Asprey Solutions

AspireBI – Asset Rationalisation and Option Appraisal

AspireBI offers self-serve Asset Value rationalisation, option appraisal and sustainability modelling enlightens strategic decision making and cement asset value consensus across an organisation.
Insights into optimising investments, improves efficiency of management efforts from a reliable central source and eliminates repeated, and expensive third-party appraisals.
Embeds organisational strategies into asset investment.

Features

  • Comprehensive option appraisal toolkit in a BI reporting portal
  • Delivers clear demonstration of sound custodianship and intelligent investment decisions
  • Financial value calculation (NPV) from detailed asset level forecasts
  • Strategic/social value methodology and modelling down to asset level
  • Robust financial and strategic evaluation for investment / divestment decisions
  • Model New build, Rent Change, Refurbishment, etc scenarios
  • Presentation of information to determine holistic values and their drivers
  • Helps turn insights into action and help speed up decision-making
  • Supported by Microsoft Power BI providing modern high-performance analytics engine

Benefits

  • Easy to use, commercially proven solution that simplifies the complex
  • Encourages and supports board understanding and engagement
  • Simplifies and improves strategic decision making
  • Cements organisation wide consensus on asset values and drivers
  • Offers consistent methodology and framework for future appraisals
  • Minimises subjectivity and identifies investment worthiness expediting decision-making processes
  • Promotes understanding of asset values supporting HCA recommendations
  • Initiates continuous improvement and measurable results of interventions
  • Eliminate repeated and expensive third-party appraisal services
  • Supports building stronger and sustainable position for your business

Pricing

£35,000 to £70,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rachel.ratty@aspreysolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 5 1 3 8 2 2 0 6 1 6 9 6 3 9

Contact

Asprey Solutions Rachel Ratty
Telephone: 0330 460 9752
Email: rachel.ratty@aspreysolutions.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Available as a fully integrated suite or as discrete functions that can be readily integrated to existing systems in use.
Cloud deployment model
Public cloud
Service constraints
Support is only provided to users who have had formal product training.
Out of hours scheduled maintenance and upgrades
System requirements
  • Internet connection
  • Web Browser
  • Optional Microsoft Office for data export

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided during working hours, unless otherwise agreed and is subject to standard SLAs which would be agreed as part of any contract discussion.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our standard SLA break support tickets into three categories;

System Down - System is 100% unavailable either from a technical or business perspective. Response time within 2 hours, Resolution within 2 working hours or such longer period as the client agrees or specifies.

Live system element is broken - System is functioning but one or more users and unable to perform tasks on the system Response Time within 4 hours, Resolution within 3 working days or such longer period as the client agrees or specifies

Any other matter logged by e-mail to the Response Centre - This is deemed to be a minor problem you can continue working with and is not related to a systems failure. Response time within 6 hours, Resolution within 5 Working days or such longer period as the client agrees or specifies

Support is provided between the hours of 08:30 and 17:30 each day excluding Public Holidays and weekends. Standard support is included in the cost of the solution.

Clients have direct access to their account manager and are provided with contact details including a mobile number. Account managers have the power to reassess support tickets and escalate as appropriate.
Support available to third parties
No

Onboarding and offboarding

Getting started
Asprey follow a proven project management and implementation methodology which a tailored adaptation of PRINCE 2 for the social housing market.

Key onboarding milestones include:

Solution configuration workshops to ensure software meets the clients needs and business processes.

In-depth data analysis cleansing and gap analysis prior to system data loading of all electronic data provided.

Data baseline meeting including data weakness reporting

Interactive training sessions to ensure users are familiar with the products prior to go live.

Internal marketing presentations where the solution is demonstrated to the wider organisation and / or senior management.

Access to full product documentation, knowledgebase, FAQ’s and regular tricks and tips.

Optional on-site managed service consultancy for ongoing product adoption.

Regular account management meetings to ensure the organisation maximises the benefit from the use of the system.

Support services include an annual data health check to ensure the data is being correctly maintained and an annual training needs analysis to identify skill gaps based on raised support tickets.

Annual user group held for user collaboration and to determine future development priorities for the suite
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Microsoft Word for training materials for customer customisation
End-of-contract data extraction
Clients are able to access the entire data structure using standard reporting tools such as SQL Server, SSRS, SSIS, Excel and PowerBI.

Data from each module can be exported separately using import / export function within the suite.

Standard product APIs can be used to extract data from the suite.

Data extraction service can be provided on a time and materials basis or a fixed price quotation.
End-of-contract process
Following notification of service termination, a plan will be agreed including data extract requirements and service end date.

Following the service end date all client data and backups will be deleted.

Support for data extraction using standard product export functionality will be provided. Customised data extraction services can be provided on a time and materials basis or a fixed price quotation.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our solution includes dedicated mobile data capture functions which have been designed with effective and efficient data capture in mind. Our operational modules can be accessed from mobile devices and these have been optimised for mobile devices.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
As a Microsoft Partner for software development our solution are guaranteed for exceptional usability. Functions operate within a web browser that has been developed to ensure navigation consistency and hence user familiarity across all operational areas. The design includes simple icon driven navigation and tool bars, with simple and consistent double click, drag and drop and export functions.
Accessibility standards
None or don’t know
Description of accessibility
N/A
Accessibility testing
None
API
Yes
What users can and can't do using the API
Our API's are for integration with existing third party systems in use by a client. Our API's are general REST based.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Our solution offers a wide range of operational function areas that can be selected by a client to meet their business needs. These can be configured to meet customers needs. Initial configuration services are included in costing (if needed). For on-going configuration changes consultancy services are available from the vendor to configure the system and users can configure and reconfigure the system to meet their changing business requirements.

Scaling

Independence of resources
Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Asprey do not operate a multi tenanted infrastructure and as such clients are provided with a dedicated solution scaled to meet the needs of the organisation. This ensures there is no completion for the resources available.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Clients are able to access the entire data structure using standard reporting tools such as SQL Server, SSRS, SSIS, Excel and PowerBI.

Data from each module can be exported separately using import / export function within the suite.

Standard product APIs can be used to extract data from the suite.

Data extraction service can be provided on a time and materials basis or a fixed price quotation.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Microsoft Excel
Data import formats
  • CSV
  • Other
Other data import formats
Microsoft Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Microsoft guarantee at least 99.5% connectivity.
Approach to resilience
The solution takes advantage of Azure of high availability, disaster recovery and backup on Azure’s network.

Further information available on request.
Outage reporting
Asprey utilise a mature public cloud service in Microsoft Azure to provide a robust, scalable solution to support our suite. Azure provides a public dashboard which shows the status of service. Azure also provides email alerts which are provide to clients if relevant.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
The Asprey suite utilise the Azure Active Directory / ASP.NET security model which is a tried and tested system. Each user is assigned a number ‘roles’ for each of the products that indicates the screens they can see and the functions they can access including whether they have an ability to Add, Edit, Delete and View information. Passwords are stored encrypted and each account will allow for five incorrect password attempts before the account becomes locked and needs to be reset by a system administrator.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Asprey utilise a wide range of specific policies to manage security governance which cover audit, staff and user awareness and training. We have extensive training processes for new staff member induction covering this areas. Our organisational policies are regularly audited and annual reviews are undertaken by senior staff and company directors.
Information security policies and processes
Asprey have a comprehensive information security policy that is regularly reviewed to ensure process are compliant. All staff undertake external training to ensure awareness of information security requirements. Internal workshops are held regularly to ensure compliance with internal procedures.
Documented policies include:

- Information Security
- Data Protection / GDPR
- Acceptable Use
- Backup
- Information Classification and Data Retention
- Change Management
- Access Control
- Business Continuity
- Incident Response

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Azure follow the continuous delivery model to provide iterative improvements to their cloud based infrastructure. This allows for a structured method of planning, development and deploying changes in a way to ensure system resilience.

The Asprey development team follow and Agile approach throughout the development lifecycle which allows for small iterations to be managed and integrated. Short iterations allow Asprey to ensure the quality of developments while also allowing flexible response to emerging technical and industry requirements
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Asprey utilise Azure’s Security Centre which provides continuous monitoring of the security of machines, networks and services using hundreds of built-in security assessments and provides security recommendations to remediate issues before they can be exploited.
It enables adaptive threat protection to reduce exposure to attacks. Blocking malware and other unwanted code by applying application controls adapted to your specific workloads and powered by machine learning. It also enable just-in-time, controlled access to management ports on Azure VMs to drastically reduce surface area exposed to brute force and other network attacks
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Asprey utilise Azure’s Security Centre which provides continuous monitoring of the security of machines, networks and services using hundreds of built-in security assessments and provides security recommendations to remediate issues before they can be exploited.
It enables adaptive threat protection to reduce exposure to attacks. Blocking malware and other unwanted code by applying application controls adapted to your specific workloads and powered by machine learning. It also enable just-in-time, controlled access to management ports on Azure VMs to drastically reduce surface area exposed to brute force and other network attacks
Incident management type
Supplier-defined controls
Incident management approach
Asprey have an incident response plan that we can supply upon request. This covers:

• Incident Preparation
• Discovery
• Notification
• Analysis and Assessment
• Response
• Containment
• Prevention
• Restoration
• Documentation
• Evidence Preservation and Evaluation

Users can report any incidents via the Asprey Support service. Post resolution of an incident the information is summarised to assess its impact, actions taken further actions required to mitigate the risk of future occurrence / impact

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

With Energy Efficiency and Zero Net Carbon Objectives in mind, our offering would include SAVA’s Intelligent Energy solution that offers unsurpassed business intelligence features focused on energy for exceptional insight and improvement planning to support reaching these objectives.
Delivering simple to use tools our solutions helps users assess energy efficiency across their housing stock and plan for energy improvements and options to reach zero net carbon objectives.

Pricing

Price
£35,000 to £70,000 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Evaluation set ups are available upon request. Scope of function and time duration would be agreed in each request instance.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rachel.ratty@aspreysolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.