RENKAP LTD

Automated Site Investigation

Our Automated Site Investigation product allows public sector landowners to complete due diligence on land at a click of a button. Simply upload your sites on our platform and our software and vetted suppliers will provide you with aggregated Site Investigation data on all your construction sites.

Features

  • Development Management Platform for Site Investigation
  • Live dashboard that provides portfolio overview on site risks
  • Real time workflow alerts and progress updates
  • In-built public sector compliant procurement process
  • Easily export your automated reports
  • Automated tender reports and recommended Site Investigation suppliers
  • Secure cloud storage of all Site Investigation reports and data
  • In-built collaboration functions. Easily share data with your project team
  • Industry best practice Pre-Qualification Process for assessing suppliers
  • Secure & remote web access, no software to download

Benefits

  • Operational Efficiency - Reduce in-house resource requirements by 90%
  • Speed - Complete Site Investigation works 2x faster
  • Quality – Guaranteed consistent quality on every project
  • Easy access to benchmark cost data via our platform
  • Receive aggregated data to enable data driven decision making
  • Minimise future site risks and abortive costs on development sites
  • Automate stakeholder management and supply chain management
  • Included: Topographical Survey, Utility Survey, Asbestos Survey
  • Included: Tree Survey, UXO Survey, Archaeology Survey
  • Included: Ecology Survey, Flood Risk Assessment, Geotechnical Survey, Land Contamination

Pricing

£6,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gonzalo.m@renkap.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

5 5 6 6 2 7 9 3 9 5 0 8 6 1 7

Contact

RENKAP LTD Gonzalo Marquesini
Telephone: 07988719155
Email: gonzalo.m@renkap.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
RenKap's service does not contain any service constraints.
System requirements
Internet access is the only requirement.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
Support available to third parties
No

Onboarding and offboarding

Getting started
New users are all provided with a product demo and a PDF guide on how to use our service. If users require additional support, our experienced account managers are available to support via video calls - 5 hours of support included with the onboarding if required.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All data can easily be downloaded via our platform in both excel and pdf formats. Clients have 3 months to do so from terminating their contract.
End-of-contract process
The buyer can simply deactivate their account. If requested, all identifiable data will be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Our solution allows users to customise which Site Investigation services are required on each site. This includes services such as asbestos survey, utility survey, ecology survey and so on.

How? When users upload their sites onto our platform they will be recommended which Site Investigation services apply to that site based on the information they have provided. They then have the option to easily select or de-select additional services that they may or may not need.

Scaling

Independence of resources
Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. Services which provide virtualized operational environments to customers (i.e. EC2) ensure that customers are segregated via security management processes/controls at the network and hypervisor level. AWS continuously monitors service usage to project infrastructure needs to support availability commitments/requirements. AWS maintains a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently. In addition, the AWS capacity planning model supports the planning of future demands to acquire and implement additional resources based upon current resources and forecasted requirements.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All data can easily be downloaded via our platform in both excel and pdf formats.
Data export formats
  • CSV
  • ODF
Data import formats
ODF

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As a web based solution, our platform is available to be used 24/7 bar any unforeseen circumstances.

If one of our suppliers has not provided their works as per our agreed scope of service, RenKap will withhold funds until they make good the works and it is satisfied with the client. If RenKap are at fault for an error, we will recompense 10% of our fee and make good the situation at the earliest opportunity.
Approach to resilience
Available on request.
Outage reporting
In the instance of service outages, service users will be contact by account managers via email. In addition, service users will also receive automated emails to immediately notify them.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Username and Password.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our governance is based on the ISO/IEC 38500:20015, the objective of which is to promote effective, efficient, and acceptable use of IT.
We also base our process on A2.10 of Cyber Essentials.
Information security policies and processes
We have the following policies in place: Email/Communication Policy, Acceptable Use Policy, Access Control Policy, Change Management Policy, Incident Response Policy, Remote Access Policy. All our employees receive compulsory training.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Version Control: Check the work into a common repository and to see changes done with full version history.
2. Baseline and release information: When was the last version released, what it contained, and having a baseline version to deploy at any time.
3. Audits & Review: Audit to ensure that people are actually following the configuration management and versioning system properly.
4. Documented Process: An agreed upon process to ensure compliance in actual implementation.
5. Build, Integrate and Deploy Scripts: Common, standard scripts that automate the work of building, testing, integrating, deploying, and removing manual errors from the process.
Vulnerability management type
Undisclosed
Vulnerability management approach
We ensure that all software and applications are always up-to-date with the latest patches and updates from reliable sources. All software for the company operations are licensed in accordance with the publisher’s recommendations. Additionally, all high-risk or critical security updates are installed within 14 days of release.
Protective monitoring type
Undisclosed
Protective monitoring approach
We undertake penetration testing to identify any potential compromises.
We then complete patch management and risk assessments to help us respond when we find a potential compromise.
Incident management type
Undisclosed
Incident management approach
We have a Security Policy which includes handling incidents. We provide guidance to employees on proper response to, and efficient and timely reporting of, computer security related incidents, such as computer viruses, phishing emails, unauthorized user activity, and suspected compromise of data.

Users can report incidents to their account manager.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£6,000 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gonzalo.m@renkap.com. Tell them what format you need. It will help if you say what assistive technology you use.