Skip to main content

Help us improve the Digital Marketplace - send your feedback

RAIL BI UK LTD

Rail BI

Modular rail asset management platform, including automated workbank building, asset policies, forecasts, budgets, business case estimation, flexible data maintenance. Field inspection application tightly integrates asset condition with workbank planning.

Features

  • Workbank Planning
  • Cost Estimation
  • Benefits Estimation
  • Asset Data Management
  • Asset Lifecycle Management
  • Asset Condition Reporting
  • Rail Asset Management
  • Condition Assessment Tools
  • Long Term Forecasting
  • Bespoke Reporting Outputs

Benefits

  • Saves Time
  • Saves Money
  • Allows Easy Live Collaboration
  • Reduces Errors
  • Streamlines Business Processes
  • Provides Multi-Disciplinary Common Platform
  • Configurable Software to Align with Existing Processes
  • One Stop Shop for Asset Data/Lifecycle/Workbank Planning/Business Cases

Pricing

£10,000 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ajm@railbi.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 5 4 5 2 1 5 8 2 7 4 3 2 5

Contact

RAIL BI UK LTD Adam Medley
Telephone: 07535231504
Email: ajm@railbi.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
  • Internet connection
  • Access to a modern web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 hr, 8am-6pm Monday to Friday
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Single Tier Package:
Access to support desk
Dedicated account manager
Bug Tracking and Resolution team
Regular implementation of bespoke requirements
Training provided as required
Online documentation
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online and onsite training. Access to online documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Export tools contained within the application.
All data provided via service desk request
End-of-contract process
Access revoked once client data export requirements are met.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
SaaS Product, all features available as web application.
Accessibility standards
None or don’t know
Description of accessibility
Not tested for accessibility.
Accessibility testing
Not tested for accessibility.
API
No
Customisation available
Yes
Description of customisation
Highly configurable platform.
Bespoke customisations available upon request.

Scaling

Independence of resources
Deployment of scalable infrastructure with active monitoring.

Analytics

Service usage metrics
Yes
Metrics types
Support response and resolution times.
Defect resolution times
Active/Inactive user counts
Service Uptime
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
CSV exports available in application.
API and further exports provided upon request.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.5% Uptime during core business hours
Approach to resilience
Information available upon request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
N/A
Access restriction testing frequency
At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO27001 Certificate Pending

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO27001 Compliant policies and processes

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Rigorous quality assurance processes.
Automated and manual application testing.
Change management policy available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Active threat intelligence monitoring.
IP based firewall.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring of logs
Backup and resilience policies
Tested disaster recovery procedure
Incident management type
Supplier-defined controls
Incident management approach
Incident management controls follow standards set within ISO27001
All employees trained in information security awareness
Online reporting platform for incidents

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Supporting local schools with STEM projects. Encouraging young people to get involved in Science, Technology, Engineering and Mathematics.

Pricing

Price
£10,000 an instance
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ajm@railbi.com. Tell them what format you need. It will help if you say what assistive technology you use.