Pin Routes - Route Optimisation and Scheduling Software
Advanced route optimisation software for organisations with fleets of vehicles. Suitable for teams with 10-10,000 vehicles. Pin Routes lives in the cloud, is fully scalable, has a super- friendly UI, accessible via APIs, highly flexible and powered by industry-leading algorithms. It reduces planning time, errors, miles, driver hours and costs.
Features
- Secure multi-factor authentication
- Import data using CSV and API
- Geocoding of address data
- Drivetimes/distance calculated based on vehicle type and traffic conditions
- Routes optimised based on time windows, work rules, vehicle availability
- Optimised routes displayed on the map, timeline and grid
- Data and solution exported in multiple formats using PowerBI/API
- Experienced Account Manager
- Training and onboarding provided
- Access to expert technical support
Benefits
- Save planning time through automating scheduling process
- Reduce number of vehicles and fuel through optimising routes
- Achieve ESG targets through a reduction in carbon emissions
- Conduct 'what if' analysis to model operations strategically
- Error reduction during logistics planning processes through automation
- Ensure the correct vehicles drive on right roads to destination
- Route drivers accurately to premise-level front doors
- Accurately predict driver stop times
- Plan operations understanding accurate drive times
- Geocode patient or delivery locations to their accurate coordinates
Pricing
£271 to £486 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 4 1 1 9 5 9 4 7 0 7 3 9 7
Contact
CACI UK Ltd
CACI Digital Marketplace Sales Team
Telephone: 0207 602 6000
Email: digital.marketplace@caci.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Appropriate browser enabled device and connection to the internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- CACI responds to questions on average within thirty minutes, or less, from reciept during office hours. Resolution, if not achieved immediately when responding, is typically within 24-48 hours depending on the complexity of the enquiry. Enquiries logged outside of office hours will be quickly addressed on the next working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
CACI provides comprehensive support as standard for all Pin Routes customers. For the duration of the license term users can request support using email or phone. Support requests are responded within 2 hours during normal business hours.
Initially, from contract start, support is provided in the form of training and onboarding to users to ensure they can effectively use Pin Routes. Depending on the number and location of users that require training this can be held at CACI’s Head Office, in London, or onsite. Sessions are designed to be interactive and are conducted by one of CACI’s experienced consultants. Subsequent health checks and training sessions throughout the licence term will review how the users are utilising Pin Routes to maximise the value delivered.
The customers will have access to a single point of contact for all enquiries. An Account Manager will field all general or technical enquiries, and depending on the nature of the enquiry, will either resolve directly, or escalate to CACI’s Pin Routes technical team of experts. Customers can make contact via telephone or email. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
To ensure users maximise the value of Pin Routes and the associated licenced datasets, CACI includes training as standard. Depending on the number of users and location this can be held virtually (e.g. via Teams), at CACI’s Head Office, in London, or onsite.
To embed the required knowledge for users to effectively use Pin Routes, training is designed to be interactive and is conducted by one of CACI's experienced consultants, with an in-depth knowledge of the solution. Training lasts a varying amount of time depending on the size of team and scale of solution rollout.
AI enabled help pages are also available to help users in their learning journey. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Microsoft Word
- Microsoft Excel
- Microsoft Powerpoint
- End-of-contract data extraction
-
At the end of the contract Pin Routes will automatically switch off. When your contract ends, Pin Routes will become inacessible and data will be deleted 90 days after end of contract (unless the user requests otherwise). Aggregated data that may have been included as part of published reports and / or maps in line with CACI's publishing and sharing terms and conditions.
CACI will issue a Termination Letter at the end of the licence term for the customer to sign and return. This formally and legally terminates the agreement and confirms compliance with the contract termination terms and conditions. - End-of-contract process
-
Should a customer choose not to renew their license, it is a requirement for the customer to serve notice (in writing or via email) 90 days before the end of the agreement. As the end of the agreement approaches CACI will issue a termination letter for the customer to sign and return formalising the end of the agreement.
The customers access to Pin Routes will then be switched off and all user account data will be deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Pin Routes is designed to work on an internet browser with and without a touch interface. All operations are either typed into input boxes or selections made through clickable menu items.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Pin Routes has been designed and developed to optimise access and usability for customers, i.e. colour schemes, fonts and page layouts. Pin Routes is fully compatible with the accessibility features of the leading web browsers; Chrome and Edge
- Accessibility testing
- Internal testing has been carried out during the development of Pin Routes to optimise access and usability for customers, i.e. colour schemes, fonts and page layouts. Pin Routes is fully compatible with the accessibility features of the leading web browsers; Chrome and Edge. CACI has experience of tailoring visual displays for users with visual impairment, and discuss specific requirements on a customer-by-customer basis.
- API
- Yes
- What users can and can't do using the API
-
Integration APIs provide a secure interface from the platform allowing you to import and export data
The APIs follow the REST conventions, users can get started making requests, after successful authentication.
To authenticate users will need first to register and request API keys. The set-up process and any requests for changes must be conducted in liaison with Pin Routes' Technical Team.
Usage limitations are based on a combination of CACI’s own terms of use as well as the client’ requirements, the limitations will be upon request. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can customise:
i) Layout options
ii) Level of optimisation
iii) Line of route vs. straight line
Scaling
- Independence of resources
- CACI operates internal processes to ensure resources are matched to meet demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Successful/failed logons
Session duration
Number of vehicles/routes optimised
Number of jobs optimised - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- The system is protected in its own segregated environment with industry leading firewalls and WAF, on n+1 enterprise architecture infrastructure in a UK data centre, wth daily encrypted backups taken off-site. CACI is certified to ISO27001 with robust information security measures. CACI has an enterprise level Data Loss Prevention (DLP) solution in place which monitors all endpoints, identifies any attempts to download or move personal data, and alerts administrators should any such event be detected.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Pin Routes allows users to define at a granular level the data they wish to export. Data can exported as flat files or via API.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- PPTX
- DOCX
- HMTL
- XML
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- The system is protected in its own segregated environment with industry leading firewalls and WAF, on n+1 enterprise architecture infrastructure in a UK data centre, with daily encrypted backups taken off-site. CACI is certified to ISO27001 with robust information security measures.
Availability and resilience
- Guaranteed availability
- Pin Routes availability is 99.25%. Where customers require a Service Level Agreement (SLA) and respective Key Performance Indicators (KPIs), these are discussed and agreed at contract stage to align to customers needs.
- Approach to resilience
-
Pin Routes Azure services deployments are fortified with robust networking and power infrastructure, ensuring resilience. Hosted within Azure's fault-tolerant data centers, these services capitalize on fault domain isolation to safeguard against networking and power disruptions. Azure data centres are equipped with redundant networking switches and power sources, bolstering reliability.
CACI Pin Routes Azure services benefits from automatic instance healing, swiftly replacing any impaired instances to sustain continuous availability. Additionally, load balancers intelligently distribute incoming traffic across multiple instances, bolstering resilience and performance.
In the event of power interruptions, Azure data centers rely on N+N Uninterruptable Power Supply (UPS) systems coupled with backup diesel generators, swiftly activated within minutes to maintain service continuity.
Pin Routes Azure Durable Functions leverage Azure's resilient infrastructure, complemented by redundant networking and power provisions, ensuring dependable orchestration and execution of workflows. Azure's rigorous monitoring and alerting through Azure Monitor empower proactive issue detection and resolution.
Furthermore, Azure's backup and restore capabilities safeguard against data loss or corruption, enhancing overall resilience. In summary, CACI Azure Pin Routes Services benefit from a resilient networking infrastructure, supported by redundant components, global network connectivity, and proactive monitoring, ensuring uninterrupted operation and high availability of applications. - Outage reporting
- In the unlikely event of service outage an email alert would be sent to the user(s).
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
-
Robust identity and access management controls are in place within the hosting environment to restrict personnel access to administrative tools, and to help ensure authorised personnel have the appropriate level of access.
• Each account is created with a unique ID.
• Multi-factor authentication is configured as standard.
• All authentication and administrative activities are logged within the instance.
• Sessions are automatically timed out after a period of inactivity.
Customers control the user management to their solution.
Database access privileges and role-based user access can be assigned by the customer using the customer via the service system administration module. - Access restrictions in management interfaces and support channels
- Certain administrative elements of Pin Routes only accessible by assigned administrators.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
-
Multi-factor authentication is required for administrate access or restricted to internal machines.
Only a small number of consultants are provided with special access privileged, these are subject to a technical competency assessment and are in accordance with our privileged access rights and segregation of duties policies.
Administrators have each been assigned a separate account for privileged account activities.
Comprehensive security monitoring on all key configuration, user, and administrator.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- Original Registration Date:11th April 2006 – last re-certification date was on the 6th July 2021 .
- What the ISO/IEC 27001 doesn’t cover
- Our 27001 certification covers all CACI services, offices, and data centres.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Registered with ICO under the Network and Information Systems Directive
- Data Seal - DS270012/1-2014
- ISO 9001 - this includes additional elements regarding security
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
CACI holds Cyber Essentials Plus, and The Data and Marketing Association's Data Seal certifications.
Also registered with the ICO under the Network and Information Systems (NIS) Directive.
Additionally, CACI holds ISO/IEC standards in:
- ISO9001:2015 Quality Management Systems
- ISO/IEC 20000-1 Service Management System
- ISO/IEC 14001 Environmental management . - Information security policies and processes
-
CACI have a comprehensive suite of security policies that uses the ISO27001 standard as a baseline. The policy is owned by CACI's Executive Management Team which is an executive level body, and which assumes ultimate responsibility. The ISO standard coverage includes:
- Organisation and Management
- Information Security
- Asset Classification
- Physical and Environmental Security
- Communications and Operations Management
- System Access
- Systems Development and Maintenance
- Compliance
- Personnel and Provisioning
- Business Continuity Management
- Third Party Management.
CACI’s Information security objectives are defined at board level and managed day to day by the Security team (all qualified ISO27001 lead auditors.) They report to the Chief Information Security Officer, who holds overall responsibility for information security.
Information security and data privacy training is provided upon induction. On-going training and updates are provided throughout employment.
Staff sit an annual exam to demonstrate their security and data privacy awareness and competency.
Annual phishing and social engineering awareness training, and monthly phishing tests, are conducted by an external training and testing partner.
All Information security policies and training presentations are published on our intranet site.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
A documented change management system forms part of our ISMS. All major and significant changes are peer reviewed and must be approved by the change advisory board (CAB) which delivers support to a change management team by approving requested changes and assisting in the assessment and prioritisation of changes.
All changes are subject to our Change Control Policy. Where there is the possibility of an impact to user activity, the appropriate stakeholders are notified for feedback.
The change must then be forwarded to Change managers for CAB approval, who may append plans when appropriate. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
CACI has a comprehensive vulnerability management program that includes conducting weekly vulnerability scans on critical systems and applications.
New patches are promptly risk assessed and prioritised based on the severity of the vulnerability and the threat intelligence available.
Where an Emergency patch poses an imminent threat to the network it is installed without undue delay.
All other Windows patches are installed within 14 days of receipt.
Our system administrators subscribe to alerts and publications to ensure new are emerging threats are countered promptly and effectively and that new Technologies and security best practices are assessed and adopted where appropriate. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
CACI use Checkpoint firewalls with IPS blade installed with. IPS subscriptions.
Active Directory event logging is configured on Windows system, and configured to capture appropriate events to prevent security incidents/ malpractices.
OpenNMS Meridian and checkmk utilised for network monitoring.
Zabbix and HPE OneView used for server monitoring.
Checkpoint SmartCenter and HPE OneView used to monitor systems and alert administrators of security/capacity/resource problems.
Quest Change Auditor monitors all configuration/user/administrator changes. Daily reviews are conducted.
Antivirus logs centrally processed and alerts sent.
O365 vlogs collated into Microsoft Cloud App Security. Alerts are reviewed.
Windows server event logs are shipped to logging server. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All employees are required to report any real, perceived, or potential security incidents that may affect the confidentiality, integrity, or availability of data.
All Security Incidents are recorded in-line with our Security Incident Policy and Response Procedure, for each incident a root cause analysis is conducted, a corrective action undertaken, and a preventative action will be implemented to prevent or reduce the probability of the incident reoccurring in the future.
CACI’s cyber security management programme includes cyber incident response plans, advanced technical controls, operation resilience and business continuity management to minimise the impact of a cyber-security attack or incident
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As a supplier primarily of professional IT services, CACI’s environmental impact is minimal. However, we are constantly looking at how we can operate more efficiently in our fight towards climate change. We are working towards a Net Zero Carbon business model through our delivery to our customers as promoting this to our supply chain.
This commitment is demonstrated by our achievement of ISO14001 accreditation, which we have held for nine years. To attain this standard, we ensure our Environment Management System (EMS) met the following requirements:
-Awareness of environmental impact through procedures and controls
-Acceptance of responsibility through environmental management systems
-Reducing harmful impacts via environmental policies
-Displaying community responsibility via staff training and awareness
We are fully committed to working towards a circular economy approach and where practically possible CACI select the most sustainable means to operate its facilities We remain aware of any and all opportunities to share, lease, reuse, repair, refurbish and recycle existing materials and products. That includes using recycled paper, enforcing double sided printing, and using Energy Star devices. Our recycling policy includes energy/water consumption, waste materials and paper use.
CACI has an agreed Carbon Reduction Plan (CRP) which is in implementation and is published on our website. This includes a set of carbon reduction targets up until 2040, with a baseline period set from July 2020 to June 2021.Tackling economic inequality
CACI is dedicated to creating employment opportunities, working with local suppliers and hiring local people. We adjust our recruitment and training processes to focus on attributes rather than qualifications, which could exclude those from a disadvantaged background or deprived areas. Inclusivity and accessibility are encouraged via unconscious bias education and positive and inclusive designs, accessible capabilities, and inclusivity in gathering requirements for digital services. For example, we work closely with the National Autistic Society and Autism at Work to create an inclusive recruitment process, actively supporting neurodiverse candidates to flourish.
CACI works with a number of outreach organisations to develop and attract individuals from minority groups into the cyber security sector, including CyberFirst. A number of our employees volunteer as Ambassadors to this NCSC led government outreach programme. This is a reflection of our belief in the programme’s mission, to develop a sustainable and diverse talent pipeline into the cyber security industry. The majority of the programme’s focus is on students in UK schools, to improve issues with massive student dropout from IT education.
CACI has pledged to promote equality of opportunity within our supply chain, and work with a diverse range, including specialist Small and Medium Enterprise (SME)s. Our network is diverse and wide ranging in terms of skill set, age of business, make up of employees, geographical location, and therefore varying business cultures and diversity of individuals.
We are focussed on creating opportunities from the following groups who experience barriers to employment :
-Long term unemployed
-Armed forces veterans
-Mothers returning to work
-Care leaversEqual opportunity
CACI’s Equal Opportunities policy formalises our approach to not discriminate against any employee on the basis of sex or sexual orientation, marital or civil partner status, gender reassignment, race, religion or belief, colour, nationality, ethnic or national origin, disability or age, pregnancy or maternity or other characteristics defined in anti-discrimination legislation (Protected Characteristics), or trade union membership or the fact that they are a part-time worker or a fixed-term employee. Our employees and applicants for employment with CACI are not disadvantaged by any policies or conditions of service which cannot be justified as necessary for operational purposes.
CACI is dedicated to ensuring our work environment, operational delivery and recruitment processes accommodate people with disabilities. Adjustments are made to ensure that those with disabilities are included and supported in our workplaces.
Our Workplace Adjustment Passport (WAP) enables employees to declare a disability, workplace adjustments are driven at company level.
CACI has signed up to the Disability Confident Scheme, formalising our commitment to play a lead role in changing attitudes for the better. We aim to successfully employ and retain disabled people and/or those with health conditions. When designing internal training or selecting an external partner, staff are consulted to capture any specialist needs to tailor sessions, including location, means of delivery and materials. This ensures all staff can develop in a comfortable and accessible environment.
CACI also works closely with the National Autistic Society to create an inclusive recruitment process, partnering with their Autism at Work programme; actively supporting neurodiverse candidates to flourish.
CACI have funded the creation of a number of staff networks, where employees with protected characteristics have time and resources to share ideas and support in a safe private environment. CACI have also offered specific training and talks from speakers related to these characteristics.Wellbeing
CACI has a range of comprehensive support initiatives that have been implemented to aid the health and wellbeing of our workforce (including contractors). Below is a comprehensive list, with specific reference to the six standards of Mental Health at Work commitment.
Promotion of an Open Culture around Mental Health:
-Team of 18 Mental Health First Aiders
-Conduct regular drop-in sessions for all staff, delivered by a Mental Health First Aider Team, focus on a particular element of Mental Health
Prioritising Mental Health in the Workplace by developing and delivering a systematic programme of activity:
-Regular check-ins for staff and our contractor workforce
-Annual Staff Satisfaction Survey, which includes a section on Health & Wellbeing
-Free 24/7 professional counselling
-Private healthcare and health and wellbeing plan (extendable to family members/dependents)
-Employee Assistance Programme
-Discounted gym memberships
-Physiotherapy
-Medical services
-Mental Health First Aider programme
-Stress assessments
Proactively ensure work design and organisational culture to drive positive mental health outcomes
-Comprehensive property and facilities management, ensuring modern, comfortable and state of the art technology for all employees
-Distributed Working Programme, allowing employees and contractors to structure their working week in a way that suits their preference and personal commitments whilst delivering against their work accountabilities
-Open and honest communications at all levels throughout the organisation
Increased organisational confidence and capability:
-Dedicated area of our company intranet for mental health and wellbeing, including various supporting resources and colleagues
-Line Managers and Career Coaches trained in aspects of mental health
Provide mental health tools and support:
-Formal Mental Health First Aid Programme including a team of MHFAs
Increase transparency and accountability through internal and external reporting:
-Publish the results of our annual staff satisfaction survey to all staff. Includes Mental Health and Wellbeing, actions taken and areas for improvement
Pricing
- Price
- £271 to £486 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Circumstantial
- Link to free trial
- Available on request, based on circumstances