Viewpoint

Viewpoint Field View

Viewpoint Field View is a cloud-based mobile application that allows workers to capture, share and report data in the field. Viewpoint Field View allows users to quickly resolve issues, mitigate risks and deliver higher quality projects.

Features

  • Mobile Data capture
  • Communication mgmt
  • Real time reporting
  • Snagging
  • Health and SAfety
  • Surveys
  • Quality Management
  • Asset Management
  • commissioning

Benefits

  • manage and mitigate risk
  • reduce projects costs
  • increase visibilty and control of projects
  • improve Team Efficiencies
  • collaborate effectivley
  • see Real data in Real time
  • Create and capture data whilst on the go
  • See and identify bottlenecks in your projects

Pricing

£10 to £28 per user per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

4 0 5 7 8 7 0 6 2 8 7 9 0 9 6

Contact

Viewpoint

Ross McLaren

+44 (0) 191 525 2400

ross.mclaren@viewpoint.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No, The system can be accessed fully through an up to date web browser.
The core solution can be accessed and data entried via the website. Users can also download phone/ tablet apps to be able to capture this data whilst in the field.
We have planned maintenance every 6-8 weeks on this solution (typically on a weekend cadence.)
System requirements
  • Modern Web Browser
  • Up to date IOS/ WIndows/ Android Phone / Tablet

User support

Email or online ticketing support
Email or online ticketing
Support response times
Viewpoint will use commercially reasonable efforts to meet the following response goals:

critical issues within at least 2 hours;
high issues within at least 4 hours; and
average issues within at least 1 business day.

Response time are based on Viewpoint's standard hours of operation.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can visit our online customer portal, Clearview, where they can click to open a web chat with a support representative.
Web chat accessibility testing
We don't do any specific testing. The solution works as above.
Onsite support
Yes, at extra cost
Support levels
We offer on site Professional Services at £1260 and £875 if the work is done remotely.

These services include training (general and admin) and also implementation, further configuration, and health checks.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We typically have an implementation package ( onsite and offsite) to get the project team up and running, we have a defined delivery of this to get the customer up and running as soon as possible. The solution also has a support/ training area for users to learn how to do the common tasks on our solution. We offer the option to have a protocol document created which Viewpoint can also help with creating /modifying.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The users can download the files in bulk to get an archive record of the data uploaded to the solution.
The system also allow unlimited read only access to the solution, whilst the client is in contract with Viewpoint.
End-of-contract process
The customer can download all the forms in bulk at the end of the project.
Project would remain read only after the project has finished.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile solution only allows for users to capture data out on site or in the field. Users can fill in any form they want to create for example
site diary, clean up notice, surveys, permits, asset management, H and S, commissioning etc
Service interface
Yes
Description of service interface
There is a website that allow full reporting of the data captured and reports this back to the user in a number of graphical interfaces. The website allows full functionality of the solution. There is also a mobile app that allows for data capture and some reporting whilst the user is away from the office.
Accessibility standards
None or don’t know
Description of accessibility
The service is available as a minimum if a user has access to a web browser. Further functionality is available if the user can download the app to their phone of tablet.
Accessibility testing
N/a
API
Yes
What users can and can't do using the API
Users need to document the purpose of their requirement for our API service. Once agreed we allow customers to test their API's. We then allow a number of tokens so that data can be requested from our servers. (There may be a limitation on the number of tokens allowed).
All changes need to be approved through the Viewpoint Product Development team.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The structure of our solution can be configured to suit the need of our clients using three separate functions:
Tasks - the ability to create any type of task, that can be tracked through the solution
Forms - the ability to create a digital form within the tool, that can capture fields such as : date, name, drop downs, tick boxes, digital signatures etc.
Process - the ability to create a list of deliverable , that can be tracked for when they were delivered
Reporting - The solution captures a lot of data, the reporting allows this data to be seen in multiple visual charts.

The power administrators are typically the users with the correct permissions to customise the solution.

Scaling

Independence of resources
We employ load balancing systems and throttles that aim to limit the impact of "bad actors" on other users. The system is sized and designed to operate at peak load. We review performance and adjust system parameters accordingly.

Analytics

Service usage metrics
Yes
Metrics types
We can provide if required.
uptime of the solution
number of users on the solution
activity levels on the solution
Status Page
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can either manually choose data to download to their desktops from within the website.
They can ask for reports to bring down various data
Custom reports and data can be requested from VP support
Use APi to extract the data automatically
Data export formats
  • CSV
  • Other
Other data export formats
Pdf
Data import formats
Other
Other data import formats
XLS

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Viewpoint does not offer any specific SLA for our uptime of our solution.
But to give you some confidence in our solution our last 12 months average uptime is 99.82%.
Approach to resilience
Available on request.
Outage reporting
We have a public dashboard that reports any service outages and notifies updates to email subscribers.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
The solution has permissions built into the software which the administrator control their own users.
Viewpoint's Support team have access to the solution so that they can support the solution, (this can be revoked at the customers discretion).
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • Cyber Essentials
  • SOC 2 Type I

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC 2 Type I
Information security policies and processes
We maintain an extensive set of policies and requirements.
We are a member of CiSP and we maintain an extensive secure software development policy requiring penetration testing, static and dynamic code analysis, third party component analysis, intrusion detection, threat modelling, change management, risk analysis, separation of roles and environments (development, test, staging and live), and formal release approvals.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We maintain configuration control over components of our product software to ensure we can identify and control what changes are to be made to which components. The policy addresses the management of changes and how they are controlled. It identifies clear roles and responsibilities, the different types of changes, classifications, time scales and defines the process. The process requires a formal change request, Once the request approved, changes are handled by a Change Approval Board,which reviews readiness, rollback plans, scheduling and benefits and approved or reject. Post change the impact, success is assessed and any issues identified for improvement
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We have a documented secure software development life-cycle process that we use to detect, prevent and identify threats and vulnerabilities . These include continuous proactive tools that provide alerts such as intrusion detection and anti-virus scanning. We also perform regular independent penetration testing to proactively seek security vulnerabilities. We run a range of analysis tools on our codebase for every release including static and dynamic code scans, third party component analysis and vulnerability scans. We proactively seek threat information (we are members of CiSP the UK Governments Cyber-security Information Sharing Partnership which operates under the National Cyber Security Centre).
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a comprehensive suite of tools we use to detect, prevent and identify threats and vulnerabilities. These include continuous proactive tools that provide alerts such as intrusion detection and anti-virus scanning and also monitoring systems that alert our staff to situations which are or might impact our services (such as load, performance, capacities or underlying infrastructure failures). Staff are available 24/7 to respond to incidents. We normally respond to incidents in less than 1 hour and have SLAs in place with our key hosting providers. There is, in addition, a dedicated Security Incident Response Team that covers security incidents.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a documented incident management process and a dedicated Security Incident Response Team (SIRT).
When an incident does occur and there is customer impact our policies require a root cause analysis to be completed and actions to prevent future incidents are identified and tracked. Users can report incidents at any time by contacting our support team. Issues impacting system outages or degraded services are notified via our status page. We keep users informed via email (for specific customer issues) or the product status web page for more general issues.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£10 to £28 per user per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑