Why Us

Rowlette Dynamic’s Learning Management Offering comes with three pillars.

Learning Management System

We provide a world class product. It’s global, it’s mobile, it’s scalable, it’s robust, and its security is top notch.

Learning Management Content

Our training and resource library is expansive, and access to it is all inclusive! Regularly updated, free hosting of your content, and available via smartphone, tablet, and computer.

Learning Management Services

We provide world class support. We are here to supplement, or even act as, your training staff. We understand your needs and will work with you to ensure you get the most out of your investment.

Learning Management System

Our learning management system is built by the best

Cloud-Based Technology with six nines reliability

That is 99.9999% up-time (time online) and correlates to 32 seconds or less of downtime over 365 days of 24/7 usage!

Enterprise grade framework

Extreme security, performance, scalability, restoration, and back capabilities.

Customizable to fit your needs

Create your own training, tracking, and reporting with self-administration.

Why use a cloud-based setup?

The answer lies in the access and cost savings

Utilizing a cloud approach means hardware is scalable. We use a leader in the industry to provide an unparalleled experience.

–Uptime that is hard (if not impossible) to accomplish in-house.

–Risk mitigation with built-in security, continuous security testing.

–Including compliance with IT security standard.

–Regular SSAE 18 SOC 1 and SOC 2 design and operational efficiency audits.

–Using an integrated compliance framework to simplify things like ISO 27001 and ITIL for Service Delivery.

Is this approach secure?

Let’s talk about security

Physical security routinely performs vulnerability assessments and penetration testing on its infrastructure and applications. Our applications are scanned continuously against the Open Web Application Security Project (OWASP) top security flaws. Each quarter our vendor employs third-party security experts to perform detailed vulnerability scans on different parts of the applications and manual penetration test yearly.

  • Block illegal entry via biometric readers, and bulletproof walls, 

  • Provide a shield against fire, natural disasters, and weather shifts with fire suppression systems; environment monitoring; and earthquake-safe designs. 

  • Avoid downtime with redundant power links to local utilities, backup batteries, and uninterruptible power supplies.  

  • Immediately act on security breaches through the use of silent alarms.
  • Provide enhanced backup and restore LMS runs full and incremental data backups daily or weekly and full archive logs backups daily, where applicable. Back up data is stored on an encrypted disk using AES 256-bit encryption. This data is available for rapid re-implementation and system restores if needed for any reason.
  •  

Database Level Security

Where your data is all stored – is secure

Database environments used in cloud computing can vary significantly. Our offering secures data while at rest, in transit, and in use, and implements strict measures for:

• Access control: All access to information processing facilities and business processes are controlled according to business and security requirements.

• Database audits: Regular database audits allow us to maintain records demonstrating proof of origin.

• Data encryption: Our solutions use a minimum of Advanced Encryption Standard (AES) 256-bit encryption to secure data at the block level of the storage systems.

Middleware Security

Providing security between you and the cloud

The architecture of the software and hardware used to deliver cloud services can vary significantly among public cloud providers. Therefore, it is important to understand the technologies the cloud provider uses to provision services and the implications they have on the security and privacy of the system throughout its life cycle. We ensure that proper safeguards are in place to enforce authentication, authorization, and other identity- and access-management functions, including:

• Multi-factor authentication, which is required for administrators who manage the production environment

• Single sign-on and identity federation, which allows you to authenticate directly from your existing authorizing system, via Lightweight Directory Access Protocol (LDAP), tokens, or Security Assertion Markup Language (SAML 2.0)

• SAML 2.0 assertion, which allows you to authenticate users using your choice of identity provider and provides a standard mechanism to safely transmit the identity information to our offering.

• Secure Socket Layer (SSL) technology, which protects application information accessed through a browser using server authentication and data encryption.

Application Security

Secure apps for safe learning

Our applications employ extensive security measures to protect against the loss, misuse, and unauthorized alteration of data. Our offering ensures security through continuous software testing to:

• Protect against improper logins by requiring user logins each time the application is opened, by using automatic logouts after thirty minutes and account locks after multiple failed logins.

• Provide best-practice security at all levels (function, transaction, field, and data) by using role-based permissions (RBP).

• Repel attacks in application-level firewalls to prevent SQL injection and cross-site scripting attacks and test applications using OWASP.

Network Security

A secure network to ensure it all stays safe

Our offering uses industry-leading routers, switches, and load balancers that are configured to provide secure, highly available access. Then, we ensure that every component of the IT network – from the point of entry to the place where information is stored – is meticulously configured, deployed, maintained, and continually tested for optimal performance. Finally, our offering takes extra steps to:

• Reinforce security with redundant connections to multiple Tier 1 Internet service providers (ISPs) for highly available network access. All network equipment is redundant, providing seamless failover between devices.

• Protect network and applications through Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS), network vulnerability scanning, and third-Party penetration tests.

• Mitigate against denial of service attacks by using a major third-party provider to deliver a scalable, fault-tolerant global Domain Name System (DNS) and Service Level Agreements (SLAs) with our Internet service providers (ISPs) for DoS response and mitigation support.

Learning Management Content

Our training and resource library is expansive, and access to it is all-inclusive!
Regularly updated, free hosting of your content, and available via smartphone, tablet, and computer.

Our offering uses industry-leading routers, switches, and load balancers that are configured to provide secure, highly available access. Then, we ensure that every component of the IT network – from the point of entry to the place where information is stored – is meticulously configured, deployed, maintained, and continually tested for optimal performance. Finally, our offering takes extra steps to:

Our learning management content is ready to go!

• We have an expansive library offering over 15,000 learning resources!

• New courses, resources, and workshops are added regularly!

• All-inclusive library means no surprises, upsells, or gimmicks!

• Available via smartphone, tablet, and computer!

• Host your own content FOR FREE!

Seriously Expansive Library

And it keeps growing

• We provide an all-inclusive offering

        – That’s access to our whole library!

               • New content included!

               • Workshops, learning resources, and classes for everyone!

• Dynamical in delivery and design

        – We’re out to make things accessible, digestible, and put learning from static to dynamic!

               • We approach each topic and deliver as we would in person, for teammates! Not students – as we are in this together!

• Real materials designed by industry professionals

        – Our materials are designed to work!

               • Our approach is to help you AND your employees!

               • Designed to be useful, functional, value-added resources!

Access Is Key

Applied learning is the goal

• No need to schedule office time, buy more resources, or shift employees to balance staffing and workflow.

        – Our training is available 24/7/365 via:

                • Smartphone

                • Tablet

                • Computer

• This means access to your material whenever, wherever you need it!

• We even host your own content FOR FREE!

Applied Learning

Use this dynamic access to bolster your bottom line

• This is where your content and approach pay dividends.

• Access to knowledge resources reduces errors, operates safely, and guides the workforce.

• Provide training in key situations or access to audits to ensure proper closeout.

• Guide your staff from onboarding and throughout the year!

Learning Management Services

We provide world class support. We are here to supplement, or even act as, your training staff. We understand your needs and will work with you to ensure you get the most out of your investment.

Our learning management services are standing by!

• Gain access to a dedicated learning management Account Executive to handle the administration of your system.

        – They get to know your needs and handle your needs!

• Flexibility to serve as your training staff or complement your existing training team.

        – Our services offering ensures you have support when you need it, how you need it.

• Get customized learning paths, training tracking, and usage reports of your workforce.

        – Our team ensures you are getting the FULL VALUE of your technology!

Account Executive

A real person with a real goal – your goal

• Our approach is different than you’ve seen – this holds true with our Account Executives as well.

• With our SERVICES offering you gain access to an Account Executive to ensure your needs are met.

• This means a direct line, and a direct mission – your mission. They ensure your account is solid.

• Need administration help? They are your single point of contact. They WILL see it handled. It’s their job. No long waiting list, they are armed to see your needs through. NOW!

Real Support

No egos here – just business

• Have a team member or staff handling your on-site training? Great!

        –We can serve as the training staff or augment your existing training staff!

        – We’re here to help however we can! We can guide, assist, or do the administration for you.

• Get customized learning paths, training tracking, and usage reports of your workforce.

        – Our team ensures you are getting the FULL VALUE of your technology!

Want To Try the Future of Workforce Training?

No risk, obligation, or credit card required.

By using this website, you agree to our use of cookies. We use cookies to provide you with a great experience and to help our website run effectively.