MRI Software Limited

Investment Modelling (IM)

Designed for organisations that invest in real estate and require technology to make informed decisions, gain competitive advantage, and capitalise on opportunities. This solution enables users to accurately forecast portfolio performance metrics and create hypothetical scenarios to build a strategic plan, make decisions, and transact efficiently.


  • Fund Modeling provides transparency of historical and forecasted fund performance
  • Debt Modeling assess the impact of future investments (asset/portfolio level)
  • Asset Modeling enables portfolio performance analysis and optimisation
  • Valuations monitors variations to ensure accuracy of assumptions


  • Streamline strategic planning
  • Manage and mitigate risk
  • Improve data quality with tools for extracting, analysing and transforming
  • Create what-if scenarios to analyse changing market conditions


£22,500 to £149,000 an instance a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

1 7 0 6 3 3 4 0 4 9 4 3 2 4 4


MRI Software Limited Claire Brown
Telephone: 020 3861 7100

Service scope

Software add-on or extension
Cloud deployment model
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Planned maintenance is typically scheduled outside of regular business hours.
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
MRI’s Global Client Support group will make every reasonable effort to ensure that submitted cases are assigned the proper level of Severity. Submitted cases will be responded to in the order in which they are received, with consideration given for higher Severity levels. Response Time is the time it takes before a Global Client Support agent makes initial contact with the individual who submitted case. Bundled Service (Normal Priority 6 Hours, Serious Priority 3 hours, Critical Priority Live Call Only) Concierge Standard (Normal Priority 4 Hours, Serious Priority 2 hours, Critical Priority Live Call Only)
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We include support within our annual fee. Support includes a named Account Manager and a Client Support Helpdesk. The Client Support Helpdesk also serves as the contact for all cloud support requests for trained users. Cases and incidents can be recorded and viewed in the myMRI portal on a 24/7 basis. The myMRI Portal provides clients with information on support cases, regardless of whether a call is logged via a phone call or via the portal. Various information, documentation, forums and resources are also available on the portal.
Support available to third parties

Onboarding and offboarding

Getting started
Our training program is designed to help you achieve the maximum return on investment. During the implementation phase we will train your core project team to have a strong understanding of the system. Your project team will learn how data is structured in the solution, the available configuration options within the standard product and how the specific processes operate. This process involves reviewing your business processes as they are mapped to system functionality. We offer both classroom and webinar training. During this stage, well-designed and executed training helps your users of the system to become proficient and self-sufficient. After commencement of live use of the software, you will have access to a wealth of expertise via the support staff who are eager to assist with client questions and queries related to the system. You will also have access to our client portal for system documentation, user guides, video clips, forums, in addition to the support team.
Service documentation
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
Users are able to extract their data via numerous methods, including outputs to Excel, CSV, and XML. There are native export tools, and there is also the option to run SQL queries on the underlying database.
End-of-contract process
Following termination of the contract (for whatever reason), buyer shall certify that it has returned or destroyed all copies of the applicable software and confidential information of supplier and acknowledges that its rights to use the same are relinquished. Buyer shall use its commercially reasonable efforts to remove all buyer data from any software or SaaS service prior to termination of the contract. Buyer may engage supplier to assist buyer in removing such buyer data at supplier''s then standard rates. If any buyer data remains in the software or SaaS service more than thirty (30) calendar days after the effective date of termination, supplier may, in its sole discretion and without notice, delete any and all buyer data.

Using the service

Web browser interface
Application to install
Compatible operating systems
  • MacOS
  • Windows
Designed for use on mobile devices
Service interface
User support accessibility
None or don’t know
Customisation available
Description of customisation
The system configuration can be configured to handle new accounts, account groups, charges and area types as need.

With a Toolkit license, you can introduce a custom chart of accounts as well as customise page layouts and create new reports.


Independence of resources
Due to the unique and ever-changing needs of clients it is not possible to outline any single solution that encompasses this aspect. SaaS environments are monitored continuously and supplier will make adjustments to the application farms based on load criteria. Supplier monitors network, web, API, reporting and SQL load and flux in capacity as needed to accommodate growth in the environment. Due to the unique and ever-changing needs of clients it is not possible to outline any single solution that encompasses this aspect.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other data at rest protection approach
SQL encryption
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported into pre-defined formats such as PISCES 1.6 via a specific export page.

Additionally, all reports can be exported to Excel, CSV or PDF via the standard report toolbar.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Other protection within supplier network
Internally there is no additional network encryption.

Availability and resilience

Guaranteed availability
We use commercially reasonable efforts to ensure availability twenty -four (24) hours a day, seven (7) days a week, except for: (a) planned downtime (of which we provide adequate notice and will schedule to the extent practicable during the weekend hours), or (b) any unavailability caused by circumstances beyond our reasonable control, including without limitation, Force Majeure events or internet service provider failures or delays. We host our solution in a UK-based Tier 3 data centre that is designed to deliver high availability.
Approach to resilience
Available on request
Outage reporting
Weekly scheduled maintenance. Salesforce support desk is used to manage customer / support interaction for specific customer system issues. E-mail advisories are in place and used to alert multiple customers / contacts of unplanned outages.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
A limited number of Client Support Agents have access to the client data. Client-side personnel who have authority to manage security within the product have full visibility to each of these Client Support Agents and what security parameters they have. Our policy and process is to perform regular audits to verify that only the necessary personnel have access to client data.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Investment Modelling security controls and processes are used to manage the Application Platform.
Information security policies and processes
We have a documented Information Security Policies and a dedicated Information Security Team work under the direction of our Information Security Council, which is responsible for assessing information security policies, technologies, and strategies. The Information Security Council in conjunction with the Information Security Team evaluates the role, scope, and size of the Information Security Team annually, based on our company size, our clients industries and the sensitivity of the data we house for those clients.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available upon request
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Supplier engages in penetration testing, vulnerability scanning to assist in the discovery of potential threats. Upon completion of testing, supplier reviews and assesses potential and actual threats and creates and executes plans for mitigation and remediation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Supplier responds to incidents via the Information Security Team and associated subject matter experts in a real-time, solution-driven environment.
Incident management type
Supplier-defined controls
Incident management approach
6 Stage Process. Stage 1 Discovery - Discovery of incident and reporting to security team Stage 2 Evaluation - Initial review of the incident by the security team Stage 3 Containment - Containment and assessment of the incident Stage 4 Eradication - Removal of threat Stage 5 Recovery - Restoration of services to operational state Stage 6 Follow-Through - Post mortem documentation and review of policies

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks

Social Value

Tackling economic inequality

Tackling economic inequality

Whilst not a certified living wage employer, our employees are all contracted and salaried fairly, in line with the Living Wage standards. We do not employ anyone on zero hours contracts and have a strong commitment to regularly review salaries in line with our appraisal process. We have a number of apprentices in the business who we are supporting to complete degree level qualifications, who all receive above the apprentice minimum wage.
Equal opportunity

Equal opportunity

We work hard to ensure our employees have a voice. We have various committees in place within our business, for example a Diversity, Equity and Inclusion committee, An Events Group which helps us to understand how employees are feeling about working at MRI and helping us drive forward inclusive events. We have also very recently launched our first ERG – employee resource group for Women and Allies. As a business with over 250 employees in the UK we are required to produce a Gender Pay Gap report. We very much welcome this initiative and our latest report will be available via our website from 4th April 2022. This report shows the impact we have on reducing our Gender Pay Gap and also highlights the many initiatives we have underway to further reduce our gap.



Work hard, play hard. From the day we opened our doors we set out to build flexible, game-changing solutions to make people's lives better. We do this by providing our clients with solutions which can enable them to provide better places to live, work and do business. The only way to carry out that mission is to hire the best employees and keep them. We are dedicated to creating a working environment which supports and develops our staff. Some of the benefits that we offer are: Gym reimbursements Medical assistance, including mental health tools Flexible working opportunities, including hybrid working Employee engagement is key to MRI's success and we hold quarterly spirit weeks to both connect and enthuse our teams globally. These weeks are themed and where staff are encouraged to learn about different topics or take part in activities that they might not typically have time for. These include fitness sessions, cooking sessions, engagement with families for those working from home or targeting one big event where we can globally feel like we are one team with the same goal. We also carry our bi-annual employee engagement surveys to ensure employees can express their views. With our most recent survey we had an 89% completion rate and we are currently creating actions to help us improve as a business as a result of our employee feedback.


£22,500 to £149,000 an instance a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.