AI Augmentation for Building Opex & Decarbonisation
We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.
Features
- Secure Buidling Data Monitoring
- Data Validation
- Continous Monitoring and Reporting
- Operational Performance Monitoring
- Decarbonisation
- Energy Efficiency
- Predictive Maintenance
- Digital Building Services
- NetZero Strategy
- AI and ML Building Control Augmentation
Benefits
- Complex data reporting made simple
- Lower Opex Costs
- Lower Carbon Footprint
- Better Air Quality
- Better Thermal Comfort
- Compliance Standardisation
- Open and Integrated Deployments
- Continal Updates and Data Access
- Multiple Integrations for all devices
- Clear Benefits and Baselineing
Pricing
£5,000 to £15,000 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 2 9 2 8 6 9 2 9 0 2 9 1 6
Contact
FUTURE DECISIONS LTD
richard@futuredecisions.net
Telephone: 07888121193
Email: richard@futuredecisions.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Requires the Building to have a BMS Network
- Required the Building to have stable Internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 12 to 24 hours weekdays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Free - Via Phone and Email.
Standard - Dedicated Priority Response times.
Platinum - Dedicate personnel onsite or offsite - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Two Days of training per year are provided to all customers.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All customer and user data can be copied by the customer/user at any time. The customer or user can request a copy of all their data at end of contract free of charge. The customer has 12 months post end of contract to copy their data after which time all data be automatically deleted.
- End-of-contract process
- There are no additional hidden or exit fees. The customer has 12 months to copy their data free of charge but can request the data is delete at any time.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no service changed between Mobile and Desktop. The only difference will be look and feel due to layout changes to support the smaller mobile displays.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The API allows users to access their data with secure tokens.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- We can build custom API's, data analytics and dashboard's for customers. We can also write custom software where required.
Scaling
- Independence of resources
- Our service operate on scalable infrastructure and as such will simple increase in performance as required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide service metrics on request as per AWS logs and reports.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Bespoke on Requirements.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via API, online CSV or on hard drives / DVDs if requested.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Database files
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Please see our website for increased or bespoke SLA's agreements.
Future Decisions Ltd uses AWS Enterprise grade infrastructure with an availability uptime of 99.999%
Future Decisions Lid provided similar uptime for services run on this infrastructure aiming for > 99% uptime.
By default the Future Decisions Ltd Support center strive to restore services within the following target restoration times*, based on UK working hours 09:00 to 17:00:
Business Critical: 4 to 8 hours (Weekdays)
Major: Next business day (Weekdays)
Medium: 3 business day (Weekdays)
Minor: best effort (Weekdays)
If our service team fails to restore the service within 2x of the target resolution time, you may request a credit within thirty (30) days.
For annual contracts, the credits will be applied automatically discounting the next year. The customer may also request a credit refund.
Not Meeting the Target Resolution Time for Business-Critical Service Outage:
Credit makes customers eligible for one-month of free service during the next SLA/Service renewal cycle. Service is defined by the affected elements.
Not Meeting the Target Resolution Time for Major Service Outage:
Credit makes customers eligible for 15 days of free service during the next SLA/Service renewal cycle. Service is defined by the affected elements. - Approach to resilience
- Available on request.
- Outage reporting
- Email Alerts, API and Dashboards.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- To restrict access in management interfaces and support channels, implement role-based access control (RBAC) to ensure users have only the permissions necessary for their role. Enforce multi-factor authentication (MFA) for an added layer of security. Utilize secure, encrypted connections (e.g., VPNs) for remote access. Regularly review and update access privileges to reflect changes in roles or employment status. Additionally, log and monitor all access attempts and activities within these interfaces and channels to detect and respond to unauthorized access attempts promptly.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
Future Decisions Ltd Information Security Policy (brief)
Purpose: To safeguard the confidentiality, integrity, and availability of Future Decisions's information assets, ensuring compliance with legal and regulatory obligations.
Scope: Applies to all employees, contractors, and third-party users of information assets.
Classification: Information is classified as Confidential, Internal Use, or Public. Access is granted based on necessity.
Access Control: Access to information is strictly controlled. Employees are granted the minimum access necessary for their role. Authentication mechanisms, including strong passwords and, where applicable, multi-factor authentication, are mandatory.
Data Protection: Critical data is encrypted in transit and at rest. Regular backups are performed and stored securely.
Incident Response: An incident response plan is in place to address security breaches promptly. Employees must report suspected incidents immediately.
Training: Annual security awareness training is mandatory for all staff.
Compliance & Enforcement: Employees must adhere to this policy and relevant legal/regulatory standards. Violations will result in disciplinary action.
Review: This policy is reviewed annually and updated as necessary.
Acknowledgement: All employees are required to acknowledge and comply with this policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration & Change Management Process
Request: Change initiation with a detailed description and justification.
Assessment: Evaluate impact, resources, and risk by the Change Advisory Board (CAB).
Approval: Decision made by CAB or designated authority.
Implementation: Scheduled and executed with minimal disruption, adhering to pre-approved methods.
Testing: Verify the change meets requirements without affecting existing services.
Documentation: Update all related configurations and documentation.
Review: Post-implementation review to ensure objectives are met and lessons are learned for future changes.
All changes must be logged and tracked through a centralized system. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Software Vulnerability Management Process
Identification: Continuously monitor and identify vulnerabilities using automated scanning tools and threat intelligence sources.
Evaluation: Assess the risk and impact of identified vulnerabilities on the organization’s environment.
Prioritization: Rank vulnerabilities based on severity, exploitability, and impact on critical systems.
Remediation: Apply patches, updates, or configuration changes to mitigate vulnerabilities. For unpatchable issues, implement compensatory controls.
Verification: Test systems to ensure vulnerabilities are fully remediated and document the outcome.
Reporting: Maintain and review logs of vulnerabilities, actions taken, and remediation outcomes for compliance and improvement.
This process is repeated regularly to ensure ongoing security. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective Monitoring
Establish Baseline: Define normal operations and behavior through continuous system network analysis.
Detection: Implement real-time monitoring tools to identify deviations and potential security incidents.
Alert: Configure alerts for suspicious activities, ensuring immediate notification to relevant personnel.
Assessment: Quickly assess alerts to determine the severity and impact of the incident.
Response: Initiate predefined incident response procedures to contain and mitigate threats.
Recovery: Restore affected systems to normal operation, applying necessary patches or configuration changes.
Review: Analyze incident handling to improve future monitoring and response processes.
Maintain detailed logs for all detected incidents and actions taken for accountability and compliance. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident Management Process
Preparation: Develop and maintain an incident response plan, including communication protocols and roles.
Detection and Reporting: Utilize monitoring tools and employee vigilance to detect and report incidents promptly.
Assessment: Quickly evaluate the incident's scope, impact, and severity to prioritize response efforts.
Containment: Isolate affected systems to prevent further damage while ensuring business continuity.
Eradication: Remove the threat from the environment, identifying and mitigating vulnerabilities to prevent recurrence.
Recovery: Restore systems and services to normal operations, closely monitoring for any anomalies.
Post-Incident Review: Analyze incident handling to refine the response plan and improve future readiness.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Our product stands at the forefront of the battle against climate change by harnessing the dual powers of energy efficiency and decarbonization. By optimizing energy use and significantly reducing carbon emissions, it addresses two of the most critical factors contributing to global warming and environmental degradation.
Energy efficiency is achieved through our innovative technology that smartly manages and reduces energy consumption in homes, businesses, and industries. This not only cuts down on energy bills but also diminishes the demand for energy production, which is a major source of global carbon emissions. Our product intelligently adjusts energy use based on real-time needs and predictive analytics, ensuring that no energy is wasted and that the most efficient methods are always employed.
Decarbonization, on the other hand, is facilitated through our product’s ability to integrate seamlessly with renewable energy sources. By promoting the use of clean energy over fossil fuels, our product helps in the transition towards a low-carbon economy. It supports the grid's stability by managing energy loads efficiently, paving the way for a higher penetration of renewable energy sources such as solar and wind power.
Furthermore, our product’s monitoring and reporting capabilities empower users with knowledge about their carbon footprint, making them active participants in the fight against climate change. By providing actionable insights, users can make informed decisions that contribute further to energy conservation and carbon emission reductions.
In essence, our product is more than just a tool for energy efficiency and decarbonization; it's a catalyst for change. By addressing energy waste and supporting clean energy use, it helps mitigate climate change, promoting a healthier planet for future generations. Through innovation and smart technology, we are not just adapting to a new energy paradigm but actively shaping it, driving progress toward a sustainable and carbon-neutral future.Equal opportunity
At Future Decisions, we are deeply committed to fostering an environment where equal opportunity thrives at every level. Our approach encompasses a multifaceted strategy that begins with recruitment and extends throughout the employee lifecycle.
In recruitment, we prioritize outreach efforts to diverse talent pools, actively seeking candidates from underrepresented groups and leveraging inclusive language in job postings. We employ blind screening techniques to mitigate unconscious biases and ensure that selection is based solely on qualifications and merit.
Once onboard, all employees undergo comprehensive diversity and inclusion training to cultivate an awareness of bias and promote inclusive behaviors. Our mentorship and professional development programs are designed to support the advancement of individuals from underrepresented backgrounds, providing tailored guidance and resources to help them achieve their career goals.
We have implemented clear policies and procedures to prevent discrimination and harassment in the workplace. Employees are encouraged to report any instances of misconduct through confidential channels, and all complaints are promptly and thoroughly investigated. We also provide support services and resources to employees who have experienced discrimination or harassment, ensuring their well-being and facilitating resolution.
In addition to internal initiatives, Future Decisions actively engages with external partners and organizations to promote diversity, equity, and inclusion in the broader community. We participate in industry-wide initiatives, sponsor events, and collaborate with diversity-focused organizations to drive systemic change and advocate for social justice.
Our leadership is committed to modeling inclusive behaviors and championing diversity at every opportunity. We regularly communicate our commitment to equality and hold ourselves accountable for progress through transparent reporting and regular updates on our diversity and inclusion efforts.
In summary, Future Decisions is dedicated to creating a workplace where all individuals have an equal opportunity to succeed and thrive.Wellbeing
At Future Decisions, we prioritize the holistic well-being of our employees, recognizing that their physical, mental, and emotional health is fundamental to their success and happiness. We have implemented a comprehensive well-being program that encompasses various initiatives aimed at promoting a healthy work-life balance and fostering a supportive and inclusive culture.
One cornerstone of our well-being program is our flexible work arrangements, which allow employees to tailor their schedules to accommodate personal and family needs. Whether it's flexible hours, remote work options, or compressed workweeks, we empower employees to find a balance that works best for them.
In addition to flexible work arrangements, we offer a range of health and wellness benefits to support our employees' physical well-being. This includes access to comprehensive healthcare coverage, wellness programs, and fitness subsidies. We also provide ergonomic workstations and resources to promote good posture and prevent workplace injuries.
To support employees' mental and emotional well-being, we offer a variety of resources and programs aimed at reducing stress, building resilience, and promoting self-care. This includes access to counseling services, mindfulness training, and mental health resources. We also organize regular wellness events and activities, such as yoga classes, meditation sessions, and stress management workshops.
Furthermore, we prioritize creating a positive and inclusive work environment where employees feel valued, supported, and empowered to thrive. Our leadership team leads by example, fostering open communication, transparency, and respect. We encourage collaboration and teamwork, celebrate diversity, and promote a culture of kindness and empathy.
Through our well-being initiatives, we aim to create a workplace where employees feel happy, healthy, and fulfilled. By investing in their well-being, we not only enhance employee satisfaction and retention but also foster a more productive and engaged workforce. At Future Decisions, we believe that when our employees thrive, so does our business.
Pricing
- Price
- £5,000 to £15,000 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- No