Request a demo

A multi-layered approach to security

We are living in an increasingly security conscious world, and are faced with an increasing range of cyber threats. Agylia protects your IP and your users’ personal information, through a multi-layered approach to security, one that considers people, process and technology.

  • ISO 27001 Certified and Cyber Essentials Certified, and GDPR Compliant
  • World leading data centre hosting facilities
  • Secure software development lifecycle, independent CREST accredited penetration testing
  • Security support to address your own specific regulatory and compliance requirements
Security | Agylia Learning Management System
  • Easy access to learning resources through single sign-on

    With single sign-on (SSO), learners don’t need to remember additional passwords or continuously enter login credentials to access their learning and support materials. 

    SSO enables learners to automatically log in to Agylia when signed in to other systems and applications – such as a work device (PC or laptop), corporate intranet sites, or HR systems.  

    Easy access to learning resources through single sign-on
  • Highly secure hosting facilities

    Agylia is a distributed, service-oriented system that utilises cloud technology. We use a combination of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) technology and solutions provided by a number of world-leading partners including Microsoft, Amazon, Rackspace and IBM.

    The physical data centre security provided by our partners includes key cards, biometric scanning protocols, and around-the-clock interior and exterior surveillance to monitor data centre access. Numerous environmental controls help mitigate against the risk of interruption caused by fire, floods and other forms of natural disasters.

    Our partners operate numerous information management frameworks based on a range of IT security standards including ISO 27001, with policies reviewed at least annually. SOC1 and 2 audit reports can be provided on request.

    Read more
    Highly secure hosting facilities
  • Security throughout the lifecycle

    We incorporate security engineering best practices throughout our software development life cycle to help ensure a robust and secure solution.

    Security objectives, goals and constraints are considered and defined early, before any new feature development takes place. We use proven architecture and design practices, patterns and principles to avoid common vulnerabilities introduced by poor design choices.

    Threat modelling helps us to understand and identify the threats and vulnerabilities relevant to specific application scenarios.

    Our software development team performs continuous security code reviews throughout the life cycle, to identify security vulnerabilities before they make it into released code.

    Finally, deployment reviews ensure that any inadvertently weak or inappropriate configuration settings do not introduce security vulnerabilities.

    Read more
    Security throughout the lifecycle
  • Penetration testing

    Penetration testing, by independent, CREST accredited security specialists, is a regular part of our security operations. We are happy to share our latest penetration test reports on request. Please contact for more information.

    We can also support your own penetration testing, by your IS departments and security teams, should you require this service.

    Penetration testing


For our full collection, please see our whitepapers and datasheets sections.

Some of our clients:
  • Microsoft
  • FCO
  • Deloitte
  • HSBC
  • Grant Thornton
  • Johnson and Johnson
  • Human Performance Institute
  • Toray
  • National Youth Agency
  • Pernod Ricard
  • Lovell
  • PWC
  • DFID
  • Chartered Institute of Marketing
  • headspace Denmark