RENKAP LTD
Automated Site Investigation
Our Automated Site Investigation product allows public sector landowners to complete due diligence on land at a click of a button. Simply upload your sites on our platform and our software and vetted suppliers will provide you with aggregated Site Investigation data on all your construction sites.
Features
- Development Management Platform for Site Investigation
- Live dashboard that provides portfolio overview on site risks
- Real time workflow alerts and progress updates
- In-built public sector compliant procurement process
- Easily export your automated reports
- Automated tender reports and recommended Site Investigation suppliers
- Secure cloud storage of all Site Investigation reports and data
- In-built collaboration functions. Easily share data with your project team
- Industry best practice Pre-Qualification Process for assessing suppliers
- Secure & remote web access, no software to download
Benefits
- Operational Efficiency - Reduce in-house resource requirements by 90%
- Speed - Complete Site Investigation works 2x faster
- Quality – Guaranteed consistent quality on every project
- Easy access to benchmark cost data via our platform
- Receive aggregated data to enable data driven decision making
- Minimise future site risks and abortive costs on development sites
- Automate stakeholder management and supply chain management
- Included: Topographical Survey, Utility Survey, Asbestos Survey
- Included: Tree Survey, UXO Survey, Archaeology Survey
- Included: Ecology Survey, Flood Risk Assessment, Geotechnical Survey, Land Contamination
Pricing
£6,000 a unit a year
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at gonzalo.m@renkap.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 12
Service ID
5 5 6 6 2 7 9 3 9 5 0 8 6 1 7
Contact
RENKAP LTD
Gonzalo Marquesini
Telephone: 07988719155
Email: gonzalo.m@renkap.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- RenKap's service does not contain any service constraints.
- System requirements
- Internet access is the only requirement.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support is provided during usual business hours - 9am to 5pm, Monday to Friday (excluding public holidays).
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- New users are all provided with a product demo and a PDF guide on how to use our service. If users require additional support, our experienced account managers are available to support via video calls - 5 hours of support included with the onboarding if required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All data can easily be downloaded via our platform in both excel and pdf formats. Clients have 3 months to do so from terminating their contract.
- End-of-contract process
- The buyer can simply deactivate their account. If requested, all identifiable data will be deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Our solution allows users to customise which Site Investigation services are required on each site. This includes services such as asbestos survey, utility survey, ecology survey and so on.
How? When users upload their sites onto our platform they will be recommended which Site Investigation services apply to that site based on the information they have provided. They then have the option to easily select or de-select additional services that they may or may not need.
Scaling
- Independence of resources
- Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. Services which provide virtualized operational environments to customers (i.e. EC2) ensure that customers are segregated via security management processes/controls at the network and hypervisor level. AWS continuously monitors service usage to project infrastructure needs to support availability commitments/requirements. AWS maintains a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently. In addition, the AWS capacity planning model supports the planning of future demands to acquire and implement additional resources based upon current resources and forecasted requirements.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All data can easily be downloaded via our platform in both excel and pdf formats.
- Data export formats
-
- CSV
- ODF
- Data import formats
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
As a web based solution, our platform is available to be used 24/7 bar any unforeseen circumstances.
If one of our suppliers has not provided their works as per our agreed scope of service, RenKap will withhold funds until they make good the works and it is satisfied with the client. If RenKap are at fault for an error, we will recompense 10% of our fee and make good the situation at the earliest opportunity. - Approach to resilience
- Available on request.
- Outage reporting
- In the instance of service outages, service users will be contact by account managers via email. In addition, service users will also receive automated emails to immediately notify them.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Username and Password.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our governance is based on the ISO/IEC 38500:20015, the objective of which is to promote effective, efficient, and acceptable use of IT.
We also base our process on A2.10 of Cyber Essentials. - Information security policies and processes
- We have the following policies in place: Email/Communication Policy, Acceptable Use Policy, Access Control Policy, Change Management Policy, Incident Response Policy, Remote Access Policy. All our employees receive compulsory training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
1. Version Control: Check the work into a common repository and to see changes done with full version history.
2. Baseline and release information: When was the last version released, what it contained, and having a baseline version to deploy at any time.
3. Audits & Review: Audit to ensure that people are actually following the configuration management and versioning system properly.
4. Documented Process: An agreed upon process to ensure compliance in actual implementation.
5. Build, Integrate and Deploy Scripts: Common, standard scripts that automate the work of building, testing, integrating, deploying, and removing manual errors from the process. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We ensure that all software and applications are always up-to-date with the latest patches and updates from reliable sources. All software for the company operations are licensed in accordance with the publisher’s recommendations. Additionally, all high-risk or critical security updates are installed within 14 days of release.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
We undertake penetration testing to identify any potential compromises.
We then complete patch management and risk assessments to help us respond when we find a potential compromise. - Incident management type
- Undisclosed
- Incident management approach
-
We have a Security Policy which includes handling incidents. We provide guidance to employees on proper response to, and efficient and timely reporting of, computer security related incidents, such as computer viruses, phishing emails, unauthorized user activity, and suspected compromise of data.
Users can report incidents to their account manager.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £6,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at gonzalo.m@renkap.com.
Tell them what format you need. It will help if you say what assistive technology you use.