Pavement Management (Analyst) Solution
Advance Your Pavement Management Strategies and Increase ROI.
The Pavement Management (Analyst) Solution that lets you make better investment decisions for pavement maintenance, preservation, rehabilitation, and replacement by predicting future performance.
- Preview Investment Outcomes
- Optimize Work Plans
- Improve Management Strategies
- Produce Meaningful Reports
- Multi-Constraint and Multi-Year Analysis
- Inventory, Condition Surveys, Construction history
- Deterioration Models
- Visual Project Editing Tool
- User-Defined Decision Trees
- Flexible, Graphical Reporting
- Use multiple what-if scenarios to achieve a specified performance targets
- Align projects across multiple years to create efficient work plans
- Create optimal work plans using predictive modelling
- Determine the best time to apply preventive treatments
- Generate interactive reports, communicate the effects of your investment decisions
- Visualise your network as-is and in the future
- Optimize your project portfolios with analysis across multiple years.
- Project future level of service for specific pavement areas
- Create work plans using an interactive project planner
- Optimize the decision-making process by defining decision trees
£4000 to £4000 per user per year
020 3858 7272
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
Highway Maintenance Management Solution
Pavement Management Solution
|Cloud deployment model||Private cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
"Initial acknowledgement within 5 minutes and initial response to questions is within 30 minutes
User can manage status and priority of support tickets"
|User can manage status and priority of support tickets||No|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Severity Levels and Issue Identification. Services issues are categorised by AgileAssets into one of four classifications:
"Severity 1" - Services is inoperable. Customer is unable to use the Services without significant disruption to Customer's primary business operations and with respect to which no workarounds exist that would enable the Services to be so used until corrections can be made.
"Severity 2" - issue that is of a severity that prevents the Services from being used without significant disruption to Customer's primary business operations but with respect to which a workaround exists enabling business operations even if in a diminished capacity.
"Severity 3" - issue which restricts the use of one or more features of the Services to perform necessary functions but with respect to which a workaround is available.
"Severity 4" - are non-critical issue that prevent a function or component of the Services from operating properly but which is not a Severity 1, Severity 2 or Severity 3 issue.
|Support available to third parties||No|
Onboarding and offboarding
AgileAssets offers a variety of training options depending on the size and organization of the agency. The goal of training is to enable knowledge transfer throughout the project—and formally, through classroom training, enable Agencies to effectively use the system. AgileAssets sees training as fundamental to the success of this project, and tailors proposed training to meet the requirements of the agency.
The familiarity of the AgileAssets solution will reduce the need for formal in-classroom training of all users. Existing training material and documentation will be updated to address expanded functionality. Agencies can also benefit from the AgileAssets Learning Center, which provides web-based, self-service training videos.
|End-of-contract data extraction||
For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available, in a SQL DMP format, for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full.
The AgileAssets system allows users to copy portions of the current data set by using the export data command. It allows the customization export of data into several formats like .csv, .html, .xls, .xlsx, DBF, KML or Shape file. The data is easily available in a comfortable format to then be manipulated as required. Selection tools are available on this export tool to select just the currently displayed data to export, or any range of the full data set.
|End-of-contract process||For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full. After that period, AgileAssets will delete all backed-up Customer Data from its systems and Customer’s access to the Services will cease. In addition, each party will return to the other the original and all copies of the Confidential Information in the other’s possession, custody or control or, in lieu of returning such Confidential Information, destroy all copies of such Confidential Information, and certify to such destruction in a writing signed by its officer. Customer’s obligation to pay AgileAssets any past amounts will survive any expiration or termination of this Agreement.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
No differences between Desktop and Laptop/Table services.
Mobile software is intended to be used for Asset and Condition Surveys, Structures Inspections, Maintenance Tasks.
|What users can and can't do using the API||
AgileAssets API enables new and smarter business processes by integrating your asset management system with other enterprise systems. Our API is based on the REST architecture—an easier, more efficient mechanism to use than XML-based protocols such as RPC or SOAP. With AgileAssets API, you can:
• Link Multiple Systems - Integrate third-party applications and web services with the AgileAssets software platform to unify workflows and improve operations.
• Incorporate External Data - Extend the reach of data-collection tools and bring external data into decision-making and financial planning.
• Expand System Functionality - Develop next-generation applications for the web, mobile devices, and desktop computers to support continuous innovation.
• Create Custom Applications - Meet your agency’s specific needs by creating custom applications. For example, link your maintenance management system with your snowplow monitoring system to integrate workflows.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||System Administrators can add fields, customize feature windows, and create/modify reports.|
|Independence of resources||AgileAssets have in place its own internal procedures to ensure users are not affected by demand by other users. Using industry standard tools, AgileAssets are able to closely monitor activity across all of its services and load balance where appropriate.|
|Service usage metrics||Yes|
|Metrics types||Percentage availability, outages, scheduled maintenance, number of licenses consumed|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||The Export Data command is available in windows or panes that show tabular data. It allows you to select what table columns and records you wish to export and then save the data to a file outside of the system. The data may be saved as a comma-separated text (.csv) file; an HTML file; a Microsoft Excel (.xls or .xlsx) file; a DBF file; a Google Earth KML file; or a Shape file. (If the Shape type is selected, the application generates a zip archive with .shp, .shx, .dbf and .prj files.)|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||Legacy SSL and TLS (under version 1.2)|
Availability and resilience
AgileAssets warrants at least 99% System Availability during each calendar month. If the System Availability is less than 99%, and if Customer has fulfilled all of its obligations under the Agreement including this Exhibit, AgileAssets will provide Customer with a Service Credit applied to the month in which the failure to meet this Service Level Agreement has occurred.
% of System Availability per Calendar Month Service Credit
< 99% 2%
< 98% 4%
< 97% 6%
|Approach to resilience||Available on request|
Public and Private Dashboards
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
AD user groups.
Security model built into AgileAssets software.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users receive audit information on a regular basis|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users receive audit information on a regular basis|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||EY CertifyPoint|
|ISO/IEC 27001 accreditation date||15/12/2017|
|What the ISO/IEC 27001 doesn’t cover||None|
|ISO 28000:2007 certification||No|
|CSA STAR certification||Yes|
|CSA STAR accreditation date||15/12/2017|
|CSA STAR certification level||Level 3: CSA STAR Certification|
|What the CSA STAR doesn’t cover||None|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||If requested by Customer, AgileAssets will cooperate with Customer in an initial security assessment, including the completion of a risk assessment questionnaire. In addition, AgileAssets will provide Customer with SSAE16 Reviews from the third party data center providers utilized in the provision of the Services as well as with the results of the penetration testing which AgileAssets has periodically performed by qualified third party security consultants.|
|Information security policies and processes||
AgileAssets policies and control framework are aligned with the ISO 27001 Information Security Program Management Standards. This includes pragmatic policies, procedures, standards and guidelines to support the information security requirements, with a focus on the most critical assets. This enables us to maximize efficiency and effectiveness by leveraging a common set of controls and policies to comply with many regulations.
AgileAssets information security policy framework includes documented policies, procedures, standards and guidelines to support our relevant information security requirements.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||AgileAssets applies a SCRUM agile development methodology to its configuration and change management processes.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||The Security Management Team meet on a monthly basis to review detection methods, and our response to any security issues. AgileAssets clients are notified within 24 hours of any security issues being detected. This shall also include a description of the corrective action needed and details of where this needs to be performed by AgileAssets or the client. Systems are continually monitored 24 hours a day for potential security incidents and we use technology which compares logs from various sources, including on customer end points to provide a full vision of the current status.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||AgileAssets recommends that all desktop machines have antivirus protection installed and updated and providing real time monitoring on potential threats. At the network level, the traffic are regulated through firewall. We also have IDS which analysis traffic and whenever a potential attack is identified an automatic ticket is raised under security incident queue and get resolved based on the severity. The responses are provided based on the severity level.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Multiple IDS devices are situated in the perimeter of the network which continuously monitor the inbound and outbound traffic. A 24x7 team monitors these incidents and provide real time solution. Timely escalations make sure all incidents are worked on priority and necessary patching or fixes are done following the change management process.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£4000 to £4000 per user per year|
|Discount for educational organisations||No|
|Free trial available||No|