Rail BI
Modular rail asset management platform, including automated workbank building, asset policies, forecasts, budgets, business case estimation, flexible data maintenance. Field inspection application tightly integrates asset condition with workbank planning.
Features
- Workbank Planning
- Cost Estimation
- Benefits Estimation
- Asset Data Management
- Asset Lifecycle Management
- Asset Condition Reporting
- Rail Asset Management
- Condition Assessment Tools
- Long Term Forecasting
- Bespoke Reporting Outputs
Benefits
- Saves Time
- Saves Money
- Allows Easy Live Collaboration
- Reduces Errors
- Streamlines Business Processes
- Provides Multi-Disciplinary Common Platform
- Configurable Software to Align with Existing Processes
- One Stop Shop for Asset Data/Lifecycle/Workbank Planning/Business Cases
Pricing
£10,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 5 4 5 2 1 5 8 2 7 4 3 2 5
Contact
RAIL BI UK LTD
Adam Medley
Telephone: 07535231504
Email: ajm@railbi.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Internet connection
- Access to a modern web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 hr, 8am-6pm Monday to Friday
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Single Tier Package:
Access to support desk
Dedicated account manager
Bug Tracking and Resolution team
Regular implementation of bespoke requirements
Training provided as required
Online documentation - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online and onsite training. Access to online documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Export tools contained within the application.
All data provided via service desk request - End-of-contract process
- Access revoked once client data export requirements are met.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- SaaS Product, all features available as web application.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Not tested for accessibility.
- Accessibility testing
- Not tested for accessibility.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Highly configurable platform.
Bespoke customisations available upon request.
Scaling
- Independence of resources
- Deployment of scalable infrastructure with active monitoring.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Support response and resolution times.
Defect resolution times
Active/Inactive user counts
Service Uptime - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
CSV exports available in application.
API and further exports provided upon request. - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.5% Uptime during core business hours
- Approach to resilience
- Information available upon request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- N/A
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO27001 Certificate Pending
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 Compliant policies and processes
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Rigorous quality assurance processes.
Automated and manual application testing.
Change management policy available upon request. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Active threat intelligence monitoring.
IP based firewall. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Monitoring of logs
Backup and resilience policies
Tested disaster recovery procedure - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management controls follow standards set within ISO27001
All employees trained in information security awareness
Online reporting platform for incidents
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Supporting local schools with STEM projects. Encouraging young people to get involved in Science, Technology, Engineering and Mathematics.
Pricing
- Price
- £10,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No