Learn more about Agylia’s solutions and services:
Easy access to learning resources through single sign-on
With single sign-on (SSO), learners don’t need to remember additional passwords or continuously enter login credentials to access their learning and support materials.
SSO enables learners to automatically log in to Agylia when signed in to other systems and applications – such as a work device (PC or laptop), corporate intranet sites, or HR systems.
In non-SSO scenarios, Agylia provides a highly configurable multifactor authentication capability. This goes beyond a single password approach as the user must enter more than one piece of identifying information to verify their credentials.
This approach adds an extra layer of security, significantly decreasing the likelihood of unauthorised access.
Multifactor authentication can be configured to require one or more additional verification elements – accompanying a password – including codes sent via SMS or third-party password authentication providers.
Depending on your organisation’s security requirements, multifactor authentication can be enabled for use with administrator accounts only, or for subsets of all users.
You can also define the conditions that will trigger additional authentication requirements, such as changes in geographic location or logins from unrecognised devices.
Highly secure hosting facilities
Agylia is a distributed, service-oriented system that utilises cloud technology. We use a combination of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) technology and solutions provided by a number of world-leading partners including Microsoft, Amazon, Rackspace and IBM.
The physical data centre security provided by our partners includes key cards, biometric scanning protocols, and around-the-clock interior and exterior surveillance to monitor data centre access. Numerous environmental controls help mitigate against the risk of interruption caused by fire, floods and other forms of natural disasters.
Our partners operate numerous information management frameworks based on a range of IT security standards including ISO 27001, with policies reviewed at least annually. SOC1 and 2 audit reports can be provided on request.
Security throughout the lifecycle
We incorporate security engineering best practices throughout our software development life cycle to help ensure a robust and secure solution.
Security objectives, goals and constraints are considered and defined early, before any new feature development takes place. We use proven architecture and design practices, patterns and principles to avoid common vulnerabilities introduced by poor design choices.
Threat modelling helps us to understand and identify the threats and vulnerabilities relevant to specific application scenarios.
Our software development team performs continuous security code reviews throughout the life cycle, to identify security vulnerabilities before they make it into released code.
Finally, deployment reviews ensure that any inadvertently weak or inappropriate configuration settings do not introduce security vulnerabilities.
Penetration testing, by independent, CREST accredited security specialists, is a regular part of our security operations. We are happy to share our latest penetration test reports on request. Please contact email@example.com for more information.
We can also support your own penetration testing, by your IS departments and security teams, should you require this service.