PIMSS Viability is an asset management analysis tool that enables organisations to evaluate their assets against financial (NPV, yield, and return on investment) and key strategic objectives and metrics. The system allows user to undertake sensitive stress testing and contains option appraisal modelling to support investment decisions.
- Comprehensive reports
- User defined templates to import multiple datasets
- Easy to use spreadsheet import & export facility
- Holds unlimited data snapshot imports for data comparison
- Create multiple scenarios for undertaking 'what if' analysis
- Built-in calculation engine for rapid results
- User defined dashboards
- User defined filtering in reports
- Google map visualisation of properties including RAG ratings
- Report overlays for comparison
- Effective budget planning and financial control
- Undertake sensitivity stress testing
- Model any number of asset groupings and hierarchies
- Options appraisal modelling to support investment, divestment or initiative decisions
- Pro-actively prevent poor asset sustainability
- Enables incorporation and analysis of data from multiple sources
- Identify the drivers of asset performance
- Identify and manage peaks in capital expenditure across asset portfolio
- Understand the ideal timescales to invest or divest in assets
- Categorise assets by risk and expenditure priorities
£4000 per licence per year
1 1 7 1 8 6 7 8 4 8 0 3 2 5 8
PIMSS Data Systems Ltd
0800 121 8767
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|Service constraints||Availability is 24/7, 365 days a year but there is downtime whilst upgrades or scheduled maintenance is carried out.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Majority of questions sent in are answered within 1 hour of receipt. Our dedicated support desk is open between the hours of 8:30am and 5:00pm on normal working days (closed evenings, weekends and bank holidays).|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We provide support and assistance in line with a standard Service Level agreement. When a ticket is raised by a user a Client Impact Score is assigned to the ticket which determines the severity of the ticket, expected response time and target fix time. The table below outlines these response times
Client Impact Score Response Time Fix Time
1. Cannot use the System at all 4 Business Hours 16 working hours
2. Cannot use Parts of the System 8 Business Hours 4 Business Days
3. Something is not working 6 Business Hours Next release
4. Require help 16 Business Hours Next release
All support services are provided as part of the annual subscription fee.
We have a dedicated support desk who are contactable during business hours by telephone and email, and clients receive 2 annual visits from a dedicated account manager.
|Support available to third parties||No|
Onboarding and offboarding
In order to obtain reliable results, PDSL Asset Management consultants will work closely with key stakeholders of the client's Assets Team to set out the framework for the model, identifying relevant financial and sustainability data sets that are most meaningful to include.
The consultancy service will provide a detailed, objective analysis to determine which financial and sustainability data sets should be included within the analysis, and the weightings that should be applied to the sustainability measurements in order to produce meaningful and relevant results. The consultation process will both establish and transfer the skills, knowledge and aptitude allowing the client's staff to undertake future analysis in-house, and input data to the system to generate further results without needing further external involvement.
Further training is provided onsite at the customer's premises, using the client's own data. A user guide is accessed via the customer portal on the pimss.com website.
Customers must provide at least 90 days notice, before the end of the Initial Subscription Term (or any subsequent renewal period). Upon termination of the service, data will be extracted from Viability and provided to the customer, in an agreed format, and access to the system will be revoked.
|Other documentation formats||Microsoft Word|
|End-of-contract data extraction||All data held within PIMSS Viability is extractable via the Export facility, including the export of all raw data imported into the system, and any results calculated in any of the reports are downloadable onto Excel spread sheets.|
|End-of-contract process||Once the client has exported all of the relevant data sheets and reports from the system, the database will be brought offline and user accounts disabled.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||N/A|
|What users can and can't do using the API||TBC|
|API sandbox or test environment||No|
|Description of customisation||
The PIMSS Viability system has been designed to allow users complete autonomy to create system fields and data sets that can be imported into the system. The system will facilitate creation of any number of property attributes (for use when grouping and filtering reports), sustainability measurements and financial incomings and outgoings. In addition to this users are able to define their own scenarios to number of years they would like to run a scenario over, variations year by year of incomings and outgoings, model different inflation rates and apply percentage rate increases and decreases for bad debt and void loss.
Sustainability measurements are calculated via a user defined flexible weighting tool that allow users to apply parameters to data in order to generate sustainability scores for properties that are relevant to their asset data.
|Independence of resources||We use a Combination of Azure SAAS Elastic Pools, and Clustered Mongo Databases. Where as this does not mitigate heavy usage, per client, it expands to deal with the overall usage.|
|Service usage metrics||Yes|
Google Analytics for usage.
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||Microsoft Azure Mongo Data Centre.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
Within the main menu in PIMSS Viability users will navigate to the 'Admin' option and from the drop down menu select 'Exports'. From there users will be presented with a list of all historic data imports, which are made available to export via a download button.
For exporting reports, full whole stock year on year NPV breakdown reports are available showing income, expenditure, surplus, yield, discount factor, Annual PV and Cumulative PV.
|Data export formats||Other|
|Other data export formats||Excel|
|Data import formats||Other|
|Other data import formats||Excel|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Our Servers are hosted on Microsoft Azure, our availability mirrors that provided by Microsoft Azure.
Organizations get a 99.99 percent service-level agreement (SLA) assurance of uptime for VMs with Azure Availability Zones, according to Microsoft's Azure.
|Approach to resilience||Everything has residency from the databases, though the services to the user interface.|
|Outage reporting||Not at the current time.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Currently there is no management interface, and support is provided on an individual basis. Permission is requested from each client.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials Certification|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||Cyber Essentials Software Security Certification scheme.|
|Information security policies and processes||
The PIMSS system complies with the Cyber Essentials Security Scheme which is certified and acreddited by the IASME consortium
We have and clearly defined policies, processes and procedures for compliance with GDPR data protection laws which are implemented by our internal management and reporting structures.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Azure has developed formal standard operating procedures governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53. Microsoft also uses Operational Security Assurance, a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft including the Microsoft Security Development Lifecycle, the Microsoft Security Response Center program, and deep awareness of the cybersecurity threat landscape. (https://www.microsoft.com/en-us/securityengineering/sdl/)|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||Azure is responsible for ensuring the service is highly available, definitions are updated regularly, that configuration through the Azure Management Portal is effective and that the software detects and protects against known types of malicious software.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Microsoft Azure employs service instrumentation and monitoring providing visibility when a service disruption is occurring and pinpointing its cause.
Proactive monitoring continuously measures the performance of key subsystems of the Microsoft Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Microsoft has developed robust processes to facilitate a coordinated response to incidents. Identification: System and security alerts may be harvested, correlated, and analyzed. Containment: Evaluates the scope and impact of an incident. Eradication: Eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred. Recovery: During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity. Lessons Learned: Each security incident is analyzed to protect against future reoccurrence.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£4000 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|