Automated Site Investigation

Our Automated Site Investigation product allows public sector landowners to complete due diligence on land at a click of a button. Simply upload your sites on our platform and our software and vetted suppliers will provide you with aggregated Site Investigation data on all your construction sites.


  • Development Management Platform for Site Investigation
  • Live dashboard that provides portfolio overview on site risks
  • Real time workflow alerts and progress updates
  • In-built public sector compliant procurement process
  • Easily export your automated reports
  • Automated tender reports and recommended Site Investigation suppliers
  • Secure cloud storage of all Site Investigation reports and data
  • In-built collaboration functions. Easily share data with your project team
  • Industry best practice Pre-Qualification Process for assessing suppliers
  • Secure & remote web access, no software to download


  • Operational Efficiency - Reduce in-house resource requirements by 90%
  • Speed - Complete Site Investigation works 2x faster
  • Quality – Guaranteed consistent quality on every project
  • Easy access to benchmark cost data via our platform
  • Receive aggregated data to enable data driven decision making
  • Minimise future site risks and abortive costs on development sites
  • Automate stakeholder management and supply chain management
  • Included: Topographical Survey, Utility Survey, Asbestos Survey
  • Included: Tree Survey, UXO Survey, Archaeology Survey
  • Included: Ecology Survey, Flood Risk Assessment, Geotechnical Survey, Land Contamination


£6,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 5 6 6 2 7 9 3 9 5 0 8 6 1 7


RENKAP LTD Gonzalo Marquesini
Telephone: 07988719155

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
RenKap's service does not contain any service constraints.
System requirements
Internet access is the only requirement.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
Support available to third parties

Onboarding and offboarding

Getting started
New users are all provided with a product demo and a PDF guide on how to use our service. If users require additional support, our experienced account managers are available to support via video calls - 5 hours of support included with the onboarding if required.
Service documentation
Documentation formats
End-of-contract data extraction
All data can easily be downloaded via our platform in both excel and pdf formats. Clients have 3 months to do so from terminating their contract.
End-of-contract process
The buyer can simply deactivate their account. If requested, all identifiable data will be deleted.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Customisation available
Description of customisation
Our solution allows users to customise which Site Investigation services are required on each site. This includes services such as asbestos survey, utility survey, ecology survey and so on.

How? When users upload their sites onto our platform they will be recommended which Site Investigation services apply to that site based on the information they have provided. They then have the option to easily select or de-select additional services that they may or may not need.


Independence of resources
Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. Services which provide virtualized operational environments to customers (i.e. EC2) ensure that customers are segregated via security management processes/controls at the network and hypervisor level. AWS continuously monitors service usage to project infrastructure needs to support availability commitments/requirements. AWS maintains a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently. In addition, the AWS capacity planning model supports the planning of future demands to acquire and implement additional resources based upon current resources and forecasted requirements.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All data can easily be downloaded via our platform in both excel and pdf formats.
Data export formats
  • CSV
  • ODF
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As a web based solution, our platform is available to be used 24/7 bar any unforeseen circumstances.

If one of our suppliers has not provided their works as per our agreed scope of service, RenKap will withhold funds until they make good the works and it is satisfied with the client. If RenKap are at fault for an error, we will recompense 10% of our fee and make good the situation at the earliest opportunity.
Approach to resilience
Available on request.
Outage reporting
In the instance of service outages, service users will be contact by account managers via email. In addition, service users will also receive automated emails to immediately notify them.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Username and Password.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Our governance is based on the ISO/IEC 38500:20015, the objective of which is to promote effective, efficient, and acceptable use of IT.
We also base our process on A2.10 of Cyber Essentials.
Information security policies and processes
We have the following policies in place: Email/Communication Policy, Acceptable Use Policy, Access Control Policy, Change Management Policy, Incident Response Policy, Remote Access Policy. All our employees receive compulsory training.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Version Control: Check the work into a common repository and to see changes done with full version history.
2. Baseline and release information: When was the last version released, what it contained, and having a baseline version to deploy at any time.
3. Audits & Review: Audit to ensure that people are actually following the configuration management and versioning system properly.
4. Documented Process: An agreed upon process to ensure compliance in actual implementation.
5. Build, Integrate and Deploy Scripts: Common, standard scripts that automate the work of building, testing, integrating, deploying, and removing manual errors from the process.
Vulnerability management type
Vulnerability management approach
We ensure that all software and applications are always up-to-date with the latest patches and updates from reliable sources. All software for the company operations are licensed in accordance with the publisher’s recommendations. Additionally, all high-risk or critical security updates are installed within 14 days of release.
Protective monitoring type
Protective monitoring approach
We undertake penetration testing to identify any potential compromises.
We then complete patch management and risk assessments to help us respond when we find a potential compromise.
Incident management type
Incident management approach
We have a Security Policy which includes handling incidents. We provide guidance to employees on proper response to, and efficient and timely reporting of, computer security related incidents, such as computer viruses, phishing emails, unauthorized user activity, and suspected compromise of data.

Users can report incidents to their account manager.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£6,000 a unit a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.