PIMSS Viability
PIMSS Viability is an asset performance analysis tool that enables organisations to evaluate their assets against financial (Net Present Value (NPV), yield, and return on investment) and key strategic objectives and metrics. The system allows users to undertake sensitive stress testing and contains option appraisal modelling to support investment decisions.
Features
- Comprehensive NPV and sustainability reports with ability to overlay reports
- User defined data templates to import multiple datasets
- Easy to use spreadsheet import & export facility
- Holds unlimited data snapshot imports for data comparison
- Create multiple scenarios for undertaking 'what if' analysis
- Built-in calculation engine for rapid results
- User defined property attributes for filtering in reports
- Google map visualisation of properties including RAG ratings
- Web based – accessible by multiple users including read-only access
- Updateable all year round to plan small scale investments
Benefits
- Effective budget planning and financial control
- Model any number of asset groupings and hierarchies
- Options appraisal modelling to support investment, divestment or initiative decisions
- Undertake sensitivity stress testing to pro-actively prevent poor asset sustainability
- Enables incorporation and analysis of data from multiple sources
- Identify the drivers of asset performance
- Identify and manage peaks in capital expenditure across asset portfolio
- Understand the ideal timescales to invest or divest in assets
- Categorise assets by risk and expenditure priorities
- User friendly - No requirement for external consultant involvement
Pricing
£5,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 2 1 3 0 3 9 2 0 2 9 0 0 3 1
Contact
PIMSS Data Systems Ltd
Alex Hardy
Telephone: 0800 121 8767
Email: pimssinfo@pimss.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- PIMSS Asset Management
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response times are in line with our Service Level Agreement
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide support and assistance in line with our Service Level Agreement. When a ticket is raised by a user a Client Impact Score is assigned to the ticket.
Client Impact Score Response Time Target Fix Time
1. Cannot use the System at all Within 1 hour 1 working day
2. Cannot use Parts of the System Within 1 hour 4 working days
3. Something is not working Within 1 hour Next scheduled release
4. Require help Within 1 hour Referral to training material / online user guides / FAQ's
Technical support and product maintenance are provided as part of the annual SaaS fee.
Helpdesk - 5 days per week 8.30am to 5pm for access by PIMSS Trained Users. (Excluding weekends & Bank Holidays) - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Our approach to onboarding uses the best practice PRINCE2 methodology.
We frequently deliver complex implementations to tight deadlines and have been very successful in helping clients “achieve the impossible”.
To ensure we “make it work” for you, we don’t just Onboard and forget. We believe in working in close partnership with you to an Ongoing Plan, helping get the very best out of your investment in our products and services. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- PDSL can provide full data extracts for clients who no longer wish to use the system at the end of the subscription period on request via our support team.
- End-of-contract process
- All data extracts will be provided at an additional cost at the end of the contract, where the client is unable to successfully extract the data themselves.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The display of the application may adapt to the orientation and resolution of mobile devices.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The interface is for importing data to the service.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The service interface is accessible through the application.
- Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
- Access levels. Custom fields. User defined data. Custom search queries and data modification. Configurable dashboard layouts.
Scaling
- Independence of resources
- The service is provisioned as a shared service which can automatically adjust its compute resources based on demand to ensure consistent performance during low and peak periods. The service is regularly monitored for performance with any adjustments made where necessary.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Within the main menu in PIMSS Viability users will navigate to the 'Admin' option and from the drop down menu select 'Exports'. From there users will be presented with a list of all historic data imports, which are made available to export via a download button.
- Data export formats
- Other
- Other data export formats
- Excel
- Data import formats
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our Servers are hosted on Microsoft Azure, our availability mirrors that provided by Microsoft Azure. Organizations get a 95 percent service-level agreement (SLA) assurance of uptime for VMs with Azure Availability Zones, according to Microsoft's Azure.
- Approach to resilience
- High availability: Maintaining acceptable continuous performance despite temporary failures in services, hardware, datacentres, or fluctuations in load. Disaster recovery: Protection against loss of an entire region through asynchronous replication for failover of virtual machines. Backup: Replication of virtual machines and data.
- Outage reporting
- Scheduled maintenance is notified to customers with a minimum of 3 working days notice. The system is continually monitored with automated alerts for service degradation or outage notified to our service desk.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role based security, via security groups
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Available on request
- Information security policies and processes
- The PIMSS Viability system complies with the Cyber Essentials Security Scheme which is certified and accredited by the IASME consortium We have and clearly defined policies, processes and procedures for compliance with GDPR data protection laws which are implemented by our internal management and reporting structures.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes to technical infrastructure are automatically auditted through Microsoft Azure. Changes to applications and services are tracked through our software development process. Service configuration is planned through our project management and delivery process, with changes documented and previous configurations backed up.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Antivirus and malware detection software is installed on the service with automated monitoring and alerting on the service. The software and components of the application are monitored for vulnerabilities and regularly updated. Technical infrastructure is also monitored and receives automated patches and updates.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Microsoft Azure employs service instrumentation and monitoring providing visibility when a service disruption is occurring and pinpointing its cause.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow an established Microsoft process to facilitate a coordinated response to incidents. Identification: Notification through our customer support channel or automatic identification of system incidents are gathered and analyzed. Containment: Evaluate the scope and impact of an incident. Eradication: Eradicate any damage caused by the incident, identify the root cause for why the issue occurred. Recovery: During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity. Lessons Learned: Each security incident is analyzed to protect against future reoccurrence.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Net Zero Cloud Hosting.
We use Microsoft Azure for hosting all PIMSS cloud products.
Microsoft Azure has been 100% Carbon Neutral since 2012 and is aiming to be Carbon Negative by 2030. This means Microsoft remove as much carbon as they emit, either by carbon removal (carbon offsetting) or by reducing carbon emissions.
As part of our Carbon Reduction initiative, we have transitioned all our internal servers, data storage and backup facilities to Microsoft Azure.
Hybrid Remote Working – No Commuting.
We operate a hybrid remote working model across our business, saving the carbon cost of commuting and heating and cooling an office.
Where possible, all client, external and internal meetings and training are held via Teams. We actively encourage clients to use Teams for meetings and have dramatically reduced our level of business travel. We have no company cars.
The UK housing sector has been set a significant Decarbonisation task across the 5 million properties under management. Our products and services help with this initiative:
PIMSS Energy module
RdSAP calculations
Generation of Energy Performance Certificates (EPCs)
Displays current and potential indicators
Energy efficiency ratings
Environmental impact ratings
Energy use
CO2 emissions
Improvement recommendations to reach EPC band C and above
Automatic update of Energy Performance Reports (EPRs) so when improvements are made the new EPR is calculated automatically .
PIMSS Asset Management and Wrap-Around Services
Helps plan and manage the cost of Decarbonisation.
Agility mobile App eliminates the environmental/carbon cost associated with paper-based surveying tools.
Additional Decarbonisation reports.
Pricing
- Price
- £5,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No