AgileAssets Ltd

Pavement Management (Analyst) Solution

Advance Your Pavement Management Strategies and Increase ROI.

The Pavement Management (Analyst) Solution that lets you make better investment decisions for pavement maintenance, preservation, rehabilitation, and replacement by predicting future performance.


  • Preview Investment Outcomes
  • Optimize Work Plans
  • Improve Management Strategies
  • Produce Meaningful Reports
  • Multi-Constraint and Multi-Year Analysis
  • Inventory, Condition Surveys, Construction history
  • Deterioration Models
  • Visual Project Editing Tool
  • User-Defined Decision Trees
  • Flexible, Graphical Reporting


  • Use multiple what-if scenarios to achieve a specified performance targets
  • Align projects across multiple years to create efficient work plans
  • Create optimal work plans using predictive modelling
  • Determine the best time to apply preventive treatments
  • Generate interactive reports, communicate the effects of your investment decisions
  • Visualise your network as-is and in the future
  • Optimize your project portfolios with analysis across multiple years.
  • Project future level of service for specific pavement areas
  • Create work plans using an interactive project planner
  • Optimize the decision-making process by defining decision trees


£4000 to £4000 per user per year

Service documents

G-Cloud 11


AgileAssets Ltd

James Robertson

020 3858 7272

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Highway Maintenance Management Solution
Pavement Management Solution
Cloud deployment model Private cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times "Initial acknowledgement within 5 minutes and initial response to questions is within 30 minutes
User can manage status and priority of support tickets"
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels Severity Levels and Issue Identification. Services issues are categorised by AgileAssets into one of four classifications:

"Severity 1" - Services is inoperable. Customer is unable to use the Services without significant disruption to Customer's primary business operations and with respect to which no workarounds exist that would enable the Services to be so used until corrections can be made.

"Severity 2" - issue that is of a severity that prevents the Services from being used without significant disruption to Customer's primary business operations but with respect to which a workaround exists enabling business operations even if in a diminished capacity.

"Severity 3" - issue which restricts the use of one or more features of the Services to perform necessary functions but with respect to which a workaround is available.

"Severity 4" - are non-critical issue that prevent a function or component of the Services from operating properly but which is not a Severity 1, Severity 2 or Severity 3 issue.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started AgileAssets offers a variety of training options depending on the size and organization of the agency. The goal of training is to enable knowledge transfer throughout the project—and formally, through classroom training, enable Agencies to effectively use the system. AgileAssets sees training as fundamental to the success of this project, and tailors proposed training to meet the requirements of the agency.
The familiarity of the AgileAssets solution will reduce the need for formal in-classroom training of all users. Existing training material and documentation will be updated to address expanded functionality. Agencies can also benefit from the AgileAssets Learning Center, which provides web-based, self-service training videos.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available, in a SQL DMP format, for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full.
The AgileAssets system allows users to copy portions of the current data set by using the export data command. It allows the customization export of data into several formats like .csv, .html, .xls, .xlsx, DBF, KML or Shape file. The data is easily available in a comfortable format to then be manipulated as required. Selection tools are available on this export tool to select just the currently displayed data to export, or any range of the full data set.
End-of-contract process For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full. After that period, AgileAssets will delete all backed-up Customer Data from its systems and Customer’s access to the Services will cease. In addition, each party will return to the other the original and all copies of the Confidential Information in the other’s possession, custody or control or, in lieu of returning such Confidential Information, destroy all copies of such Confidential Information, and certify to such destruction in a writing signed by its officer. Customer’s obligation to pay AgileAssets any past amounts will survive any expiration or termination of this Agreement.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • IOS
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No differences between Desktop and Laptop/Table services.
Mobile software is intended to be used for Asset and Condition Surveys, Structures Inspections, Maintenance Tasks.
Service interface No
What users can and can't do using the API AgileAssets API enables new and smarter business processes by integrating your asset management system with other enterprise systems. Our API is based on the REST architecture—an easier, more efficient mechanism to use than XML-based protocols such as RPC or SOAP. With AgileAssets API, you can:
• Link Multiple Systems - Integrate third-party applications and web services with the AgileAssets software platform to unify workflows and improve operations.
• Incorporate External Data - Extend the reach of data-collection tools and bring external data into decision-making and financial planning.
• Expand System Functionality - Develop next-generation applications for the web, mobile devices, and desktop computers to support continuous innovation.
• Create Custom Applications - Meet your agency’s specific needs by creating custom applications. For example, link your maintenance management system with your snowplow monitoring system to integrate workflows.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation System Administrators can add fields, customize feature windows, and create/modify reports.


Independence of resources AgileAssets have in place its own internal procedures to ensure users are not affected by demand by other users. Using industry standard tools, AgileAssets are able to closely monitor activity across all of its services and load balance where appropriate.


Service usage metrics Yes
Metrics types Percentage availability, outages, scheduled maintenance, number of licenses consumed
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach The Export Data command is available in windows or panes that show tabular data. It allows you to select what table columns and records you wish to export and then save the data to a file outside of the system. The data may be saved as a comma-separated text (.csv) file; an HTML file; a Microsoft Excel (.xls or .xlsx) file; a DBF file; a Google Earth KML file; or a Shape file. (If the Shape type is selected, the application generates a zip archive with .shp, .shx, .dbf and .prj files.)
Data export formats
  • CSV
  • Other
Other data export formats
  • Html
  • Xls
  • DBF
  • KML
  • Shape file
Data import formats
  • CSV
  • Other
Other data import formats
  • Xlsx
  • DBF
  • Shape Files
  • KLM

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability AgileAssets warrants at least 99% System Availability during each calendar month. If the System Availability is less than 99%, and if Customer has fulfilled all of its obligations under the Agreement including this Exhibit, AgileAssets will provide Customer with a Service Credit applied to the month in which the failure to meet this Service Level Agreement has occurred.
% of System Availability per Calendar Month Service Credit
< 99% 2%
< 98% 4%
< 97% 6%
Approach to resilience Available on request
Outage reporting Email Alerts
Public and Private Dashboards

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels AD user groups.
Security model built into AgileAssets software.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 EY CertifyPoint
ISO/IEC 27001 accreditation date 15/12/2017
What the ISO/IEC 27001 doesn’t cover None
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 15/12/2017
CSA STAR certification level Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover None
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach If requested by Customer, AgileAssets will cooperate with Customer in an initial security assessment, including the completion of a risk assessment questionnaire. In addition, AgileAssets will provide Customer with SSAE16 Reviews from the third party data center providers utilized in the provision of the Services as well as with the results of the penetration testing which AgileAssets has periodically performed by qualified third party security consultants.
Information security policies and processes AgileAssets policies and control framework are aligned with the ISO 27001 Information Security Program Management Standards. This includes pragmatic policies, procedures, standards and guidelines to support the information security requirements, with a focus on the most critical assets. This enables us to maximize efficiency and effectiveness by leveraging a common set of controls and policies to comply with many regulations.
AgileAssets information security policy framework includes documented policies, procedures, standards and guidelines to support our relevant information security requirements.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach AgileAssets applies a SCRUM agile development methodology to its configuration and change management processes.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The Security Management Team meet on a monthly basis to review detection methods, and our response to any security issues. AgileAssets clients are notified within 24 hours of any security issues being detected. This shall also include a description of the corrective action needed and details of where this needs to be performed by AgileAssets or the client. Systems are continually monitored 24 hours a day for potential security incidents and we use technology which compares logs from various sources, including on customer end points to provide a full vision of the current status.
Protective monitoring type Supplier-defined controls
Protective monitoring approach AgileAssets recommends that all desktop machines have antivirus protection installed and updated and providing real time monitoring on potential threats. At the network level, the traffic are regulated through firewall. We also have IDS which analysis traffic and whenever a potential attack is identified an automatic ticket is raised under security incident queue and get resolved based on the severity. The responses are provided based on the severity level.
Incident management type Supplier-defined controls
Incident management approach Multiple IDS devices are situated in the perimeter of the network which continuously monitor the inbound and outbound traffic. A 24x7 team monitors these incidents and provide real time solution. Timely escalations make sure all incidents are worked on priority and necessary patching or fixes are done following the change management process.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £4000 to £4000 per user per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑