Arcspeed Digital Solutions Ltd

Mobile Asset Management (MAM)

Our Mobile Asset Management solution is a highly configurable SaaS product which allows the rapid deployment of mobile forms for Maintenance, Fault Management, Inspections, Surveys, Field Data Collection. Can be run standalone or integrated with customers existing systems or the Arcspeed Asset Manager product.


  • Facilities Management, CAFM, Asset Management, CMMS, Maintenance, Inspections, Fault Management
  • Software as a Service (SaaS) Cloud-based. No Infrastructure investment
  • Native app runs on any iOS or Android device
  • Full integration with on-board camera and GPS, Built in Mapping
  • Fully offline capable - data cached offline and synced online
  • Wide range of built in connectors to support system integration
  • Flexible API architecture for more complex integration
  • Highly secure with role-based permissions
  • Inline validation assures data quality at point of collection
  • Barcode, QR code, RFID reading can be enabled and utilised


  • Significantly reduced implementation costs compared with bespoke solutions
  • Software as a Service model reduces total cost of ownership
  • Enables rapid deployment of solutions
  • Highly flexible and scalable system architecture
  • Connectors enable easy integration with existing enterprise systems
  • Improves productivity by significantly reducing manual processing of data
  • Improves environmental sustainability by reducing both paperwork and travel
  • Supports complex data validation including conditional logic within the App
  • Supports social distancing enabling organisations to implement paperless working


£499 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

6 3 1 0 5 4 1 1 3 8 5 4 6 7 4


Arcspeed Digital Solutions Ltd Glen Garrard
Telephone: 07799 718503

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
IOS or Android device with sufficient storage

User support

Email or online ticketing support
Email or online ticketing
Support response times
We provide an SLA based on the severity of the issue ranging from:

Severity 1 (High priority) where we aim to respond within 1 hour and fix within 4 hours 95% of the time,


Severity 4 (Low priority) where we aim to respond within 2 business days and fix within 5 days 95% of the time.

Business days are defined as Monday to Friday 0800 to 1800 excluding bank holidays.
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Consultancy £850 per day
Project Management £750 per day
Development £725 per day
Integration £725 per day
Configuration £600 per day
Training £550 per day
Data Migration £475 per day
Support available to third parties

Onboarding and offboarding

Getting started
Training can be delivered either onsite or via electronic means.

A training needs analysis is undertaken for all new clients in order to determine the most appropriate method of training for the intended target audience.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be accessed via web portal export facility or via API at any point during the contract.
We can also carry out a bulk export on the client's behalf via a support ticket.
End-of-contract process
There is no additional cost as standard at the end of the contract. If required we are able to facilitate exports of customer data & stored media at our standard day rates.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile is used for field data collection and validation. Web portal is used for administration of reference data and to view / export collected data.
Service interface
What users can and can't do using the API
APIs are provided to access all data collected via the app.
API documentation
API documentation formats
API sandbox or test environment
Customisation available


Independence of resources
Cloud-based infrastructure, hosted in Azure, is automatically scaled up to accommodate peaks in demand.


Service usage metrics
Metrics types
Number of users
Monthly transactions
Data storage volumes
Support tickets raised and associated response times
Reporting types
Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Our service is entirely hosted in Microsoft Azure - see following links for more detail on data security:
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via data export facility within web portal to either Excel or CSV format (for data) or native format for documents (eg pdf).
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our Azure-based service infrastructure offers 99.995% availability.

Our SLA is based on a target 1 hour response time / 4 hour fix time for Severity 1 faults.
Approach to resilience
Our service is entirely hosted in Microsoft Azure which has a target of 99.995% availability.

Our platform supports point in time database recovery and geo-replication of services to alternate data centres.
Outage reporting
Availability outages are currently reported via automated email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces are restricted to key staff only and restricted by IP to trusted networks only.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management process is fully ITIL compliant and assures that all changes are reviewed for potential security impact prior to approval.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability and threat management process is disciplined and rigorous and uses a range of industry-standard sources to ensure that potential threats are identified and mitigated in a timely and effective manner.
Protective monitoring type
Protective monitoring approach
Our protective monitoring process is pro-active and makes use of industry standard tools including Azure's own built-in monitoring and logging facilities to ensure that compromises are identified and resolved in a timely and effective manner.
Response times are in line with our SLA with all compromises classed as a Severity 1 incident (target 1 hour response / 4 hour fix).
Incident management type
Incident management approach
We have a rigorous incident management process that is fully ITIL compliant.

Incidents can be logged via phone, email or online support portal and are managed in our Freshdesk instance, from where users can also access incident reports.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£499 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
By arrangement we can offer a free trial of the solution for up to 50 users for 2 months.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.