PIMSS Data Systems Ltd

PIMSS Viability

PIMSS Viability is an asset management analysis tool that enables organisations to evaluate their assets against financial (NPV, yield, and return on investment) and key strategic objectives and metrics. The system allows user to undertake sensitive stress testing and contains option appraisal modelling to support investment decisions.


  • Comprehensive reports
  • User defined templates to import multiple datasets
  • Easy to use spreadsheet import & export facility
  • Holds unlimited data snapshot imports for data comparison
  • Create multiple scenarios for undertaking 'what if' analysis
  • Built-in calculation engine for rapid results
  • User defined dashboards
  • User defined filtering in reports
  • Google map visualisation of properties including RAG ratings
  • Report overlays for comparison


  • Effective budget planning and financial control
  • Undertake sensitivity stress testing
  • Model any number of asset groupings and hierarchies
  • Options appraisal modelling to support investment, divestment or initiative decisions
  • Pro-actively prevent poor asset sustainability
  • Enables incorporation and analysis of data from multiple sources
  • Identify the drivers of asset performance
  • Identify and manage peaks in capital expenditure across asset portfolio
  • Understand the ideal timescales to invest or divest in assets
  • Categorise assets by risk and expenditure priorities


£4000 per licence per year

Service documents


G-Cloud 11

Service ID

1 1 7 1 8 6 7 8 4 8 0 3 2 5 8


PIMSS Data Systems Ltd

Alex Hardy

0800 121 8767


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Availability is 24/7, 365 days a year but there is downtime whilst upgrades or scheduled maintenance is carried out.
System requirements N/A

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Majority of questions sent in are answered within 1 hour of receipt. Our dedicated support desk is open between the hours of 8:30am and 5:00pm on normal working days (closed evenings, weekends and bank holidays).
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide support and assistance in line with a standard Service Level agreement. When a ticket is raised by a user a Client Impact Score is assigned to the ticket which determines the severity of the ticket, expected response time and target fix time. The table below outlines these response times

Client Impact Score Response Time Fix Time
1. Cannot use the System at all 4 Business Hours 16 working hours
2. Cannot use Parts of the System 8 Business Hours 4 Business Days
3. Something is not working 6 Business Hours Next release
4. Require help 16 Business Hours Next release

All support services are provided as part of the annual subscription fee.

We have a dedicated support desk who are contactable during business hours by telephone and email, and clients receive 2 annual visits from a dedicated account manager.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started In order to obtain reliable results, PDSL Asset Management consultants will work closely with key stakeholders of the client's Assets Team to set out the framework for the model, identifying relevant financial and sustainability data sets that are most meaningful to include.
The consultancy service will provide a detailed, objective analysis to determine which financial and sustainability data sets should be included within the analysis, and the weightings that should be applied to the sustainability measurements in order to produce meaningful and relevant results. The consultation process will both establish and transfer the skills, knowledge and aptitude allowing the client's staff to undertake future analysis in-house, and input data to the system to generate further results without needing further external involvement.
Further training is provided onsite at the customer's premises, using the client's own data. A user guide is accessed via the customer portal on the pimss.com website.
Customers must provide at least 90 days notice, before the end of the Initial Subscription Term (or any subsequent renewal period). Upon termination of the service, data will be extracted from Viability and provided to the customer, in an agreed format, and access to the system will be revoked.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats Microsoft Word
End-of-contract data extraction All data held within PIMSS Viability is extractable via the Export facility, including the export of all raw data imported into the system, and any results calculated in any of the reports are downloadable onto Excel spread sheets.
End-of-contract process Once the client has exported all of the relevant data sheets and reports from the system, the database will be brought offline and user accounts disabled.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/A
Service interface No
What users can and can't do using the API TBC
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation The PIMSS Viability system has been designed to allow users complete autonomy to create system fields and data sets that can be imported into the system. The system will facilitate creation of any number of property attributes (for use when grouping and filtering reports), sustainability measurements and financial incomings and outgoings. In addition to this users are able to define their own scenarios to number of years they would like to run a scenario over, variations year by year of incomings and outgoings, model different inflation rates and apply percentage rate increases and decreases for bad debt and void loss.
Sustainability measurements are calculated via a user defined flexible weighting tool that allow users to apply parameters to data in order to generate sustainability scores for properties that are relevant to their asset data.


Independence of resources We use a Combination of Azure SAAS Elastic Pools, and Clustered Mongo Databases. Where as this does not mitigate heavy usage, per client, it expands to deal with the overall usage.


Service usage metrics Yes
Metrics types Google Analytics for usage.

Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Microsoft Azure Mongo Data Centre.
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Within the main menu in PIMSS Viability users will navigate to the 'Admin' option and from the drop down menu select 'Exports'. From there users will be presented with a list of all historic data imports, which are made available to export via a download button.
For exporting reports, full whole stock year on year NPV breakdown reports are available showing income, expenditure, surplus, yield, discount factor, Annual PV and Cumulative PV.
Data export formats Other
Other data export formats Excel
Data import formats Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our Servers are hosted on Microsoft Azure, our availability mirrors that provided by Microsoft Azure.

Organizations get a 99.99 percent service-level agreement (SLA) assurance of uptime for VMs with Azure Availability Zones, according to Microsoft's Azure.
Approach to resilience Everything has residency from the databases, though the services to the user interface.
Outage reporting Not at the current time.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Currently there is no management interface, and support is provided on an individual basis. Permission is requested from each client.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Certification

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials Software Security Certification scheme.
Information security policies and processes The PIMSS system complies with the Cyber Essentials Security Scheme which is certified and acreddited by the IASME consortium
We have and clearly defined policies, processes and procedures for compliance with GDPR data protection laws which are implemented by our internal management and reporting structures.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Azure has developed formal standard operating procedures governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53. Microsoft also uses Operational Security Assurance, a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft including the Microsoft Security Development Lifecycle, the Microsoft Security Response Center program, and deep awareness of the cybersecurity threat landscape. (https://www.microsoft.com/en-us/securityengineering/sdl/)
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Azure is responsible for ensuring the service is highly available, definitions are updated regularly, that configuration through the Azure Management Portal is effective and that the software detects and protects against known types of malicious software.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Microsoft Azure employs service instrumentation and monitoring providing visibility when a service disruption is occurring and pinpointing its cause.

Proactive monitoring continuously measures the performance of key subsystems of the Microsoft Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Microsoft has developed robust processes to facilitate a coordinated response to incidents. Identification: System and security alerts may be harvested, correlated, and analyzed. Containment: Evaluates the scope and impact of an incident. Eradication: Eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred. Recovery: During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity. Lessons Learned: Each security incident is analyzed to protect against future reoccurrence.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £4000 per licence per year
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑