learning timelines and automate assessments
  • Share knowledge on topics and increase course interaction and engagement
  • Digital learning tools providing various communication features
  • Create professionally structured course content
  • Stand-alone or modular solutions customised and aligned to organisational requirements.
  • Remote access via desktop or mobile devices.
  • Easy content editing and curation; videos, images, slideshows, interactive test
  • Multi-sector support
  • Communicate learning objectives, align content and assessments
  • Create student discussion groups

Benefits

  • Engaging and intuitive layouts stimulate learning
  • Highly configurable
  • Collaborative working sharing real time information from any location.
  • Accuracy and consistency with validated data rules and built-in reports.
  • End-to-end traceability for audit reporting and compliance.
  • Publish content from multiple devices
  • Facilitates easy learning for multiple skill levels
  • Easily manage learning processes
  • Track progress and target additional content and remedial work
  • Interactivity for deeply engaged learning

Pricing

£200.00 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@intelligent-enterprise-products.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 0 7 4 0 7 2 3 7 2 2 4 5 8 9

Contact

Intelligent Enterprise Products Business Support
Telephone: 01935 385939
Email: enquiries@intelligent-enterprise-products.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
IEP solutions can integrate with existing enterprise resource planning (ERP) suites or other software footprint to ensure an enduring collaborative environment and relevance of services. By combining existing software with new bespoke components, we can provide an end-to-end application that integrates with any existing 3rd party products.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
Access to the internet or to on-premises server

User support

Email or online ticketing support
Email or online ticketing
Support response times
We allocate a severity status to all technical failures and aim to resolve the problem within the timescales given below.
Critical Issue P1: 2 hours
Impaired Service P2: 8 hours
Minimal Impact P3: 24 hours
Routine P4: 72 hours.
Support is available through our UK service desk between the hours of 9am and 5:30pm (GMT), Monday to Friday each week except for public holidays. Critical issues can be reported 24 hours a day, 7 days a week.
Full details of support and incident categorisation are included in the Service Definition Document.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Account Manager: IEP appoint a dedicated technical account manager for each customer at no additional cost (includes 1 on-site visit per month). The Account Manager is responsible for ensuring that project delivery is in accordance with our contract and that we exceed customer expectations. Should a customer request additional visits these will be charged at our SFIA 8 Rates published in the Service Definition Document

Technical Support: Generally, no charge will be incurred by the customer should technical support be required on-site to resolve a supply of service issue that cannot be fixed remotely; however charges will apply to support customer infrastructure changes that are not critical to the IEP service delivery.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Our customer centric approach to on-boarding ensures that the training needs of every user within the organisation are met. By design the solutions are intuitive to users and by aligning workflows to roles, the whole application is easy to navigate.

Group and individual on-site training will be provided at implementation. On-line training can also be arranged on a group or individual basis.

Super-user groups may be established to provide additional user support within the organisation. These groups will often undertake training beyond their functional area.

A ‘Train the Trainer’ approach may be adopted for delivery of new capability.

User documentation is provided in electronic format and a ‘help’ function is embedded within the application. Our help-desk is also on hand to support users.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
A mechanism is provided to the customer to allow export of data in open standard formats. Alternatively, transfer of data to a new supplier can be arranged.
End-of-contract process
Included within price:
Data transfer: On confirmation of successful transfer or export of customer data, all data and documentation pertaining to the contract are deleted in accordance with ICO guidelines and regulations.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Functionality will need to be sized appropriate to mobile device limitations and therefore screen size may impact the display.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Rest API exposed with Swagger documentation and test facility.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Na
API
Yes
What users can and can't do using the API
Elements of the API can be exposed to customers based on contracted agreements.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
IEP offers flexible configuration options and applications to support organisational specific processes. During implementation examples of configuration include customer fields, access controls, preferred units of measurement etc.

Customisation to users’ unique roles, preferences, and workflow, and to expand functionality will be established post-implementation. This may include (but is not limited to) the following examples:
• User Interface: Cosmetic and design changes based on user preferences.
• Documents and Forms: The layout, format, and content of order confirmations, invoices, delivery notes etc.
• Integrations: Third-party software
• Functionality and modifications and extensions: Adding new features or enhancing existing functionality.

Scaling

Independence of resources
Monitoring of performance and setting auto-scaling thresholds ensure we scale out or scale up our cloud services ahead of expected increases in demand and deliver a system that performs to the expected standards. Additionally, the application is also redeployed automatically to another server instance if other customers demand on that server may interfere with expected performance.
Database performance is continually monitored and recommended improvements such as indexing are incorporated. We continually examine opportunities to reduce load by redesigning the system, measure performance and drive down operating costs.

Analytics

Service usage metrics
Yes
Metrics types
Our service metrics follow ITIL recommendations which reflect current ITSM best practices. Below are the 15-headline metrics provided. Additional Performance indicators may be set per organisation at request and provided in report or dashboard format.

Incident Response Time
First Touch Resolution Rate
SLA Compliance Ratio
Cost per Ticket
Number of Active Tickets
Re-categorised Incidents
Reopen Rate
Incidents per Department
Incidents by Type
Incidents not Initiated via Self-Service
Incidents with Associated Problems
Escalated Incidents
Incidents Resolved Remotely
Incidents with No Known Resolution
Ticket Volume
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Series of reports allowing data to be exported in the format selected by the user. The export of data from the system is logged and can be viewed through the system audit capability.
Data export formats
  • CSV
  • ODF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
With an on-cloud data-centre and geographic replication across to data centres we guarantee availability better than 99% including scheduled downtime. We do this by spinning up additional instances before carrying out any patching or upgrade activity.

With on-premises solutions the total system SLA is determined by considering the SLA provided for the underpinning components.
Approach to resilience
Extensive resilience arrangements are provided by Microsoft and AWS to safeguard services provided from their data centres. Our public cloud offering builds on these arrangements.

https://azure.microsoft.com/en-us/support/legal/sla/summary/

Where a secure cloud instance is required these are procured from reputable suppliers such as ‘Secure Cloud’, that have the scale of operations and experience to support UK.GOV
Outage reporting
Reporting on public cloud outages is comprehensive and provided through dashboards, email alerts, and can be accessed through an API.

With on premises solutions outages are reported immediately by email and presented routinely through a dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
To maintain a secure service and prevent unauthorised actions, all service users are authenticated and role-based access controls using the ‘principle of least privilege’ is standard.
Authentication is via secure channels and users authenticate with a username and two factor authentications e.g. SMS and credentials are passed over encrypted channels to limit risk of interception.
Services support authentication over TLS using a client certificate and SAML as a standard for logging users into applications.
Password complexity and change frequencies are implemented according to best practice.
Significant actions or access from unknown locations/devices triggers requests for additional authentication information.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
CQS (Certified Quality Systems) Ltd
ISO/IEC 27001 accreditation date
13/11/2017
What the ISO/IEC 27001 doesn’t cover
None
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
ISO 9001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The staff handbook is available on the Company intranet and includes our Information Security Policies. Education on all Company policies is part of our staff induction process. Policy review is planned, amendments to policies communicated and staff are made aware of and supported in their information security responsibilities through training and awareness.
The Company Information Security policy framework provides controls associated with protection of all information assets including but not limited to all physical, technical, non-technical and employee related information security matters. Periodic vulnerability assessments are conducted on all IEP systems. Reported security breaches will be managed in accordance with the CCM-SEF 01 to SEF=05.

Policies apply to all IEP employees, consultants, and sub-contractors. Heads of Department, Managers and Team Leaders are responsible for implementing policy, The Company Directors take ultimate responsibility to ensure effective systems are in place. Internal and independent external audits to certified standards ensure process is followed.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Programme governance is achieved through a joint steering board to set policy, discuss resource levels and agree major work packages and manage technical obsolescence and security testing and accreditation.
User requests for change and minor work packages are prioritised and presented for approval through configuration change boards with agreed terms of reference.
Third party software components are upgraded and tested or replaced as normal business. Application is deployed and tested on PCs which are running on the BETA release of Microsoft Windows so that breaking changes can be identified and resolved before they are ever encountered by the customer.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability assessments are conducted by an external party on a monthly basis and any identified problems are resolved immediately.
Penetration testing is also conducted annually by a second independent party.
We receive guidance on risk by email from NCSC and from security specialists within the MOD and Home Office. Further risk may be highlighted to us due to our involvement with the UK chapter of the Cloud Security Allowance.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our platform as a service provider operates an extensive suite of protective counter measures to defend against DDoS attacks and has deployed intruder detection tools. We employ two-factor authentication across devices and unusual behaviour is highlighted to Company directors.
We configure and manage firewalls around our databases. Provide row level encryption and TDE to protect data at rest and employ EV certificates to protect data in transit. We also use secondary access signatures to protect documents entrusted to our care.
Our policies cover incident response and assure business continuity for ourselves and our customers in accordance with best practice guidelines.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our formal incident management process follows NIST guidance and summarised as follows:
Step 1: Incident logging (phone/emails/self-service-portal)
Step2: Incident categorisation (high/medium/low) and sub-categorised e.g. area of IT or business unit
Step 3: Incident prioritisation (critical/high/medium/low) determined on impact and urgency
Step 4: Incident assignment (automatically routed to technician with relevant expertise)
Step 5: Task creation and management (based on complexity may be broken into sub-activities or tasks)
Step 6: SLA management and escalation
Step 7: Incident resolution (permanent solution or temporary workaround)
Step 8: Incident closure (user acknowledges satisfaction with resolution)

Internal/External evaluation; reporting via dashboards; additional reports as required.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Covid-19 recovery

Covid-19 recovery

Intelligent Enterprise Products Limited support the creation of new digital skills and an end to Digital Poverty. There is a growing divide as members of our society are left behind as technology advances and existing inequities around race, gender, age, ability and income worsen.
The Facts:
• 1 in 5 children home schooling during the pandemic did not have access to an appropriate device like a laptop.
• 42% of young people are not adequately connected, lacking either broadband or a computer.
• 10 million lack the most basic digital skills (Lloyds CDI 2021)
• 53% of people offline can't afford an average monthly broadband bill.
• 2.5 million people are behind on their broadband bills.
We believe that if we are to solve poverty in the UK, we must address digital exclusion.
The pandemic made us all more aware of the digital divide. Whether accessing education, the social security system, job opportunities or cheaper utility supplies the digital world is an integral part of how we live and therefore we must address the detriments of digital poverty.
IEP impact change through two charity organisations advocating for the end to Digital Poverty: The Good Things Foundation and The National Device Bank.
We use the income and profits from Government contracts to:
• Fund digital apprenticeships within our own organisation;
• Donate equipment and mobile devices for distribution;
• Offer resources to support people in their digital skills learning journey;
• Raise the profile of this issue in our own community;
• Provide software solutions free to local charities; and
• We make a cash donation as a percentage of profits to The Good Foundation to support them in their work.
Tackling economic inequality

Tackling economic inequality

Intelligent Enterprise Products Limited support the creation of new digital skills and an end to Digital Poverty. There is a growing divide as members of our society are left behind as technology advances and existing inequities around race, gender, age, ability and income worsen.
The Facts:
• 1 in 5 children home schooling during the pandemic did not have access to an appropriate device like a laptop.
• 42% of young people are not adequately connected, lacking either broadband or a computer.
• 10 million lack the most basic digital skills (Lloyds CDI 2021)
• 53% of people offline can't afford an average monthly broadband bill.
• 2.5 million people are behind on their broadband bills.
We believe that if we are to solve poverty in the UK, we must address digital exclusion.
The pandemic made us all more aware of the digital divide. Whether accessing education, the social security system, job opportunities or cheaper utility supplies the digital world is an integral part of how we live and therefore we must address the detriments of digital poverty.
IEP impact change through two charity organisations advocating for the end to Digital Poverty: The Good Things Foundation and The National Device Bank.
We use the income and profits from Government contracts to:
• Fund digital apprenticeships within our own organisation;
• Donate equipment and mobile devices for distribution;
• Offer resources to support people in their digital skills learning journey;
• Raise the profile of this issue in our own community;
• Provide software solutions free to local charities; and
• We make a cash donation as a percentage of profits to The Good Foundation to support them in their work.
Equal opportunity

Equal opportunity

Intelligent Enterprise Products Limited support the creation of new digital skills and an end to Digital Poverty. There is a growing divide as members of our society are left behind as technology advances and existing inequities around race, gender, age, ability and income worsen.
The Facts:
• 1 in 5 children home schooling during the pandemic did not have access to an appropriate device like a laptop.
• 42% of young people are not adequately connected, lacking either broadband or a computer.
• 10 million lack the most basic digital skills (Lloyds CDI 2021)
• 53% of people offline can't afford an average monthly broadband bill.
• 2.5 million people are behind on their broadband bills.
We believe that if we are to solve poverty in the UK, we must address digital exclusion.
The pandemic made us all more aware of the digital divide. Whether accessing education, the social security system, job opportunities or cheaper utility supplies the digital world is an integral part of how we live and therefore we must address the detriments of digital poverty.
IEP impact change through two charity organisations advocating for the end to Digital Poverty: The Good Things Foundation and The National Device Bank.
We use the income and profits from Government contracts to:
• Fund digital apprenticeships within our own organisation;
• Donate equipment and mobile devices for distribution;
• Offer resources to support people in their digital skills learning journey;
• Raise the profile of this issue in our own community;
• Provide software solutions free to local charities; and
• We make a cash donation as a percentage of profits to The Good Foundation to support them in their work.
Wellbeing

Wellbeing

Intelligent Enterprise Products Limited support the creation of new digital skills and an end to Digital Poverty. There is a growing divide as members of our society are left behind as technology advances and existing inequities around race, gender, age, ability and income worsen.
The Facts:
• 1 in 5 children home schooling during the pandemic did not have access to an appropriate device like a laptop.
• 42% of young people are not adequately connected, lacking either broadband or a computer.
• 10 million lack the most basic digital skills (Lloyds CDI 2021)
• 53% of people offline can't afford an average monthly broadband bill.
• 2.5 million people are behind on their broadband bills.
We believe that if we are to solve poverty in the UK, we must address digital exclusion.
The pandemic made us all more aware of the digital divide. Whether accessing education, the social security system, job opportunities or cheaper utility supplies the digital world is an integral part of how we live and therefore we must address the detriments of digital poverty.
IEP impact change through two charity organisations advocating for the end to Digital Poverty: The Good Things Foundation and The National Device Bank.
We use the income and profits from Government contracts to:
• Fund digital apprenticeships within our own organisation;
• Donate equipment and mobile devices for distribution;
• Offer resources to support people in their digital skills learning journey;
• Raise the profile of this issue in our own community;
• Provide software solutions free to local charities; and
• We make a cash donation as a percentage of profits to The Good Foundation to support them in their work.

Pricing

Price
£200.00 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@intelligent-enterprise-products.com. Tell them what format you need. It will help if you say what assistive technology you use.