Atkins Limited

Construction Logistics Manager

Construction Logistics Manager has been developed for the construction sector. Bringing programme, cost and environmental impact together, allowing you to optimise your logistics and identify benefits. Using dedicated HGV routing, via TomTom for market leading data and routing options. Giving control to confidently challenge, optimise and improve your construction programme.

Features

  • TomTom's HGV navigation data updated daily with latest routing information.
  • Optimised routes for HGV specific dimensions, weight, cargo and speed.
  • TomTom's historic traffic speeds enable cost and time savings.
  • A clear summary of project schedule, duration and operating hours.
  • Individual waste types, classification, quantity, planned mileage and programme dates.
  • Individual costs for gate fees, landfill tax and journey.
  • Export function to Excel.
  • Amount of carbon (CO2 e) for all vehicle journeys.
  • Air quality, total NOX, PM10 and PM2.5 for vehicle journeys.
  • Destination KPI (per tonne) e.g. recovery, restoration, treatment or disposal.

Benefits

  • Cost of CLM service is lower than TomTom stand alone.
  • Identifies opportunities to challenge and reduce construction programmes.
  • Waste management tool that identifies cost and programme savings.
  • Brings a greater understanding and impact of construction logistics.
  • Planning logistics operating under limitations on vehicles imposed by LA’s.
  • Optimises construction routes– based on trillions of UK data points.
  • Challenging and increasing the productivity of a scheme.
  • Understanding requirements set by disciplines, such as earthworks or construction.
  • Map and plan vehicle activity, understand impact/risk on critical path.
  • Measure embedded carbon from vehicle journeys and metrics on materials.

Pricing

£15,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@atkinsglobal.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 6 8 6 3 8 1 9 3 4 1 4 4 6 7

Contact

Atkins Limited Jonny Hope
Telephone: +44 1372 75 2023
Email: ccs@atkinsglobal.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Monthly planned maintenance / OS patching on an annual, pre-defined schedule.
System requirements
Browser-based web application

User support

Email or online ticketing support
Email or online ticketing
Support response times
Typical initial response is same day, time to close out varies depending on the issue. Support is provided Mon-Fri 08:00 – 17:00 excluding English statutory holidays.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Users with appropriate permissions can fully manage all configurable features within the web application. This includes audit/asset inspection templates and all supporting reference data relevant to the client organisation and the subject matter. All configuration is done via the web application.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Typically, we would provide a super-user demonstration and guidance on the creation of templates along with management of reference data. The web application includes a PDF user guide. Any other training requirements can be priced on request.
Service documentation
No
End-of-contract data extraction
At the end of the contract, the client can choose to renew the contract in which case access to the service will be retained seamlessly without disruption. If the service is intentionally lapsed by the client, their ability to access to the service will automatically end. Our contract with the client will agree what additional actions will be delivered and whether they are included in the contract or at additional cost.
End-of-contract process
At the end of the contract, the client can choose to renew the contract in which case access to the service will be retained seamlessly without disruption. If the service is intentionally lapsed by the client, their ability to access to the service will automatically end. Our contract with the client will agree what additional actions will be delivered and whether they are included in the contract or at additional cost.

Using the service

Web browser interface
Yes
Supported browsers
Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Our Construction Logistics Manager is ready to be implemented and configured for any company specifications. We can take an agile approach to for any requirements, however we do believe that the set-up of CLM does already allow for a wide range of client requirements.

CLM is set up on a project by project basis, allowing customers to develop and input their requirements at an individual project level. All of the input, outputs and benefits are tailored to the individual scenario/project input.

Scaling

Independence of resources
All of our client facing cloud services are delivered by a combination of multi-tenancy & single tenancy resources within our private cloud. We monitor resource usage but typically our cloud resources are over-specified so over the last 15 years this has not been an issue. Our cloud platform has been used reliably since 2002 to deliver business and mission critical digital services to the UK rail industry, spanning 15+ different web applications, hundreds of client organisations and over 8,000 users.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is exported via a report function on the web site, which is formatted in Excel.
Data export formats
Other
Other data export formats
Data is exported via a report in Excel.
Data import formats
Other
Other data import formats
Users would input data onto webpage.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Our cloud platform is Cisco firewall protected, and the firewalls & servers are configured in line with best practice as advised by our datacentre and independent penetration testing guidance.

Availability and resilience

Guaranteed availability
Our standard SLA is available from this link to a PDF (https://www.clyx.net/elibrary/uk/docs/RTUK_DS_SLA_Issue1.pdf) Different or modified SLAs can be discussed as part of contract negotiations.
Approach to resilience
Available on request
Outage reporting
Planned server OS patching is advertised at the start of each calendar year. Planned application maintenance is advertised via different agreed channels to affected client nominated points of contact, typically with a minimum notice period of 5 days. Unplanned outages are reported in accordance with our SLA and specific contract requirements.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
We use our proprietary clyx.net security to authenticate users. Providing control over access to specific services and user privileges within each service. Within the UK rail industry, our user authentication process is established and relied upon by over 100 organisations including Network Rail and train operators. Most of our services are web-based with integral management interfaces used by our support team. Management features are limited by user privilege, tied to each user’s specific account. Staff access to underlying server resources are further constrained (outside the web app) and controlled by VPN and limited to essential technical support team members only.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • Our organisation: Cyber Essentials
  • Our datacentre: ISO27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Our datacentre is ISO27001 compliant. Our organisation has Standard Operating Procedures relating to information security.

Our organisation has Standard Operating Procedures relating to information security.
Information security policies and processes
Atkins Aerospace, Defence, Security and Technology (ADS&T) holds ISO 27001 and all our UK businesses are independently certified as achieving the ISO 9001:2008 quality management standard. Atkins follows a Business Management System (BMS) approach that brings together all of our business processes in one place. The BMS assures our clients through the certification of ISO 9001, OHSAS 18001 and ISO 14001, and forms a key part of the Atkins Governance Framework, which also includes our Group Policy Statements and Code of Conduct. BMS is key part of our governance process, translating the Group controls into a set of core processes that are applicable across the business.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our datacentre conforms to a recognised change management standard and is ISO27001 certified. Our configuration and change management processes are defined through our ISO9001 certified Quality Management System. Our development team uses an industry standard source control and configuration control solution for all of our applications.
Vulnerability management type
Undisclosed
Vulnerability management approach
Our primary technology stack is Microsoft, so vulnerability & patching is driven by Microsoft’s standard bulletins and patch cycles. Our servers are patched monthly to a schedule advertised at the start of each calendar year. All other emergent issues are reviewed on a case by case basis, risk assessed and planned accordingly.
Protective monitoring type
Undisclosed
Protective monitoring approach
Our datacentre performs monthly vulnerability testing on their network infrastructure and has a Security Operations Centre.
Incident management type
Supplier-defined controls
Incident management approach
Incidents can be logged by our internal support team or by external clients through our integrated web-based helpdesk or via telephone. We have a standard approach for responding to helpdesk calls, which may be support, issue or incident related. Each call is assigned to one or multiple helpdesk support staff, assigned a priority and actioned accordingly keeping the client/end-user informed of our progress. Period end or monthly reports are produced on a per-contract basis summarising helpdesk support provided, incidents, SLA non-compliances as well as other relevant information (e.g. upgrades or contract specific items).

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£15,000 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Once month trial for one project.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@atkinsglobal.com. Tell them what format you need. It will help if you say what assistive technology you use.