Asset Decision Support Tools

Successfully manage your Transport Assets utilising these Decision Support Tools. Use industry standard or configurable logic to model how your assets will perform in various scenarios. Create Works Programmes, Scenario Comparisons, Interactive Reports, Condition and Risk Profiles through dynamic and intuitive web-based software, improving your Asset Management outcomes


  • Lifecycle Planning – plan maintenance for lifecycle of assets
  • Multiple Asset Types – Structures, Pavements, Lighting, Drainage, Ancillary Assets
  • Condition/Risk Reporting – Understand current and predicted condition and risk
  • Scenario Modelling – run budget constrained or condition targeted scenarios
  • Asset Inventory – store and view data on assets securely
  • Cross-Asset – Analysis allocation of funding across asset groups
  • Data Visualisation – View data on maps and interactive dashboards
  • Works Programming – Develop, analyse and adjust works programmes
  • Business Case – Generate evidence to enhance business cases
  • Configurable – Treatments, materials, deterioration, interventions, costs, benefits, etc.


  • Understand your assets and their current and future performance
  • Support from Industry-Leading Asset Management Experts and Engineers
  • Analyse and compare long term strategies for maintenance
  • Make the case for protecting budgets or increasing funding
  • Priorities works in line with Asset Management Strategy and Practices
  • Communicate effectively with stakeholders through intelligent and interactive dashboards
  • High performance analytical engine that provides rapid and accurate answers
  • Multi-Asset approach facilitates coordinated decision making across organisations
  • Secure Data Storage with role and user-based authentication
  • Supports optimal decision making, allowing engineers to plan efficient schemes


£12,000 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

9 5 3 2 5 6 1 1 2 7 4 4 3 2 3


Telephone: +44 1372 75 2023

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Services are available through a modern web browser.
System requirements
  • A modern, standards compliant web browser
  • Internet access

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Within 1 working day during standard UK business hours.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Standard Support - available during 09:00 – 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, Incidents may be logged via email or the web outside of these hours, but they will not be progressed until the next working day. Software fixes will be progressed during these hours, and a release made available in line with the Customers Service Agreement. 7 days per week – see Standard Hours, the addition being able to log and receive responses to Incidents during the additional hours. Please note that we operate a Restoration of Service (RoS) approach to support on the additional days e.g. Saturday, Sunday and English public holidays – See below for RoS definition. 24/7 - see 7 days per week, the addition being able to log and receive responses on a 24/7 basis. Restoration of Service (RoS) – during extended hours of support the aim is to get the Customer operational as soon as possible. Software fixes will not be provided during the additional hours of support. Incidents remain the responsibility of the Technical Support team throughout the life cycle.
Support available to third parties

Onboarding and offboarding

Getting started
Data restoration and migration are not part of this service by default. Both of these options can be purchased separately. Atkins is able to migrate existing client data into a new deployment. The price of this service is dependent upon the amount and variety of legacy data to be migrated and will be determined during a clarification exercise prior to the commissioning of any work.
Service documentation
Documentation formats
End-of-contract data extraction
A standard database backup of the data will be made available to the client upon termination of the service.
End-of-contract process
Once the contract has ended we will perform a full database backup of the “data” schema of the database by default. The database backup is provided as a SQL Server BAK file. The buyer can then take this database backup file and use it to restore the data to an alternative environment of their choosing. If required we can also provide the data in other standard formats, this will be an additional cost option for the buyer to choose at contract end. The cost will be determined by the export format required and the volume of data to be exported,

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile application for viewing dashboards and reports only.
Service interface
User support accessibility
None or don’t know
Description of service interface
The solution’s user interface is designed with accessibility in mind. With the exception of the mapping/GIS components where keyboard navigation is impractical, the user interface meets many of the Web Content Accessibility Guidelines (WCAG) 2.0 Level A and AA. We are committed to fully meet all WCAG Level A requirements during 2019.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Customisation available
Description of customisation
The software is pre-built to industry standards, however can be configured to the customer’s needs. The logic and assumptions within the tool can be altered by the user to model exactly as desired by the users. Multiple configuration sets can be saved.


Independence of resources
We use a Public Cloud platform that has been designed to support scaling to suit the customer base. Each on-boarded customer’s needs are assessed and additional resources added to the platform at contract start as appropriate. Performance and capacity is monitored and adjusted as required to ensure appropriate levels of performance throughout the contract.


Service usage metrics


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data by using the in-built export function.
Data export formats
  • CSV
  • Other
Other data export formats
  • Microsoft Excel
  • ESRI Shapefile
  • Microsoft Access
  • KML
  • XML
Data import formats
Other data import formats
  • Microsoft Excel
  • Microsoft Access
  • Esri File Geodatabase
  • Esri Shapefile

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
DMZs in place to ensure separation between the web servers and backend application and database servers, plus separation between the Live and Dev environments. Connections between the various servers are locked down to the necessary minimum. Centralised identification and authentication is required (e.g. Active Directory domain). Servers only have necessary server roles activated. Access to the servers for authorised Atkins staff is provided via a secure VPN.

Availability and resilience

Guaranteed availability
Our service provides 99% uptime during the agreed hours of service.
Approach to resilience
We utilise a Public Cloud environment built using the OnApp Cloud Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The system is deployed across a multi-node environment ensuring that node failures do not bring the system down, the cloud management platform continually balances load across nodes and moves running services across nodes when issues are detected.
Outage reporting
Real-time server monitoring provides alerts to our Cloud providers when services have failed, these outages are then reported to our clients through the Technical Support helpdesk.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users with administrative access are assigned an “Administrators” role. Only those users belonging to the “Administrators” role can access management interfaces.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Lloyd’s Register Quality Assurance Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
It excludes information handled within client specific secure environments that operate under more stringent security controls and A.14.2.4 Restrictions on changes to software packages.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Technical controls approved to ISO 27001 (Information Security Management Systems) have been implemented by Atkins Group Information Services (Group IS) across the Atkins group. The non-technical controls have or are being implemented by individual businesses, such as the Aerospace, Defence, Security and Technology (ADS&T) business and the Transportation business, respectively.
Information security policies and processes
Atkins Aerospace, Defence, Security and Technology (ADS&T) holds ISO 27001 and all our UK businesses are independently certified as achieving the ISO 9001:2008 quality management standard. Atkins follows a Business Management System (BMS) approach that brings together all our business processes in one place. The BMS assures our clients through the certification of ISO 9001, OHSAS 18001 and ISO 14001, and forms a key part of the Atkins Governance Framework, which also includes our Group Policy Statements and Code of Conduct. BMS is key part of our governance process, translating the Group controls into a set of core processes that are applicable across the business.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our change management process is invoked whenever a change to the system is required. A change management plan is created, including identification of risks and associated mitigation. Changes are implemented and tested in a development environment first. Before installing in the live environment, a rollback plan is formulated and any required downtime agreed. The changes are installed in live environment and checks performed to ascertain the change was successful. Where problems arise the rollback plan is initiated to restore the system to its previous state.
Vulnerability management type
Vulnerability management approach
Protective monitoring type
Protective monitoring approach
Tkins shall provide 24 / 7 / 365 monitoring of service availability and performance plus threshold monitoring to ensure potential problems are detected and addressed before they become critical.
Incident management type
Supplier-defined controls
Incident management approach
Severity1 - Constitutes Service loss, preventing system usage; Critically impacts activities of Authority that depend system use; Causes corruption of Authority Data. Severity2 - Prevents operation of particular sub-system; Could potentially adversely (majorly) impact Authority activities that depend on system use. No workaround available; Cause disruption to Authority - more than trivial but less severe Severity1 Severity3 - Reproducible, has adverse impact on the activities of Authority. Can be reduced to moderate adverse impact, if workaround available. Severity4 - Intermittent/ non-reproducible. Minor impact on End user service provision. Severity5 - Cosmetic flaw. Doesn’t undermine End User's confidence in displayed information.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Atkins is committed to fighting climate change as evidenced through becoming carbon neutral in 2021 as we drive our carbon emissions down to our net zero target by 2030. We have signed up to science based targets to reduce our own emissions through the global Race to Zero initiative.
Our commitment does not stop here, but supporting our clients to meet their environmental reduction targets to. That is why we are staff upskilling our staff to understand the environmental impact of decisions use these as considerations throughout the delivery lifecycle to provide better solutions for our clients. We will work hand in glove with our clients, helping provide awareness of the climate impact of solutions the decisions that could be made such as circular economy opportunities. We will support your transition Net Zero by assessing the impact of portfolio delivery to the built and natural environment to make carbon visible and maximise the value of your assets carbon reduction through your whole life investment.
Covid-19 recovery

Covid-19 recovery

In 2020, the COVID-19 Pandemic had a global impact affecting many sectors and businesses, including those of some of our clients. In response to the resulting levels of client workload, Atkins is supporting the Government’s Levelling Up agenda in line with the wider Social Value targets established across the business.
As a result of the Covid-19, we offer an integrated model for the migration to cloud services, enabling remote working to reduce the need for site visits. We will ensure that data and solutions are accessible to all regardless of physical ability and location. We will provide training and support to adopt new technologies and new ways of working which are tailored to reflect neurodiversity in the workforce.


£12,000 a user a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.