This G-Cloud 10 service is no longer available to buy.

The G-Cloud 10 framework expired on Tuesday 2 July 2019. Any existing contracts with Causeway Technologies Limited are still valid.
Causeway Technologies Limited

Yotta Alloy

Alloy represents the future for infrastructure asset management and environmental services. Through its connected asset management approach, organisations can harness and maximise value from the ever-increasing availability of data and connectivity in our fast-changing world. Alloy turns data into insights transforming the way you work and the decisions you make.

Features

  • Alloy delivers a blend of core functionality and specialist functions
  • Design and visualise any asset, component, defect, inspection, job etc.
  • Use any network geometries (e.g. N/LSG, UKPMS, N/LLPG, CAG, etc.)
  • Manage inspections, defects, jobs, larger projects, schedules and budgets
  • Route optimisation and mobile working for effective service delivery onsite
  • Powerfully clear, flexible and logical workflow management
  • Comprehensive user permissions and team management
  • Open and flexible API allowing integration with key business systems
  • Alloy mesh facilitates mass sensor integration (IoT & Smart cities)
  • Powerful search, querying, dynamic reporting / dashboards and data visualisation

Benefits

  • Delivers the fundamental elements for effective asset and service management
  • Specialist functionality is also available for certain assets and services.
  • Manage highway assets, drainage, structures, lighting, waste, grounds, cleansing, noticing
  • Facilitates effective highway asset management and delivery of environmental services
  • Produces TR22, BSCP520 compliant reports, Energy codes, BV215b etc.
  • Full offline and online mobile working capability ensuring organisational efficiency
  • Deliver safety inspections in line with the code of practice
  • Improve communication, coordination and decisions through eliminating data silos
  • Powerful visualisations and reporting enhance understanding of asset/service performance
  • Import Web mapping services (WMS) to support service delivery

Pricing

£500 to £1,500 a user a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at YottaUKSales@yotta.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 10

Service ID

5 3 8 0 6 4 2 8 0 8 4 0 7 7 3

Contact

Causeway Technologies Limited Yotta UK Sales
Telephone: 01926 319 600
Email: YottaUKSales@yotta.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Please refer to the “Yotta SAAS Agreement” document for planned maintenance agreements.

Minimum Spec: Modern web browser, 2GB RAM (free), Pentium 4 processor or higher.
System requirements
  • Modern web browser
  • Valid email address

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our Support Desk opening hours are 8am to 6pm, Monday to Friday excluding public holidays in England. An immediate Automated Response is sent after receipt of an email. The response states that the ticket will be reviewed, prioritised and assigned, and that a further email will be sent once this is done. Priorities and associated response times are as follows: *Urgent - Work begins immediately *High - Work begins within the next working hour *Normal - Work begins within the next 4 working hours *Low - Work begins within the next 8 working hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support levels covered are operated by our help-desk and customer portal, which operates 24 hours a day. We provide an account manager who will provide details on additional support as required.
Support available to third parties
No

Onboarding and offboarding

Getting started
A full onboarding plan is agreed at the start of the project covering the full implementation of Installation, Process and Data reviews, Data Migration, Training, User Acceptance Testing, User Training and Go Live. A Yotta project team is assigned to each implementation and work on the project covering the full project life cycle through to a hand over to Support as the system enters BAU.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Alloy has support to export all customer data sets using common interchange formats such as CSV, TAB and ShapeFile. This can be achieved via the API.
End-of-contract process
Following a request to cease an Alloy licence in agreement with the Yotta licence terms and conditions, Yotta will cease to provide the service on the agreed date. All data will be exported and made available to the client either by email or FTP site in an agreed common format for a period of up to three months post-termination.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile service is offered via a complementary mobile app and allows for offline working.
Accessibility standards
None or don’t know
Description of accessibility
Core search and form functionality is maintained across the software for accessibility. Web mapping, GIS functionality and Navigating visual hierarchies are not accessible to visually impaired individuals.
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Both the Alloy web client and mobile application is built using the API and all functionality can be exposed to customers that have access to the system.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
With Alloy it is possible to modify all data structures and extend them to support customer specific data sets. It is possible to define more complex relationships between data and configure access to the data on a per user basis.

Scaling

Independence of resources
Alloy has sophisticated infrastructure that separates customer databases and the resources used by them. Where long running processes exist we ensure that they are load balanced horizontally. We monitor all servers for KPI's and if thresholds are met we can bring online further resource to satisfy demand without taking the system offline.

Analytics

Service usage metrics
Yes
Metrics types
We provide detailed reports inside Alloy to log service usage for a customer. It is accessible to administrators of a customer.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via the web client and API using standard formats
Data export formats
  • CSV
  • Other
Other data export formats
  • ShapeFile
  • TAB
Data import formats
  • CSV
  • Other
Other data import formats
  • ShapeFile
  • TAB

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
A regular Maintenance Window, during which the service may be unavailable without further notice, occurs once a month outside of the core hours. The service should normally be available outside of this maintenance window. Core Hours for the service are 0600 – 2000 on Working Days. The service is intended to be available 100% of the time during Core Hours.
Approach to resilience
Information available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Deployment and patch releases are automated, this limits the access required by any development team member. Only the administrator of the infrastructure has full access to the virtualised instances and another authorised member of staff manages user access levels.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Lloyds Register Quality Assurance
ISO/IEC 27001 accreditation date
24/07/14
What the ISO/IEC 27001 doesn’t cover
We can supply Annex A to ISO27001:2013 which covers our Statement of Applicability if required. The boundary of this Certification is the collection of elements described in section 2.2. and provision of data to Amazon Web Services (ISO27001 compliant, EY CertifyPoint, an ISO certifying agent accredited by the Dutch Accreditation Council, a member of the International Accreditation Forum (IAF). Certificates issued by EY CertifyPoint are recognized as valid certificates in all countries with an IAF member) who host web based Alloy software data access.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • The supply chain is managed under our ISO9001:2015 certification
  • The AWS platform that hosts Horizons is also ISO27001 compliant

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Yotta Ltd is certified to ISO27001:2013 and routinely assessed for compliance by Lloyds Register Quality Assurance. The Statement of Applicability against Annex A of the Standard is addressed in the corporate risk management and document set. Policies and Processes are followed by staff through compliance with published and accepted (through individual signature) Security Operating Procedures. Staff receive information and cyber security awareness training as part of their induction and on-going instruction.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Processes are documented internally and managed by the support team, changes are assessed on alpha and beta environments before being propagated into the live system
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Internal testing team and external penetrations testing team assess the software for vulnerabilities. High priority patches are deployed within 1 day. The support team monitor well known security channels for daily updates on system vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Compromises can be identified via support, testing or users. If a compromise is identified then it is analysed and assigned a severity. Depending on the severity of the item, time to fix can be anywhere from hours to the next patch release. Response to incidents is within 0-8 hours depending on severity.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are provided through our customer support portal available online. Common events are documented and processes defined within the support portal, we can also provide incident reports on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£500 to £1,500 a user a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at YottaUKSales@yotta.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.