digitalenergy Professional (Energy Management Portal)
digitalenergy® Professional Energy management software provides applications for reducing energy costs and consumption in buildings. As an Energy Management System it collects energy data and uses it for three main purposes: Reporting, Monitoring and Engagement - enabling efficient Management and Operation.
Features
- Enterprise Energy and Carbon Monitoring and Targeting
- Asset Level Energy and Carbon Management
- Document Management and Control (ESOS, CRC, ISO50001)
- Auditing Management (ESOS, CRC, ISO50001)
- Project Management and Validation
- Web Signage and Dashboards
- Energy Accounting and Invoice Management
- Mobile Utility Meter Reading
- Reporting Management and Custom Reporting
- ESOS, CRC and ISO50001 Compliance Software
Benefits
- Manage your whole organisations energy and carbon emissions
- Control consumption, cost and carbon interactively at an asset leve
- Manage a detailed ISO50001 audit trail
- Generate custom audit templates for ISO50001, CRC or ESOS
- Project details accessible through a central register enabling performance tracking
- Tools to create multiple asset related benchmarks annually
- Engage users with the information that will change specific behavior
- Simplified process of handling, validating and payment of invoices
- Take meter readings from handheld devices
- Enables automation of analytical data to multiple clients
Pricing
£2.75 to £45 a device a year
- Minimum contract period: Year
- Excluding VAT
- Trial option available
Service documents
Request an accessible format
Framework
G-Cloud 7
Service ID
7 8 5 2 2 6 2 0 4 8 2 9 6 0 2 6
Contact
digitalenergy Ltd
<removed>
Telephone: <removed>
Email: <removed>@ea4976c7-414a-4de9-b8be-5fc1d1a8e174.com
Support
- Support service type
-
- Service desk
- Phone
- Onsite
- Support accessible to any third-party suppliers
- No
- Support availability
- 9 to 5
- Standard support response times
- 1 hour
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- No
Onboarding and offboarding
- Service onboarding process included
- No
- Service offboarding process included
- No
Analytics
- Real-time management information available
- Yes
Cloud features
- Elastic cloud approach supported
- Yes
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- Yes
- Service provisioning time
- A typical migration can take between 6 and 12 weeks depending upon client interaction.
- Service deprovisioning time
- 1-2 days
Open source
- Open-source software used and supported
- No
API access
- API access available and supported
- Yes
- API type
- Occupancy Sensors, VSD, Solar Invertors
Networks and connectivity
- Networks the service is directly connected to
- Internet
Access
- Supported web browsers
-
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Opera
- Offline working and syncing supported
- No
- Supported devices
-
- PC
- Mac
- Smartphone
- Tablet
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- Yes
- Datacentre tier
- TIA-942 Tier 4
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- UK
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other secure erasure process
- Service availability
- 99.99%
Separation between consumers
- Cloud deployment model
- Hybrid cloud
- Type of consumer
- A specific consumer group, eg Police, Defence or Health
- Services separation
- Yes
- Services management separation
- Yes
Governance
- Governance framework
- No
Configuration and change management
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- Yes
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- Yes
- Administrator permissions
- Yes
Identity and authentication
- Identity and authentication controls
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available
Secure use of the service by the customer
- Device access method
- Training
- Yes