Asite

Adoddle

Asite’s Adoddle platform allows you to store and manage all your data in one central and secure repository. It also enables customers to fully customize the structure of their content with highly controlled access and rich configurable workflows to allow project controls.

Features

  • Document Management, File Sharing & Instant Messaging
  • Common Data Environment & Project Information Management
  • Enterprise Content Management
  • Project & Corporate Collaboration with BIM
  • Collaborative Building Information Modelling (cBIM)
  • eProcurement (Pre-Quals, Tender, Procurement, Contract Admin)
  • API's (Application Programme Interface)
  • AppBuilder (develop Apps on the platform)
  • AppLibrary (deploy/customise generic Apps on the platform)
  • Facilities Management (FM, PPM, Asset & Works-order management)

Benefits

  • Access/ Publish content from any device/system
  • Manage content and tasks from anywhere
  • Share content securely, instantly and easily
  • Enables teams to work together in a common data environment
  • Manage procurement online from pre-quals, tenders, contract administration
  • eCommerce: Suppliers can upload catalogues and buyers can shop online
  • Abiltiy to work offline and sync when you have connectivity
  • Use the platform from concept to completion and beyond
  • Plan, design, build, manage and maintain your projects and assets
  • Automate processes easily by developing your own workflows

Pricing

£10 to £60 per user per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

497880267367592

Asite

Leen Saeb

+44(0)207 749 7880

lsaeb@asite.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None, Asite have 24/7/365 support and are system, device and browser agnostic.
System requirements Asite can be used from any device that has connectivity.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Asite is supported 24/7/365: a minimum of 15 minutes to a maximum of 1 day
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 A
Web chat accessibility testing Asite has done some testing with assistive technology users
Onsite support Onsite support
Support levels Asite provides 24/7/365 support via telephone, email, online and onsite. Support is included in the subcription fee and there is no extra charge. Asite provide each client with a technical account manager and a cloud support engineering team.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Asite provides a full onsite and online implementation, configuration and training services to get you up and running on the platform, alongside all the user documentation you will need to run your system.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • E-Learning Modules
  • User specific help modules
End-of-contract data extraction Asite confirms that in the case of an unfortunate event of contract termination, Customer will continue to manage the current workflows electronically using the Adoddle platform during the transitions period of moving to a replacement system. There would be no limitations on this. Asite confirms that prior to termination of the contract, regardless of the reasons for termination; they will provide data cuts and partial and full database dumps for transition to the replacement system. The below paragraph describes how the data will be presented, formatted, transmitted and how access is controlled. Adoddle has offline archiving capability that generates an archive on an external media with a fully navigable browser based interface for accessing all project information including the full historical audit trail data. The Files are stored in their native format, and the database data converted to XML format. Asite confirms that upon termination of the contract, Asite will provide a final handover of all data held on the systems belonging to the client back to the client using the archiving facility.
End-of-contract process Asite confirms that upon termination of the contract, Asite will provide a final handover of all data held on the systems belonging to the client back to the client using the archiving facility. The Adoddle archiving solution can satisfy legal storage requirements as well as serve as an assurance for clients because data is also available locally. Archives can be generated on project completion as well as during the course of a project. An archive can be generated for the Client containing all their project data which allows visibility solely of data to which the Client has access via the application security.The archive will be supplied on a secure External Drive that utilises Data Encryption. The entire disk is encrypted. The key exchange is symmetric and is generated by Asite during archive creation and sent to the recipient separately from the archive. Access to the encrypted archive requires the correct password to be provided before the data can be accessed. The password is separately emailed to the Admin user. The only cost is the data archiving service and hardware needed for client offline storage.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None - full functionality is available on mobile and desktop service.Asite's platform, Adoddle, is accessible via any web browser, device or operating system. Users are able to log in and design their own dashboards, tag favourite files or folders, create workflows, as well as upload, download or view any file format online and complete tasks/actions sent to them by other users. There are no limitations on use, storage or support.
Accessibility standards WCAG 2.0 A
Accessibility testing Asite has done some testing with assistive technology users
API Yes
What users can and can't do using the API Users need to contact their technical account manager to set up the API, once installed one is able scope out changes and send to our technical to enhance the experience. The use of APIs allows you to keep the existing systems that are working for you while improving efficiencies through the adaption of API. Ease of Reporting Stop running reports in multiple disparate systems. Adoddle provides a host of generic report templates, or you can easily create your own with our custom report writer. View all your work from a single point Link up multiple systems with one log-in. Connect Outside Software and Applications Full Microsoft Office Suite integration. Connect to your existing systems—Keep the systems that work and adding only what you need. Data Migration Reduced error; Eliminate duplicate entry and accidental data omission. Ability to sync to any outside system that permits APIs.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The platform is highly configurable and customers are able to customise all applications, forms, dashboards, reports, synchronisations, access control, web interface and API's.

Scaling

Scaling
Independence of resources Asite is 100% committed to maintaining the integrity of all data without error or fail. We have enacted a strict policy regarding security, incident response, and recovery procedures. Reliability—The Adoddle platform has an uptime of 99.9%. Integrity—Compliance with SSEA16—verifies Asite’s financial integrity and sound data management practices. Stability—Information security, including managing risks, threats and vulnerabilities to all information and system architecture are aligned with standard ISO 27001. Full scale incident management and disaster recovery plans mean that even in emergencies your data is fully protected, and platform downtime will be kept to a minimum.

Analytics

Analytics
Service usage metrics Yes
Metrics types Infrastructure or application metrics
CPU
Disk
HTTP request and response status
Memory
Network
Number of active instances
Audit history
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach Filesystem data is encrypted using software encryption technologies.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach NAVIGATOR No internet connection? No problem. Adoddle Navigator is a downloadable desktop application that allows you to use Adoddle anywhere by accessing your files offline. Deployed as a Java desktop application, drag-and-drop documents from your Workspace to PC while you are connected. Navigator locks out files “for editing” on the platform while you are working, keeping a single version. Once you re-connect, Navigator synchronizes your changes. Mark-up documents and perform the same actions as online, included working on BIM files and 3D modeling. Keeps the latest versions in your Working Folder.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Asite guarantee an availability uptime of 99.9% Asite provide a guaranteed Recovery Time Objective (RTO) of 4 hours & a Recovery Point Objective (RPO) of 30 minutes. In the unlikely event of the guaranteed uptime not being attained, service credits are issued to customers.
Approach to resilience Technical information regarding the resilience of the Asite Platform is available on request.
Outage reporting Monthly performance reports are available on request or as and when needed, on-demand.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Access to management interfaces is restricted to specific hosts / users. User permissions are reviewed regularly to ensure that the user still requires permission to access the resource. Access to support channels is only provided to staff that require access. Prior to providing access, requests are reviewed by management.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • HMG IS1
  • IL3 - Official Sensitive

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Asite have a comprehensive Information Security Policy in place. Information Security Managers are defined within the organization. Any incidents are reported to these Information Security Managers, who are then responsible for reporting these incidents through the defined incident management processes. Employees are required to have understood and comply to the Information Security policy when they start work & whenever changes are made to the policy. Training is carried out regularly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Asite follows an agile / iterative development model for delivering product functionality. Each iteration contains a group of functionality which is delivered through cross-discipline work, starting from the model/requirements through to testing and deployment. All changes to the platform are thoroughly tested on our QA platform prior to being rolled out on Production. Such testing includes functional, load, concurrency, security and regression testing to ensure that the implementation of the change does not cause any malfunctions within the production environment. The final step also includes verification of the proper functioning of the change solution after it is in use.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Asite maintains contact with numerous special interest groups, including The Open Web Application Security Project (OWASP), CVE (Common Vulnerabilities & Exposures) which are worldwide free and open community focused on improving the security of application software. Additionally, we are subscribed to mailing lists for Email alerts regarding vulnerabilities, & also for product updates being released. As soon as vulnerabilities are identified, actions are carried out to either negate the risk, or apply patches. These changes are then tested in QA prior to being rolled out to production.
Protective monitoring type Supplier-defined controls
Protective monitoring approach As part of the Dimension Data service, they provide a monitoring service called Alert Logic threat Manager. This is a 3rd party solution that actively monitors inbound & outbound traffic for any known & potentially suspicious traffic. This is monitored 24x7 & if an anomaly is detected, alerts are sent. An additional layer of defence is Alert Logic's Threat Manager™, which is a network-wide infrastructure security, measurement and traffic-monitoring platform used to address network availability threats. Asite have an escalation policy in place for responding to threats.
Incident management type Supplier-defined controls
Incident management approach Asite have policies and procedures regarding incident management. incidents are categorized into predefined priorities, which have predefined response times associated with them. Users are required to contact Asite Support regarding any incidents. Asite Support is available 24x7, 365 days a year. Asite will contact customers regarding any incidents as soon as possible after the incident has been detected. Incident reports are provided to the primary contact of each organization.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £10 to £60 per user per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Full access for a period of 28 days

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑