Skip to main content

Help us improve the Digital Marketplace - send your feedback

IAMTech (Industrial Asset Management Limited)

iPlanSTO

Proven asset management software, that will help you scope, plan, schedule and execute your next Shutdown, Turnaround or Outage more effectively.

Features

  • Complete STO Management
  • Cost-Effective Planning
  • Standardised Effort Estimation
  • Round-the-Clock Premium Support
  • Role-Based Access Control
  • Flexible STO Workflow
  • Productivity Measurement
  • Unlimited User Access
  • Comprehensive Training
  • Secure Remote Access

Benefits

  • Save planning costs
  • Increase tool-time
  • Measure productivity ratios
  • Secure cloud based user portal.
  • Access Control
  • Easy to Use Software and Powerful Dashboards
  • Configured to align with your existing STO process
  • 24/7 Support
  • Training and interactive tutorials
  • Full revision history and audit trail

Pricing

£75,000 to £300,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ross@iamtech.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 4 7 3 0 7 6 1 0 9 2 8 3 3 0

Contact

IAMTech (Industrial Asset Management Limited) Ross Coulman
Telephone: 0800 012 6969
Email: ross@iamtech.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
N/a
System requirements
We Ensure the Long-term Security of our Application

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1hr weekdays
Within 4hrs weekends
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
One level for all clients included in annual support cost
Support available to third parties
Yes

Onboarding and offboarding

Getting started
To get maximum benefit from IAMPermit, we offer training, however there is also on-screen tutorials to guide users through each stage of the permit process.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We would issue in a mutually agreed upon file format
End-of-contract process
Standard licensing cost. Any additional would be for system modification, implementation and training.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile service works offline and offers image markup
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Web portal to log and view tickets
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None
API
No
Customisation available
Yes
Description of customisation
Localise field names
Emails
Templates

Scaling

Independence of resources
We match the customer and server specification depending on a range of factors to ensure optimal performance

Analytics

Service usage metrics
Yes
Metrics types
Discrete user logins
Modifications
Bugs tickets raised
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via dynamic live link or excel
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.999%
Approach to resilience
Fail over to second data centre
Take daily backups so we can restore from a point in time.
Database log file backups
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is tightly controlled through:

Role-Based Access Control (RBAC): Ensures users access only necessary resources.
Multi-Factor Authentication (MFA): Adds a critical security layer for all access points.
Secure Single Sign-On (SSO): Facilitates controlled access via systems like Azure Active Directory.
Regular Access Reviews: Periodic audits adjust or revoke permissions as needed.
Encrypted Connections: Uses HTTPS and SSL/TLS to secure all interfaces.
Audit Trails and Monitoring: Continuously logs and monitors activities to detect and address suspicious actions.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
We are committed to robust information and data security policies, ensuring long-term, secure application use through comprehensive processes and a structured reporting system. Our security approach centres on developing and deploying secure solutions with continuous evaluations to safeguard against evolving threats. We employ rigorous threat modelling to analyse potential security risks, enabling the implementation of strategic mitigation measures. Our application layer security is reinforced by principles of Security by Design and Default, emphasising thorough defence mechanisms and secure deployment practices.

Our governance structure involves a clear hierarchy where security responsibilities are outlined and managed. Security incident management is systematically handled, starting from incident analysis to the execution of corrective actions and documentation. IAMTech employs an Information Security Management System reviewed and updated by senior management.

Access controls such as Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) are enforced to manage and monitor access rights effectively. We also implement stringent operational security measures, including antivirus defences, patch management, and secure cloud storage environments managed through Azure.

IAMTech adheres to GDPR and ensuring secure, compliant cross-border data transfers. Our customer information is securely stored on Azure cloud, with protocols in place to manage third-party access and customer data privacy meticulously.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We regularly apply windows security updates.
We have a change advisory board where we review all changes and approve them.
All changes are logged on the change log.
We have back out plans
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We signed up to vulnerability monitoring services
We respond to any alerts in a timely manner using our change management procedure
For any high priority vulnerabilities we would have an emergency change advisory meeting
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have the monitoring agent enabled on all our servers and across our environment. We monitor the NCSC’s security operations centre.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have threat protection enabled across the environment. We use VPN's to separate client data from our own data. We have protection rules enabled that automatically locks accounts when suspicious activity is detected.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Reduction in paper usage by moving traditional paper based processes to an online format

Pricing

Price
£75,000 to £300,000 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ross@iamtech.com. Tell them what format you need. It will help if you say what assistive technology you use.