Fully customisable Asset Management eXpert software for LLFA's, Flood Risk and Natural Environment management teams. Comprehensive inventory collection, recording inspections, planning maintenance and detailed reporting on all flood risk assets. Compliant with Environment Agency and Natural Resources Wales Datasets. Manage Drainage, Buildings. Instruments, Defences, Structures, Civils, Land and more.
- Comprehensive inventory of definable asset types including preloaded EA/NRW datasets
- Record T98 and PSRA Assessments
- Complete inspections and maintenance including defects using AMX Mobile
- Capture incident details by type including responses and frequency
- Works scheduling capability with status, prioritisation and approvals
- Store Consenting Applications with full history
- Monitor works in restriction periods and enforcement requirements
- Comprehensive, customisable reporting including whole-life cost analysis and print templates
- Corporate GIS, LSG and LLPG integration, Document and photo management
- Bulk import and export of data from third parties
- Comply with legal requirements for submitting flood risk asset plans
- More informed decision-making capability for public spend
- Day-to-day efficiency through mobile working
- Straightforward, easy to use and navigate intuitive software
- Greater risk awareness to protect people and property from flooding
- Plan and monitor budgets
- Report and analysis on long term asset condition and spend
- Streamline routine maintenance regimes and resources
- Customised dashboards to monitor performance and support real-time decision making
- Visualisation of assets, activities and incidents for Strategic planning
£1500 per licence per year
AMX Solutions Ltd
0333 456 0768
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
Other modules of AMX are available:
AMX Mobile, AMX Street Lighting, AMX Structures, AMX PROW, AMX Bespoke
|Cloud deployment model||Private cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||A response will be issued usually within 2 hours. A resolution may take longer depending on the nature of the support enquiry.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
AMX Solutions have a dedicated support site by which users can view the AMX knowledge base and raise support tickets that are tracked and answered by dedicated support team members. Users can also phone or email the AMX Solutions support team.
Support tickets are given a priority level of Low, Medium, High and Critical and outlined in full in our SLA.
Support is included within the Annual Subscription cost of the product.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||AMX Solutions can provide training to new customers whereby they can attend classes at the AMX Solutions offices in Bristol or arrange on site training. AMX Solutions has a dedicated support site which features a knowledge base to allow users to get up and running quickly with the product.|
|Other documentation formats||Video Guides|
|End-of-contract data extraction||AMX Solutions will assist users in extracting their data in a format of their choosing from SQL, Excel, CSV, tab, shp including maps and images.|
|End-of-contract process||Customers provide 2 months written notice to the AMX Account Manager who will work closely with the client to support a successful migration of data. Once the customer is satisfied that the required data has been provided to them the SQL server and database will be decommissioned after a 3 month period and all data deleted. There is no additional cost for this. There are no refunds for early termination of contract.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The differences between the AMX web application and the AMX mobile applications (iOS and Android platforms) are:
AMX Web Application
Native Platform Web browser based application
Functionality Full AMX system functionality
Data Access Full access to data within the AMX database
User Interface Web based controls based on standard design guidelines
AMX Mobile Application
Native Platform Native iOS or Android Application
Functionality. Focused system functionality e.g. Inspection data capture
Data Access. Focused access to data. The mobile applications do not communicate with the primary AMX database
User Interface Native platform controls based on standard design guidelines
|Accessibility standards||None or don’t know|
|Description of accessibility||Although our product has been designed in accordance to the 3 principles of WCAG 2.0, AMX Solutions have not yet been audited to show that we meet level AA of WCAG 2.0.|
|Accessibility testing||No testing has been completed with users of assistive technology to date.|
|What users can and can't do using the API||
Depending on what has been enabled an API user can do all CRUD (Create, Update, Delete) operations on any data within AMX. They can also interrogate any data that they have permission to retrieve.
Please see the points in regard to the functionality of the AMX API:
Report Data: Retrieves existing report data from the AMX database.
Report Summary: Retrieves the summary of a pre-existing report.
Report Summary Details: Retrieves the summary details of a pre-existing report.
Lookup Items: Retrieves multiple items from the AMX database.
Lookup Item: Retrieve a singular lookup item from the AMX database.
Entity Data: Retrieves entity data from the AMX database.
Add Entity Data: Creates or Adds records to the AMX database.
Update Entity: Updates existing entity data within the AMX database.
Delete Entity Data: Deletes entity data from the AMX database
Get Photo: Retrieves photographs from the AMX database.
Add Image: Add images to the AMX database using the AMX API.
Details regarding the AMX API are available upon request.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||AMX is a highly customisable asset management product. AMX features a form designer that allows users with the appropriate system rights to perform form customisations putting the user in control. Users are also able to customise the AMX home area and system reports.|
|Independence of resources||
Please see the below points for how the AMX Solutions hosted web service responds to users demands:
Sized in relation to the number of concurrent licences
Long running operations are scheduled during periods of low activity
Azure jobs for long running tasks e.g. report generation, bulk editing
|Service usage metrics||Yes|
|Metrics types||AMX Solutions Ltd use the Microsoft Azure Application Insights for analysing service metrics. AMX Solutions also log client to server and server to database communication that is outside normal expected time parameters and report to user in a dashboard.|
|Reporting types||Reports on request|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||Sensitive data is encrypted. AMX Solutions also encrypt sensitive fields using obfuscation techniques.|
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||All data in the system can be exported to Excel/csv/xml as well as the two post popular GIS (mapping) file formats: shp and tab. Also, a local offline backup (in sqlite) can be created. Users can also create bespoke reports based upon the data fields within the AMX database and export the contents of the report to multiple formats including Microsoft Excel Format or PDF.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||Other|
|Other protection between networks||SSL encrypted lines of communication|
|Data protection within supplier network||Other|
|Other protection within supplier network||Username and Password|
Availability and resilience
|Guaranteed availability||AMX Solutions guarantee a 99% availability of the AMX service if provided by AMX Solutions. This availability guarantee is based upon Microsoft Azures availability agreement.|
|Approach to resilience||
AMX Solutions use Microsoft’s SQL Server technology to facilitate the AMX database backup. The backup types performed include full, differential and transaction log backups to allow a Point-in-time restore (PITR). In the event of corruption or deletion, AMX Solutions can restore the AMX database to a specific point in time as Microsoft SQL Server can identify which of the full, differential or transaction log backups are required to achieve the restore.
AMX Solutions also use a tool that allows select users to pull down a local backup of the AMX database on a regular basis for use in emergency.
|Outage reporting||AMX Solutions use a monitoring tool which emails key people if there is an outage of the AMX system.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||
1) Authenticated with single sign on AAD if hosted on customers own azure
2) Authenticated via a login page which then checks the user is registered in the system and then calls LDAP to authenticate the password.
3) Authenticated via a login page which then checks the Username/Password stored in the system database. Note: Password is one way encrypted.
|Access restrictions in management interfaces and support channels||Role based, only specified users can access the relevant admin and customisation areas. Also, any section of data in the system can be locked down to specific roles.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Formal accreditation has not been completed but AMX is working towards GDRP and ISO 9001 compliance. In general every precaution is taken within the workplace with regard to securing login details, encrypting storage devices and carrying out routine back-ups to retain privacy and prevent security breaches.|
|Information security policies and processes||
AMX Solutions are working toward GDPR and IS09001 accreditation and regularly review current security best practises and where possible adhere to these standards. This applies to all aspects of the AMX Solutions business including physical data handling and not just application security.
AMX Managers are responsible for the implementation of Information Security Policies and any disregard for these policies may be regarded as misconduct to which the AMX Dismissal and Disciplinary procedures apply. All staff are responsible for upholding this policy under the guidance and assistance of the Product Manager or GDPR Advisor.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Change requests are submitted through the online portal ticket system. Following ITIL Service Management processes changes are reviewed and where considered to be of value to the customer, incorporated into the AMX Solution. After testing these are released as part of an update package to ensure all customers have the best solution. All changes are subject to security policy reviews as part of the testing process.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||AMX Solutions perform regular penetration tests using Hewlett Packard’s Enterprise Web Inspect package and review all code changes to make sure they our secure.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Potential compromises are identified through performing regular internal penetration tests and code reviews. If vulnerabilities are identified, AMX Solutions will endeavour to update the software and notify customers as soon as possible after discovering the vulnerability.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Users can report any incidents to the dedicated AMX Solutions support email and phone channels as outlined in the service level agreement. Any incidents identified by AMX Solutions that impact normal service operation will be reported to the customers if necessary via the appropriate contact channel.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||Public Services Network (PSN)|
|Price||£1500 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|