Property Asset and Planned Works Management with Mobile
User-friendly solution providing comprehensive Decent Homes/Housing Quality assessments, planned maintenance cost projections, energy efficiency analysis and works planning with contract management.
Mobile working for stock condition survey data collection and live works updates.
Powerful BI transforms the quality and levels of available information leading to rapid payback for our customers.
Features
- Quick and simple yet comprehensive assets management from any location
- User-friendly for analysis and reporting of current and future positions.
- Decent Homes and Housing Quality analysis and assessments
- Comprehensive maintenance cost projections and works planning functions
- Extensive energy efficiency and zero net carbon analysis and planning
- Scenario modelling for decision support and effective business planning
- NPV Calculations
- Efficient data maintenance features with validated bulk import and export
- Powerful in-built business intelligence and analytics with interactive dashboarding
- Comprehensive contract management offering progress and fiscal clarity
Benefits
- Simplifies complexity to manage assets from any location
- Easy to use commercially proven solution
- Innovative in-built BI delivers prompt access to pertinent insightful information
- Extensive, fast yet controlled data maintenance and rationalisation
- Ensures forecasting integrity and reporting confidence
- Improves decision making and provides decision evidence
- Delivers simplified and streamlined administration
- Drives operational cost and time savings
- Provides transparency of performance information across the organisation
- Cost effective solution offering immediate ROI
Pricing
£10,200 to £43,500 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 8 6 0 0 7 3 6 4 8 1 8 0 6 7
Contact
Asprey Solutions
Rachel Ratty
Telephone: 0330 460 9752
Email: rachel.ratty@aspreysolutions.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Available as a fully integrated suite or as discrete functions that can be readily integrated to existing systems in use.
- Cloud deployment model
- Public cloud
- Service constraints
-
Support is only provided to users who have had formal product training.
Out of hours scheduled maintenance and upgrades - System requirements
-
- Internet connection
- Web Browser
- Optional Microsoft Office for data export
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is provided during working hours, unless otherwise agreed and is subject to standard SLAs which would be agreed as part of any contract discussion.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our standard SLA break support tickets into three categories;
System Down - System is 100% unavailable either from a technical or business perspective. Response time within 2 hours, Resolution within 2 working hours or such longer period as the client agrees or specifies.
Live system element is broken - System is functioning but one or more users and unable to perform tasks on the system Response Time within 4 hours, Resolution within 3 working days or such longer period as the client agrees or specifies
Any other matter logged by e-mail to the Response Centre - This is deemed to be a minor problem you can continue working with and is not related to a systems failure. Response time within 6 hours, Resolution within 5 Working days or such longer period as the client agrees or specifies
Support is provided between the hours of 08:30 and 17:30 each day excluding Public Holidays and weekends. Standard support is included in the cost of the solution.
Clients have direct access to their account manager and are provided with contact details including a mobile number. Account managers have the power to reassess support tickets and escalate as appropriate. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Asprey follow a proven project management and implementation methodology which a tailored adaptation of PRINCE 2 for the social housing market.
Key onboarding milestones include:
Solution configuration workshops to ensure software meets the clients needs and business processes.
In-depth data analysis cleansing and gap analysis prior to system data loading of all electronic data provided.
Data baseline meeting including data weakness reporting
Interactive training sessions to ensure users are familiar with the products prior to go live.
Internal marketing presentations where the solution is demonstrated to the wider organisation and / or senior management.
Access to full product documentation, knowledgebase, FAQ’s and regular tricks and tips.
Optional on-site managed service consultancy for ongoing product adoption.
Regular account management meetings to ensure the organisation maximises the benefit from the use of the system.
Support services include an annual data health check to ensure the data is being correctly maintained and an annual training needs analysis to identify skill gaps based on raised support tickets.
Annual user group held for user collaboration and to determine future development priorities for the suite - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Microsoft Word for training materials for customer customisation
- End-of-contract data extraction
-
Clients are able to access the entire data structure using standard reporting tools such as SQL Server, SSRS, SSIS, Excel and PowerBI.
Data from each module can be exported separately using import / export function within the suite.
Standard product APIs can be used to extract data from the suite.
Data extraction service can be provided on a time and materials basis or a fixed price quotation. - End-of-contract process
-
Following notification of service termination, a plan will be agreed including data extract requirements and service end date.
Following the service end date all client data and backups will be deleted.
Support for data extraction using standard product export functionality will be provided. Customised data extraction services can be provided on a time and materials basis or a fixed price quotation.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our solution includes dedicated mobile data capture functions which have been designed with effective and efficient data capture in mind. Our operational modules can be accessed from mobile devices and these have been optimised for mobile devices.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- As a Microsoft Partner for software development our solution are guaranteed for exceptional usability. Functions operate within a web browser that has been developed to ensure navigation consistency and hence user familiarity across all operational areas. The design includes simple icon driven navigation and tool bars, with simple and consistent double click, drag and drop and export functions.
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Our API's are for integration with existing third party systems in use by a client. Our API's are general REST based.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our solution offers a wide range of operational function areas that can be selected by a client to meet their business needs. These can be configured to meet customers needs. Initial configuration services are included in costing (if needed). For on-going configuration changes consultancy services are available from the vendor to configure the system and users can configure and reconfigure the system to meet their changing business requirements.
Scaling
- Independence of resources
- Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Asprey do not operate a multi tenanted infrastructure and as such clients are provided with a dedicated solution scaled to meet the needs of the organisation. This ensures there is no completion for the resources available.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Clients are able to access the entire data structure using standard reporting tools such as SQL Server, SSRS, SSIS, Excel and PowerBI.
Data from each module can be exported separately using import / export function within the suite.
Standard product APIs can be used to extract data from the suite.
Data extraction service can be provided on a time and materials basis or a fixed price quotation. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Microsoft Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Microsoft Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Microsoft guarantee at least 99.5% connectivity.
- Approach to resilience
-
The solution takes advantage of Azure of high availability, disaster recovery and backup on Azure’s network.
Further information available on request. - Outage reporting
- Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Azure provides a public dashboard which shows the status of service. Azure also provides email alerts which are provide to clients if relevant.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The Asprey suite utilise the Azure Active Directory / ASP.NET security model which is a tried and tested system. Each user is assigned a number ‘roles’ for each of the products that indicates the screens they can see and the functions they can access including whether they have an ability to Add, Edit, Delete and View information. Passwords are stored encrypted and each account will allow for five incorrect password attempts before the account becomes locked and needs to be reset by a system administrator.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Asprey utilise a wide range of specific policies to manage security governance which cover audit, staff and user awareness and training. We have extensive training processes for new staff member induction covering this areas. Our organisational policies are regularly audited and annual reviews are undertaken by senior staff and company directors.
- Information security policies and processes
-
Asprey have a comprehensive information security policy that is regularly reviewed to ensure process are compliant. All staff undertake external training to ensure awareness of information security requirements. Internal workshops are held regularly to ensure compliance with internal procedures.
Documented policies include:
- Information Security
- Data Protection / GDPR
- Acceptable Use
- Backup
- Information Classification and Data Retention
- Change Management
- Access Control
- Business Continuity
- Incident Response
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Azure follow the continuous delivery model to provide iterative improvements to their cloud based infrastructure. This allows for a structured method of planning, development and deploying changes in a way to ensure system resilience.
The Asprey development team follow and Agile approach throughout the development lifecycle which allows for small iterations to be managed and integrated. Short iterations allow Asprey to ensure the quality of developments while also allowing flexible response to emerging technical and industry requirements - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Asprey utilise Azure’s Security Centre which provides continuous monitoring of the security of machines, networks and services using hundreds of built-in security assessments and provides security recommendations to remediate issues before they can be exploited.
It enables adaptive threat protection to reduce exposure to attacks. Blocking malware and other unwanted code by applying application controls adapted to your specific workloads and powered by machine learning. It also enable just-in-time, controlled access to management ports on Azure VMs to drastically reduce surface area exposed to brute force and other network attacks - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Asprey utilise Azure’s Security Centre which provides continuous monitoring of the security of machines, networks and services using hundreds of built-in security assessments and provides security recommendations to remediate issues before they can be exploited.
It enables adaptive threat protection to reduce exposure to attacks. Blocking malware and other unwanted code by applying application controls adapted to your specific workloads and powered by machine learning. It also enable just-in-time, controlled access to management ports on Azure VMs to drastically reduce surface area exposed to brute force and other network attacks - Incident management type
- Supplier-defined controls
- Incident management approach
-
Asprey have an incident response plan that we can supply upon request. This covers:
• Incident Preparation
• Discovery
• Notification
• Analysis and Assessment
• Response
• Containment
• Prevention
• Restoration
• Documentation
• Evidence Preservation and Evaluation
Users can report any incidents via the Asprey Support service. Post resolution of an incident the information is summarised to assess its impact, actions taken further actions required to mitigate the risk of future occurrence / impact
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Whilst advocates of the social value policies, as an SME we are limited, when compared to a capital works contractor or international supplier, however there are elements of social value we can provide and help our client organisations achieve.
Asprey are committed to continuous improvement in environmental performance. Our formal policy, which is available to all Asprey employees on our company intranet, looks at how all staff can assist with environmental management, and provides guidance, for example: Energy Use – Conservation of natural resources via extending the life of equipment through preventative maintenance scheduling, purchasing, reworking used equipment, and giving preference to renewable over non-renewable energy when feasible, switching machines and lights etc off when not in use. Resource consumption – use of renewable products as part of a sustainable procurement process, reduction of waste (i.e. reduction of printing etc) Recycling – using re-cycling bins. We have provided our Environmental Policy and an examples of employee assistance and guidance available on our company intranet, in response to the Environmental Initiatives question.
In addition to the above our solution offers comprehensive tools to assist our clients team in managing energy efficiency across their portfolio and attaining zero net carbon objectives.
Pricing
- Price
- £10,200 to £43,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Evaluation set ups are available upon request. Scope of function and time duration would be agreed in each request instance.