A screening tool to help organisations assess the commercial and technical feasibility of deploying a range of renewable and low carbon energy generation technologies across their portfolio of sites.
The software highlights technical constraints and calculates the optimum system size to maximise return on investment.
- multiple technologies assessed simultaneously
- based on half hourly energy consumption data
- technology agnostic
- objective commercial assessments based on data
- easy to navigate user interface
- technical and planning constraints identified
- battery storage incorporated
- unlimited users can be added for no extra charge
- peer reviewed with case studies
- no software needed, just a recent broswer
- low cost flexible licence arrangements
- efficient production of business cases in standard format
- energy cost and carbon savings easily identified
- multiple technologies assessed simultaneously
- easily accessible from a broswer
- managed service option provided, OnGen do the assessments
- constantly updated and easily to sensitise assumptions
- accurate 20 year cash flow forecasts
- third party funding options available to suit the organisation
£900 per licence per year
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
The renewable and low carbon technologies included on the platform are limited to bankable or mature technologies.
Ground source heat and air source heat pumps are being added in 2018.
Battery storage can be assessed in conjunction with roof mounted solar PV however potential income streams from providing grid services are excluded as they are very unpredictable and short term.
|System requirements||Any web browser, ideally chrome (IE v.9 or later)|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support email provided within the software.
Week day support 9am - 5.30pm
Maximum 24 hour response time
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
An initial half day training session is provided as part of the licence fee, usually via webex.
All customers are assigned a dedicated account manager who can provide assistance via the phone or webex with assessments.
Ongoing technical and software support included as part of the licence fee.
Specific software development requests will be considered and costed as required.
A managed service option is provided where OnGen will carry out assessments on the licensees behalf for a flat fee per site of £50 (in addition to the licence charge).
This service has provide to be ideal if internal resource is not available or constrained.
|Support available to third parties||Yes|
Onboarding and offboarding
Online and offline training is provided through an initial half day training workshop.
Video support is provided for each part of the process
|End-of-contract data extraction||
The software generates feasibility assessments in MS Word.
Portfolio data an be exported as .xlxs or PDF based on a range of filters
|End-of-contract process||Data will be held on the platform in perpetuity on receipt of a data management fee. This allows the user to refresh and sensitise existing sites an unlimited number of times but new sites or technologies could not be created.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Designed to work on mobile tablets, not phone|
|Accessibility standards||WCAG 2.0 A|
|What users can and can't do using the API||
RESTful JSON API available over https
Registration API available
Account management API available
Users will be able to add technology and site assessments and receive restuls in JSON
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Description of customisation||
Dedicated URL and branding provided at set up for the web application.
List of installers can be customised e.g. those on a procurement framework.
All customisation is provided in the set up phase
|Independence of resources||
Huge contingency built into Amazon Web Services cloud.
We can vertically scale the service to meet demand and we can also provide dedicated instances to specific customers.
|Service usage metrics||Yes|
Number of users accessing the software.
Renewable technologies added to the platform.
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Using buttons at various stages throughout the assessments.
Assessment reports are sent to the users email address.
Portfolio reports are exported to PDF or xlsx
The API exposes data in JSON
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||MS Excel|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Servers is hosted with Amazon Web Services and SLAs are consistent with their uptime.
Releases are scheduled and notified 24 hours in advance
|Approach to resilience||In line with AWS. Data is backed up every 5 minutes and stored for 2 weeks.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
We do not expose management interfaces or support channels to the public internet.
Elevated permissions are granted only where there is a job requirement to do so.
|Access restriction testing frequency||Never|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Data is encrypted in transit using SSl and HTTPs, passwords encrypted at rest.
Access to the data is limited to master credentials for AWS.
|Information security policies and processes||
2 developers have access to data in UAT and report to the Senior Developer.
The Senior developer reports directly to the CTO and CEO.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Change is captured in a ticketing system.
Change is grouped into sprints with planned releases.
We perform full regression testing before live releases.
The security impact of any change is assessed at design and implementation time.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
Operating system patches and service packs are deployed as they become available.
The frameworks used to develop the software are updated and the relevant patterns used to protect against common vulnerabilities.
We source threat information for OWASP https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||
We monitor and log traffic in AWS.
We can rapidly change firewalls and access controls on the component parts of the software to mitigate compromise.
We respond to incidents as our highest priority.
|Incident management type||Undisclosed|
|Incident management approach||
Users can report incidents through the web site, API, twitter and email.
We aim to restore normal service as fast as possible and communicate with our users through all unaffected channels.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£900 per licence per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
One site can be assessed for all current technologies for free.
The ability to generate a site feasibility report is not permitted without the payment of a small fee.
There is no time limit on the free trial.
|Link to free trial||https://expert.ongen.co.uk|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|