Construction Logistics Manager
Construction Logistics Manager has been developed for the construction sector. Bringing programme, cost and environmental impact together, allowing you to optimise your logistics and identify benefits. Using dedicated HGV routing, via TomTom for market leading data and routing options. Giving control to confidently challenge, optimise and improve your construction programme.
Features
- TomTom's HGV navigation data updated daily with latest routing information.
- Optimised routes for HGV specific dimensions, weight, cargo and speed.
- TomTom's historic traffic speeds enable cost and time savings.
- A clear summary of project schedule, duration and operating hours.
- Individual waste types, classification, quantity, planned mileage and programme dates.
- Individual costs for gate fees, landfill tax and journey.
- Export function to Excel.
- Amount of carbon (CO2 e) for all vehicle journeys.
- Air quality, total NOX, PM10 and PM2.5 for vehicle journeys.
- Destination KPI (per tonne) e.g. recovery, restoration, treatment or disposal.
Benefits
- Cost of CLM service is lower than TomTom stand alone.
- Identifies opportunities to challenge and reduce construction programmes.
- Waste management tool that identifies cost and programme savings.
- Brings a greater understanding and impact of construction logistics.
- Planning logistics operating under limitations on vehicles imposed by LA’s.
- Optimises construction routes– based on trillions of UK data points.
- Challenging and increasing the productivity of a scheme.
- Understanding requirements set by disciplines, such as earthworks or construction.
- Map and plan vehicle activity, understand impact/risk on critical path.
- Measure embedded carbon from vehicle journeys and metrics on materials.
Pricing
£15,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 7 9 8 7 0 2 6 1 2 4 9 9 6 3
Contact
ATKINSRÉALIS UK LIMITED
Martin Yeoman
Telephone: +44 1372 75 2023
Email: ccs@atkinsrealis.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Monthly planned maintenance / OS patching on an annual, pre-defined schedule.
- System requirements
- Browser-based web application
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Typical initial response is same day, time to close out varies depending on the issue. Support is provided Mon-Fri 08:00 – 17:00 excluding English statutory holidays.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Users with appropriate permissions can fully manage all configurable features within the web application. This includes audit/asset inspection templates and all supporting reference data relevant to the client organisation and the subject matter. All configuration is done via the web application.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Typically, we would provide a super-user demonstration and guidance on the creation of templates along with management of reference data. The web application includes a PDF user guide. Any other training requirements can be priced on request.
- Service documentation
- No
- End-of-contract data extraction
- At the end of the contract, the client can choose to renew the contract in which case access to the service will be retained seamlessly without disruption. If the service is intentionally lapsed by the client, their ability to access to the service will automatically end. Our contract with the client will agree what additional actions will be delivered and whether they are included in the contract or at additional cost.
- End-of-contract process
- At the end of the contract, the client can choose to renew the contract in which case access to the service will be retained seamlessly without disruption. If the service is intentionally lapsed by the client, their ability to access to the service will automatically end. Our contract with the client will agree what additional actions will be delivered and whether they are included in the contract or at additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Our Construction Logistics Manager is ready to be implemented and configured for any company specifications. We can take an agile approach to for any requirements, however we do believe that the set-up of CLM does already allow for a wide range of client requirements.
CLM is set up on a project by project basis, allowing customers to develop and input their requirements at an individual project level. All of the input, outputs and benefits are tailored to the individual scenario/project input.
Scaling
- Independence of resources
- All of our client facing cloud services are delivered by a combination of multi-tenancy & single tenancy resources within our private cloud. We monitor resource usage but typically our cloud resources are over-specified so over the last 15 years this has not been an issue. Our cloud platform has been used reliably since 2002 to deliver business and mission critical digital services to the UK rail industry, spanning 15+ different web applications, hundreds of client organisations and over 8,000 users.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is exported via a report function on the web site, which is formatted in Excel.
- Data export formats
- Other
- Other data export formats
- Data is exported via a report in Excel.
- Data import formats
- Other
- Other data import formats
- Users would input data onto webpage.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- Our cloud platform is Cisco firewall protected, and the firewalls & servers are configured in line with best practice as advised by our datacentre and independent penetration testing guidance.
Availability and resilience
- Guaranteed availability
- Our standard SLA is available from this link to a PDF (https://www.clyx.net/elibrary/uk/docs/RTUK_DS_SLA_Issue1.pdf) Different or modified SLAs can be discussed as part of contract negotiations.
- Approach to resilience
- Available on request
- Outage reporting
- Planned server OS patching is advertised at the start of each calendar year. Planned application maintenance is advertised via different agreed channels to affected client nominated points of contact, typically with a minimum notice period of 5 days. Unplanned outages are reported in accordance with our SLA and specific contract requirements.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- We use our proprietary clyx.net security to authenticate users. Providing control over access to specific services and user privileges within each service. Within the UK rail industry, our user authentication process is established and relied upon by over 100 organisations including Network Rail and train operators. Most of our services are web-based with integral management interfaces used by our support team. Management features are limited by user privilege, tied to each user’s specific account. Staff access to underlying server resources are further constrained (outside the web app) and controlled by VPN and limited to essential technical support team members only.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register Quality Assurance Limited
- ISO/IEC 27001 accreditation date
- 1 May 2020
- What the ISO/IEC 27001 doesn’t cover
- A.14.2.4 Restrictions on changes to software packages
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Our datacentre is ISO27001 compliant. Our organisation has Standard Operating Procedures relating to information security.
Our organisation has Standard Operating Procedures relating to information security. - Information security policies and processes
- Atkins Aerospace, Defence, Security and Technology (ADS&T) holds ISO 27001 and all our UK businesses are independently certified as achieving the ISO 9001:2008 quality management standard. Atkins follows a Business Management System (BMS) approach that brings together all of our business processes in one place. The BMS assures our clients through the certification of ISO 9001, OHSAS 18001 and ISO 14001, and forms a key part of the Atkins Governance Framework, which also includes our Group Policy Statements and Code of Conduct. BMS is key part of our governance process, translating the Group controls into a set of core processes that are applicable across the business.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our datacentre conforms to a recognised change management standard and is ISO27001 certified. Our configuration and change management processes are defined through our ISO9001 certified Quality Management System. Our development team uses an industry standard source control and configuration control solution for all of our applications.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Our primary technology stack is Microsoft, so vulnerability & patching is driven by Microsoft’s standard bulletins and patch cycles. Our servers are patched monthly to a schedule advertised at the start of each calendar year. All other emergent issues are reviewed on a case by case basis, risk assessed and planned accordingly.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Our datacentre performs monthly vulnerability testing on their network infrastructure and has a Security Operations Centre.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents can be logged by our internal support team or by external clients through our integrated web-based helpdesk or via telephone. We have a standard approach for responding to helpdesk calls, which may be support, issue or incident related. Each call is assigned to one or multiple helpdesk support staff, assigned a priority and actioned accordingly keeping the client/end-user informed of our progress. Period end or monthly reports are produced on a per-contract basis summarising helpdesk support provided, incidents, SLA non-compliances as well as other relevant information (e.g. upgrades or contract specific items).
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Construction Logistics Manager (CLM) is a tool that significantly increases the intelligence and planning of logistics management within the construction sector, where each day hundreds of thousands of miles are driven each day. Two of the features within CLM that are the ability to identify and reduce carbon (heling to reduce the impacts of climate change) and understanding the air quality impacts form heavy goods vehicles (wellbeing). This is done by using an extremely rich data source (Tom Tom navigation) to accurately identify vehicle routes and typical road speeds. CLM then relates these distances and speeds to HGV engine types in order to calculate CO2e (carbon) metrics along with NOx, PM2.5 and PM10 according to Government guidelines.
Pricing
- Price
- £15,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Once month trial for one project.