CDS

Asset Factory

Asset Factory™ is a Property Asset Management & Reporting Application. It combines multiple property, facilities, energy and people data sets to provide instant insight into how a property estate is used and how it can be improved.

Features

  • No upfront investment or infrastructure required
  • Integration services - web services or bulk upload
  • Reporting application with advanced tablet and mobile delivery features
  • Secure hosted environment ISO27001 certified
  • Hosting via tier 1 provider with 99.9% availability per month
  • Access to on-boarding experts to support deployment
  • Standard multi tenanted schema
  • Powerful governance and analysis controls
  • Allows you to take action on the insight provided
  • Visual Insight solution with commentary and action workflow

Benefits

  • Realise value by aligning property and people with business strategy
  • Deliver cost savings or unlock capital/revenue
  • Manage and help optimise your supply chain
  • Identify risk to avoid legal and regulatory non-compliance
  • Simple and cost effective charging mechanism
  • Know how you are performing against your peers
  • Immediately act on the metrics or trends that require action
  • Replaces expensive internal resources and costs
  • Attract and retain staff through workplace improvement programmes
  • Protects investment in operational enterprise applications.

Pricing

£5000 per person per year

Service documents

G-Cloud 10

401418833734536

CDS

James Davis

0113 399 4076

james.davis@cds.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No constraints.
System requirements The solution requires Microstrategy for mobile (app) or web installed

User support

User support
Email or online ticketing support Email or online ticketing
Support response times CDS Support Desk available 9am-5pm weekdays excluding bank holidays.
Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels CDS Support Desk available 9am-5pm weekdays excluding bank holidays.
Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs. Incident escalation process available.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Classroom based training, train the trainer and online Aide Memoir tool is provided.
Service documentation Yes
Documentation formats
  • ODF
  • PDF
  • Other
Other documentation formats
  • Microsoft Word
  • Microsoft Excel
End-of-contract data extraction Ownership of the data vests with the client and CDS will provide all data in a full SQL Database backup. Delivered to the client via trusted hand.
End-of-contract process The service will cease on the agreed date/time and users will be denied access. All data will be returned to the client in accordance with the specific client contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Native app functionality that uses touch, swipe & pinch features are mirrored as closely as possible in the browser version.
Accessibility standards None or don’t know
Description of accessibility The service is accessed via a tablet application or web browser interface.
Accessibility testing None.
API No
Customisation available No

Scaling

Scaling
Independence of resources In order to guarantee that tenants are not affected by the demands from other tenants, we use resource reservations and shares such as internet bandwidth shaping. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types User activity. Login date, Login count, activity, job & sessions run etc.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach The software allows for data to be extracted from the desktop solution. CDS discourage the extraction of data from the solution.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • Other
Other data import formats
  • Microsoft Excel
  • XML
  • Json

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks Legacy SSL or TLS (HTTPS or VPN), assured by independent validation of assertion
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99% availability during service hours (9am - 5pm Monday to Friday).
Approach to resilience Available on request.
Outage reporting Email alerts via Account Management channels.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Customers can raise and update support tickets using our interactive online portal and/or email. Access to our portal is by invitation only, and requires a username and password. Interaction by email can be restricted to specific domains, email addresses, or disabled altogether. We also offer access by telephone for urgent requests, and will always attempt to verify the identity of the caller, either using our standard procedure, or one agreed with the customer.
Access restriction testing frequency Never
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 05/11/2004
What the ISO/IEC 27001 doesn’t cover NA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664). CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements. All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure. CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach CDS operate a mature Change Management process, which is certified to the ISO 20000 standard. We ensure that all configuration or service changes are put through a controlled Change Management process, to ensure that impact and risk are managed, quality is maintained, and that changes are planned, documented and approved. Impact and risk assessment includes security considerations.

Our Change Register is underpinned by a Configuration Management toolset and process, which charts the lifecycle of configuration items, and allows for them to be linked to service transactions, such as incidents and changes.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation.
CDS also undertake vulnerability scanning of client solutions during development and at the point of release. Subsequent scans form part of contractual agreements.
CDS also run Nessus scans of the environment at least weekly.
Identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are assigned a priority and are tracked through our ITIL service desk to completion.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc.
Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as wel as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemted this level of reporting and alerting for the Metropolitan Police
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach CDS operate a mature Incident and Service Request Management process, certified to the ISO 20000 standard. The process is operated by our Service Management tool, which is interactive and can be configured to support the ticket workflow and metrics agreed with customers. Customers can report and update incidents via our interactive portal, email and telephone. Though we operate a core Incident Management policy and process, these can be tailored within customers Service Level Agreements to support common incidents and events. We operate a separate Major Incident Management process, which can provide incident reports, post-mortems etc., when criteria are triggered.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5000 per person per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑