AgileAssets Ltd

Bridge Analyst (Management & Analysis) Solution

Advance Your Bridge and Structure Management Strategies and Increase ROI.

The Bridge Management (Analyst) Solution lets you make better investment decisions for the maintenance, preservation, rehabilitation, and replacement of bridges and other structures by predicting future performance and generating optimal management strategies.


  • Bridge and Structures Management System
  • Manage All Structural Assets
  • Optimise Work Plans
  • Preview Investment Outcomes
  • Multi-Period, Multi-Constraint Analysis
  • Deterioration Models
  • Optimized Work Plans
  • Ability to store BCI results year-on-year to provide historical analysis
  • BCI Calculation Facilities
  • Flexible, Geospatial Reporting, Graphical Reporting, and Data Visualisation


  • Keep bridges, overhead signs, and other structures in good repair
  • Use multi-year, multi-constraint predictive analysis.
  • Create optimal work plans using predictive modelling
  • Determine the best time to apply preventive treatments
  • Generate interactive reports, communicate the effects of your investment decisions
  • Test assumptions over multiple periods of time, evaluate potential outcomes.
  • Project future level of service to determine optimal maintenance strategies
  • Improve analysis, visualization, and reporting using integrated GIS support.
  • Turn analysis results directly into optimized work plans.
  • Accelerate decision-making by defining decision trees according to agency practices.


£4,000 to £4,000 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 2 7 8 0 4 5 0 6 7 0 7 8 1 8


AgileAssets Ltd James Robertson
Telephone: 020 3858 7272

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Highway Maintenance Management Solution,
Pavement Management Solution,
Bridge Inspector Solution
Cloud deployment model
Private cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Initial acknowledgement within 5 minutes and initial response to questions is within 30 minutes
User can manage status and priority of support tickets
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Severity Levels and Issue Identification. Services issues are categorised by AgileAssets into one of four classifications:

"Severity 1" - Services is inoperable. Customer is unable to use the Services without significant disruption to Customer's primary business operations and with respect to which no workarounds exist that would enable the Services to be so used until corrections can be made.

"Severity 2" - issue that is of a severity that prevents the Services from being used without significant disruption to Customer's primary business operations but with respect to which a workaround exists enabling business operations even if in a diminished capacity.

"Severity 3" - issue which restricts the use of one or more features of the Services to perform necessary functions but with respect to which a workaround is available.

"Severity 4" - are non-critical issue that prevent a function or component of the Services from operating properly but which is not a Severity 1, Severity 2 or Severity 3 issue.
Support available to third parties

Onboarding and offboarding

Getting started
AgileAssets offers a variety of training options depending on the size and structure of the organisation. The goal of training is to enable knowledge transfer throughout the project—and formally, through classroom training, enable organisations to effectively use the system. AgileAssets sees training as fundamental to the success of a project, and tailors proposed training to meet the requirements of the organisation.
The familiarity of the AgileAssets solution will reduce the need for formal in-classroom training of all users. Existing training material and documentation will be updated to address expanded functionality. Organisations can also benefit from the AgileAssets Learning Centre, which provides web-based, self-service training videos.
Service documentation
Documentation formats
End-of-contract data extraction
For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available, in a SQL DMP format, for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full.
The AgileAssets system allows users to copy portions of the current data set by using the export data command. It allows the customization export of data into several formats like .csv, .html, .xls, .xlsx, DBF, KML or Shape file. The data is easily available in a comfortable format to then be manipulated as required. Selection tools are available on this export tool to select just the currently displayed data to export, or any range of the full data set.
End-of-contract process
For a period of 30 days from the effective date of termination of this Agreement, AgileAssets will make the Customer Data available for download provided Customer is not in breach of this Agreement and has paid all fees due under this Agreement in full. After that period, AgileAssets will delete all backed-up Customer Data from its systems and Customer’s access to the Services will cease. In addition, each party will return to the other the original and all copies of the Confidential Information in the other’s possession, custody or control or, in lieu of returning such Confidential Information, destroy all copies of such Confidential Information, and certify to such destruction in a writing signed by its officer. Customer’s obligation to pay AgileAssets any past amounts will survive any expiration or termination of this Agreement.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
No differences between Desktop and Laptop/Tablet services.
Mobile software is intended to be used for Asset and Condition Surveys, Structures Inspections, Maintenance Tasks.
Service interface
What users can and can't do using the API
AgileAssets API enables new and smarter business processes by integrating your asset management system with other enterprise systems. Our API is based on the REST architecture—an easier, more efficient mechanism to use than XML-based protocols such as RPC or SOAP. With AgileAssets API, you can:

• Link Multiple Systems - Integrate third-party applications and web services with the AgileAssets software platform to unify workflows and improve operations.

• Incorporate External Data - Extend the reach of data-collection tools and bring external data into decision-making and financial planning.

• Expand System Functionality - Develop next-generation applications for the web, mobile devices, and desktop computers to support continuous innovation.

• Create Custom Applications - Meet your agency’s specific needs by creating custom applications. For example, link your maintenance management system with your snowplow monitoring system to integrate workflows.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
System Administrators can add fields, create custom calculations, customize feature windows, and create/modify reports.


Independence of resources
AgileAssets have in place its own internal procedures to ensure users are not affected by demand by other users. Using industry standard tools, AgileAssets are able to closely monitor activity across all of its services and load balance where appropriate.


Service usage metrics
Metrics types
Percentage availability, outages, scheduled maintenance, number of licenses consumed
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The Export Data command is available in windows or panes that show tabular data. It allows you to select what table columns and records you wish to export and then save the data to a file outside of the system. The data may be saved as a comma-separated text (.csv) file; an HTML file; a Microsoft Excel (.xls or .xlsx) file; a DBF file; a Google Earth KML file; or a Shape file. (If the Shape type is selected, the application generates a zip archive with .shp, .shx, .dbf and .prj files.)
Data export formats
  • CSV
  • Other
Other data export formats
  • Html
  • Xls
  • DBF
  • KML
  • Shape file
Data import formats
  • CSV
  • Other
Other data import formats
  • Xlsx
  • DBF
  • Shape Files
  • KLM

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
AgileAssets warrants at least 99% System Availability during each calendar month. If the System Availability is less than 99%, and if Customer has fulfilled all of its obligations under the Agreement including this Exhibit, AgileAssets will provide Customer with a Service Credit applied to the month in which the failure to meet this Service Level Agreement has occurred.
% of System Availability per Calendar Month Service Credit
< 99% 2%
< 98% 4%
< 97% 6%
Approach to resilience
Available on request
Outage reporting
Email Alerts
Public and Private Dashboards

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
AD user groups.
Security model built into AgileAssets software.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
EY CertifyPoint
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
If requested by Customer, AgileAssets will cooperate with Customer in an initial security assessment, including the completion of a risk assessment questionnaire. In addition, AgileAssets will provide Customer with SSAE16 Reviews from the third party data center providers utilized in the provision of the Services as well as with the results of the penetration testing which AgileAssets has periodically performed by qualified third party security consultants.
Information security policies and processes
AgileAssets policies and control framework are aligned with the ISO 27001 Information Security Program Management Standards. This includes pragmatic policies, procedures, standards and guidelines to support the information security requirements, with a focus on the most critical assets. This enables us to maximize efficiency and effectiveness by leveraging a common set of controls and policies to comply with many regulations.
AgileAssets information security policy framework includes documented policies, procedures, standards and guidelines to support our relevant information security requirements.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
AgileAssets applies a SCRUM agile development methodology to its configuration and change management processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Security Management Team meet on a monthly basis to review detection methods, and our response to any security issues. AgileAssets clients are notified within 24 hours of any security issues being detected. This shall also include a description of the corrective action needed and details of where this needs to be performed by AgileAssets or the client. Systems are continually monitored 24 hours a day for potential security incidents and we use technology which compares logs from various sources, including on customer end points to provide a full vision of the current status.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
AgileAssets recommends that all desktop machines have antivirus protection installed and updated and providing real time monitoring on potential threats. At the network level, the traffic are regulated through firewall. We also have IDS which analysis traffic and whenever a potential attack is identified an automatic ticket is raised under security incident queue and get resolved based on the severity. The responses are provided based on the severity level.
Incident management type
Supplier-defined controls
Incident management approach
Multiple IDS devices are situated in the perimeter of the network which continuously monitor the inbound and outbound traffic. A 24x7 team monitors these incidents and provide real time solution. Timely escalations make sure all incidents are worked on priority and necessary patching or fixes are done following the change management process.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£4,000 to £4,000 a user a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.