Atkins Limited

Asset Decision Support Tools

Successfully manage your Transport Assets utilising these Decision Support Tools. Use industry standard or configurable logic to model how your assets will perform in various scenarios. Create Works Programmes, Scenario Comparisons, Interactive Reports, Condition and Risk Profiles through dynamic and intuitive web-based software, improving your Asset Management outcomes.


  • Lifecycle Planning – Plan maintenance for lifecycle and Whole-Life Costing
  • Multiple Asset Types – Structures, Pavements, Lighting, Drainage, Ancillary Assets
  • Condition/Risk Reporting – Model current and predicted condition and risk
  • Asset Inventory – Store and view data on assets securely
  • Data Visualisation – View data on maps and interactive dashboards
  • Works Programming – Develop, analyse and adjust forward works programmes


  • Understand your assets and their current and future performance
  • Support from Industry-Leading Asset Management Experts and Engineers
  • Analyse and compare long term strategies for maintenance
  • Make the case for protecting budgets or increasing funding
  • Prioritise works in line with Asset Management Strategy and Practices
  • Communicate effectively with stakeholders through intelligent and interactive dashboards
  • High performance analytical engine that provides rapid and accurate answers
  • Multi-Asset approach facilitates coordinated decision making across organisations
  • Secure Data Storage with role and user-based authentication
  • Supports optimal decision making, allowing engineers to plan efficient schemes


£1000 per user per year

Service documents

G-Cloud 10


Atkins Limited

Jonny Hope

+44 1372 75 2633

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements
  • A modern, standards compliant web browser
  • Internet access

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times 1 Business Day: Our dedicated Technical Support team supports external customers, during contracted hours of support. Response times are to be set by a Service Level Agreement (SLA) but are typically aligned to the following incident priority levels:
A - Critical, respond in 2 working hours providing circumvention instructions where possible or fix.
B - Major, respond in 4 working hours details as per priority A.
C&D - Functional or intermittent Incident, respond in 8 working hours details as per priority A. Classification details are available for each Priority.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard Support - available during 09:00 – 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, Incidents may be logged via email or the web outside of these hours, but they will not be progressed until the next working day. Software fixes will be progressed during these hours, and a release made available in line with the Customers Service Agreement. 7 days per week – see Standard Hours, the addition being able to log and receive responses to Incidents during the additional hours. Please note that we operate a Restoration of Service (RoS) approach to support on the additional days e.g. Saturday, Sunday and English public holidays – See below for RoS definition. 24/7 - see 7 days per week, the addition being able to log and receive responses on a 24/7 basis.
Restoration of Service (RoS) – during extended hours of support the aim is to get the Customer operational as soon as possible. Software fixes will not be provided during the additional hours of support. Incidents remain the responsibility of the Technical Support team throughout the life cycle.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Data restoration and migration are not part of this service by default. Both of these options can be purchased separately. Atkins is able to migrate existing client data into a new deployment. The price of this service is dependent upon the amount and variety of legacy data to be migrated and will be determined during a clarification exercise prior to the commissioning of any work.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction A standard database backup of the data will be made available to the client upon termination of the service.
End-of-contract process Once the contract has ended we will perform a full database backup of the “data” schema of the database. The database backup is provided as a SQL Server BAK file. The buyer can then take this database backup file and use it to restore the data to an alternative environment of their choosing. If required we can also provide the data in other standard formats, this will be an additional cost option for the buyer to choose at contract end. The cost will be determined by the export format required and the volume of data to be exported.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile application for viewing dashboards and reports only.
Accessibility standards WCAG 2.0 A
Accessibility testing The solution’s user interface is designed with accessibility in mind. With the exception of the mapping/GIS components where keyboard navigation is impractical, the user interface meets many of the Web Content Accessibility Guidelines (WCAG) 2.0 Level A and AA. We are committed to fully meet all WCAG Level A requirements during 2018.
Customisation available Yes
Description of customisation The software is pre-built to industry standards, however can be configured to the customer’s needs. The logic and assumptions within the tool can be altered by the user to model exactly as desired by the users. Multiple configuration sets can be saved.


Independence of resources We use a Private Cloud platform that has been designed to support scaling to suit the customer base. Each on-boarded customer’s needs are assessed and additional resources added to the platform at contract start as appropriate. Performance and capacity is monitored and adjusted as required to ensure appropriate levels of performance throughout the contract.


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Deighton

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data by using the in-built export function.
Data export formats
  • CSV
  • Other
Other data export formats
  • Microsoft Excel
  • ESRI Shapefile
Data import formats Other
Other data import formats
  • Microsoft Excel
  • Microsoft Access
  • Esri File Geodatabase
  • Esri Shapefile

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network Other
Other protection within supplier network DMZs in place to ensure separation between the web servers and backend application and database servers, plus separation between the Live and Dev environments.

Connections between the various servers are locked down to the necessary minimum. Centralised identification and authentication is required (e.g. Active Directory domain). Servers only have necessary server roles activated. Access to the servers for authorised Atkins staff is provided via a secure VPN.

Availability and resilience

Availability and resilience
Guaranteed availability Our service provides 99% uptime during the agreed hours of service.
Approach to resilience We utilise a Private Cloud environment built using the OnApp Cloud Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The system is deployed across a multi-node environment ensuring that node failures do not bring the system down, the cloud management platform continually balances load across nodes and moves running services across nodes when issues are detected.
Outage reporting Real-time server monitoring provides alerts to our Cloud providers when services have failed, these outages are then reported to our clients through the Technical Support helpdesk.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Users with administrative access are assigned an “Administrators” role. Only those users belonging to the “Administrators” role can access management interfaces.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Lloyd’s Register Quality Assurance Limited
ISO/IEC 27001 accreditation date 16 June 2010
What the ISO/IEC 27001 doesn’t cover This certificate covers the client bids and projects managed by the ADS&T division within Atkins UK&E sector, it excludes information handled within client specific secure environments that operate under more stringent security controls.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus (renewed annually)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Technical controls approved to ISO 27001 (Information Security Management Systems) have been implemented by Atkins Group Information Services (Group IS) across the Atkins group. The non-technical controls have or are being implemented by individual businesses, such as the Aerospace, Defence, Security and Technology (ADS&T) business and the Transportation business, respectively.
Information security policies and processes Atkins Aerospace, Defence, Security and Technology (ADS&T) holds ISO 27001 and all our UK businesses are independently certified as achieving the ISO 9001:2008 quality management standard. Atkins follows a Business Management System (BMS) approach that brings together all our business processes in one place. The BMS assures our clients through the certification of ISO 9001, OHSAS 18001 and ISO 14001, and forms a key part of the Atkins Governance Framework, which also includes our Group Policy Statements and Code of Conduct. BMS is key part of our governance process, translating the Group controls into a set of core processes that are applicable across the business.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our change management process is invoked whenever a change to the system is required. A change management plan is created, including identification of risks and associated mitigation. Changes are implemented and tested in a development environment first. Before installing in the live environment, a rollback plan is formulated and any required downtime agreed. The changes are installed in live environment and checks performed to ascertain the change was successful. Where problems arise the rollback plan is initiated to restore the system to its previous state.
Vulnerability management type Undisclosed
Vulnerability management approach None
Protective monitoring type Undisclosed
Protective monitoring approach Atkins shall provide 24 / 7 / 365 monitoring of service availability and performance plus threshold monitoring to ensure potential problems are detected and addressed before they become critical.
Incident management type Supplier-defined controls
Incident management approach Severity1 - Constitutes Service loss, preventing system usage; Critically impacts activities of Authority that depend system use; Causes corruption of Authority Data.
Severity2 - Prevents operation of particular sub-system; Could potentially adversely (majorly) impact Authority activities that depend on system use. No workaround available; Cause disruption to Authority - more than trivial but less severe Severity1
Severity3 - Reproducible, has adverse impact on the activities of Authority. Can be reduced to moderate adverse impact, if workaround available.
Severity4 - Intermittent/ non-reproducible. Minor impact on End user service provision.
Severity5 - Cosmetic flaw. Doesn’t undermine End User's confidence in displayed information.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1000 per user per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑