Adoddle is a complete information management platform. One is able to upload, share, mark-up, discuss any file type online.Get more done, wherever you are.All your data and discussions on all your devices.
The same customised interface. The same smart workflows.


  • Document Management, File Sharing, Workflows
  • Common Data Environment & Project Information Management
  • Enterprise Content Management, Task Management
  • Project & Corporate Collaboration with BIM
  • Collaborative Building Information Modelling (cBIM)
  • eCommerce (Pre-Quals, Tender, Procurement, Contract Admin)
  • API's (Application Programme Interface)
  • AppBuilder (develop Apps on the platform)
  • AppLibrary (deploy/customise generic Apps on the platform)
  • Facilities Management (FM, PPM, Asset & Works-order management)


  • Access/ Publish content from any device/system
  • Manage content and tasks from anywhere
  • Share content securely and easily, instant message team members
  • Enables teams to work together in a common data environment
  • Manage procurement online from pre-quals, tenders, contract administration
  • eCommerce: Suppliers can upload catalogues and buyers can shop online
  • Abiltiy to work offline and sync when you have connectivity
  • Use the platform from concept to completion and beyond
  • Plan, design, build, manage and maintain your projects and assets
  • Automate processes easily by developing your own workflows


£10 to £60 per user per month

Service documents

G-Cloud 10



Leen Saeb

+44(0)207 749 7880

Service scope

Service scope
Service constraints No, Asite have 24/7/365 support and are system, device and browser agnostic.
System requirements Asite can be used from any device that has connectivity.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Asite is supported 24/7/365: a minimum of 15 minutes to a maximum of 1 day
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 A
Web chat accessibility testing Asite has done some testing with assistive technology users
Onsite support Onsite support
Support levels Asite provides 24/7/365 support via telephone, email, online and onsite. Support is included in the subcription fee and there is no extra charge. Asite provide each client with a technical account manager and a cloud support engineering team.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Asite provides a full onsite and online implementation, configuration and training services to get you up and running on the platform, alongside all the user documentation you will need to run your system.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • E-Learning Modules online
  • User specific help modules
End-of-contract data extraction Asite confirms that in the case of an unfortunate event of contract termination, Customer will continue to manage the current workflows electronically using the Adoddle platform during the transitions period of moving to a replacement system. There would be no limitations on this.
Asite confirms that prior to termination of the contract, regardless of the reasons for termination; they will provide data cuts and partial and full database dumps for transition to the replacement system. The below paragraph describes how the data will be presented, formatted, transmitted and how access is controlled.
Adoddle has offline archiving capability that generates an archive on an external media with a fully navigable browser based interface for accessing all project information including the full historical audit trail data. The Files are stored in their native format, and the database data converted to XML format.
Asite confirms that upon termination of the contract, Asite will provide a final handover of all data held on the systems belonging to the client back to the client using the archiving facility.
End-of-contract process Asite confirms that upon termination of the contract, Asite will provide a final handover of all data held on the systems belonging to the client back to the client using the archiving facility. The Adoddle archiving solution can satisfy legal storage requirements as well as serve as an assurance for clients because data is also available locally. Archives can be generated on project completion as well as during the course of a project.
An archive can be generated for the Client containing all their project data which allows visibility solely of data to which the Client has access via the application security.The archive will be supplied on a secure External Drive that utilises Data Encryption. The entire disk is encrypted. The key exchange is symmetric and is generated by Asite during archive creation and sent to the recipient separately from the archive. Access to the encrypted archive requires the correct password to be provided before the data can be accessed. The password is separately emailed to the Admin user. The only cost is the data archiving service and hardware needed for client offline storage.

Using the service

Using the service
Web browser interface Yes
Using the web interface Asite's platform, Adoddle, is accessible via any web browser, device or operating system. Users are able to log in and design their own dashboards, tag favourite files or folders, create workflows, as well as upload, download or view any file format online and complete tasks/actions sent to them by other users. There are no limitations on use, storage or support.
Web interface accessibility standard WCAG 2.0 A
Web interface accessibility testing Asite has done some testing with assistive technology users.
What users can and can't do using the API Users need to contact their technical account manager to set up the API, once installed one is able scope out changes and send to our technical to enhance the experience. The use of APIs allows you to keep the existing systems that are working for you while improving efficiencies through the adaption of API.

Ease of Reporting
Stop running reports in multiple disparate systems. Adoddle provides a host of generic report templates, or you can easily create
your own with our custom report writer.
View all your work from a single point
Link up multiple systems with one log-in.
Connect Outside Software and Applications
Full Microsoft Office Suite integration.
Connect to your existing systems—Keep the systems that work and adding only what you need.
Data Migration
Reduced error; Eliminate duplicate entry and accidental data omission.
Ability to sync to any outside system that permits APIs.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
  • Other
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
Command line interface No


Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources Asite is 100% committed to maintaining the integrity of all data without error or fail. We have enacted a strict policy regarding security, incident response, and recovery procedures.
Reliability—The Adoddle platform has an uptime of 99.9%.
Integrity—Compliance with SSEA16—verifies Asite’s financial integrity and sound data management practices.
Stability—Information security, including managing risks, threats and vulnerabilities to all information and system architecture
are aligned with standard ISO 27001. Full scale incident management and disaster recovery plans mean that even in emergencies your data is fully protected, and platform downtime will be kept to a minimum
Usage notifications Yes
Usage reporting
  • API
  • Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics Audit history
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach Filesystem data is encrypted using software encryption technologies.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • External
  • Local PC/Server sychronisation
  • External Hardrives
  • Data centres across the world
Backup controls NAVIGATOR
No internet connection? No problem.
Adoddle Navigator is a downloadable desktop application that allows you to use Adoddle anywhere by accessing your files offline.
Deployed as a Java desktop application, drag-and-drop documents from your Workspace to PC while you are connected.
Navigator locks out files “for editing” on the platform while you are working, keeping a single version. Once you re-connect,
Navigator synchronizes your changes.
Mark-up documents and perform the same actions as online, included working on BIM files and 3D modeling.
Keeps the latest versions in your Working Folder.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Asite guarantee an availability uptime of 99.9%

Asite provide a guaranteed Recovery Time Objective (RTO) of 4 hours & a Recovery Point Objective (RPO) of 30 minutes.

In the unlikely event of the guaranteed uptime not being attained, service credits are issued to customers.
Approach to resilience Technical information regarding the resilience of the Asite Platform is available on request.
Outage reporting Monthly performance reports are available on request.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels Access to management interfaces is restricted to specific hosts / users.
User permissions are reviewed regularly to ensure that the user still requires permission to access the resource.

Access to support channels is only provided to staff that require access.
Prior to providing access, requests are reviewed by management.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • HMG IS1
  • IL3 - Official Sensitive
  • Cyber Essentials
  • Our hosting service provider has ISO27001, IS028000, CSA Star certifications

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Asite have a comprehensive Information Security Policy in place.

Information Security Managers are defined within the organization. Any incidents are reported to these Information Security Managers, who are then responsible for reporting these incidents through the defined incident management processes.

Employees are required to have understood and comply to the Information Security policy when they start work & whenever changes are made to the policy. Training is carried out regularly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Asite follows an agile / iterative development model for delivering product functionality. Each iteration contains a group of functionality which is delivered through cross-discipline work, starting from the model/requirements through to testing and deployment.

All changes to the platform are thoroughly tested on our QA platform prior to being rolled out on Production.

Such testing includes functional, load, concurrency, security and regression testing to ensure that the implementation of the change does not cause any malfunctions within the production environment. The final step also includes verification of the proper functioning of the change solution after it is in use.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Asite maintains contact with numerous special interest groups, including The Open Web Application Security Project (OWASP), CVE (Common Vulnerabilities & Exposures) which are worldwide free and open community focused on improving the security of application software. Additionally, we are subscribed to mailing lists for Email alerts regarding vulnerabilities, & also for product updates being released.
As soon as vulnerabilities are identified, actions are carried out to either negate the risk, or apply patches. These changes are then tested in QA prior to being rolled out to production.
Protective monitoring type Supplier-defined controls
Protective monitoring approach As part of the Dimension Data service, they provide a monitoring service called Alert Logic threat Manager. This is a 3rd party solution that actively monitors inbound & outbound traffic for any known & potentially suspicious traffic. This is monitored 24x7 & if an anomaly is detected, alerts are sent. An additional layer of defence is Alert Logic's Threat Manager™, which is a network-wide infrastructure security, measurement and traffic-monitoring platform used to address network availability threats. Asite have an escalation policy in place for responding to threats.
Incident management type Supplier-defined controls
Incident management approach Asite have policies and procedures regarding incident management.
incidents are categorized into predefined priorities, which have predefined response times associated with them.

Users are required to contact Asite Support regarding any incidents. Asite Support is available 24x7, 365 days a year.

Asite will contact customers regarding any incidents as soon as possible after the incident has been detected. Incident reports are provided to the primary contact of each organization.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £10 to £60 per user per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 28 days trial excluding training and implementation
Link to free trial


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑