arbnco Ltd

arbn insight - turning energy data into actionable insights

arbn insight allows users to upload energy bill or half-hourly data across an entire commercial portfolio. Instantly benchmarking for performance comparison, the platform generates specific recommendations for savings at each property and provides the means to monitor progress against baseline performance.


  • Commercial property energy consumption ranking
  • Energy consumption analytics
  • Energy Conservation Measures
  • Automated dis-aggregation into heating loads, lighting and small power
  • Consumption modelling by time of use and wastage calculation
  • Benchmarking and screening across portfolio
  • Monitoring and tracking of spend
  • Register saving measures implemented
  • Track and calculate ongoing savings
  • System report on each property with detailed results


  • Manage energy bill cost and consumption
  • Track consumption over time
  • Measure the impact of improvement projects
  • Easily identify energy wasted and savings opportunities
  • Scope net-zero carbon projects across commercial portfolio
  • Benchmark performance across all properties
  • Support behavioural change programme for carbon savings
  • Report carbon and energy status across portfolio
  • Screen and compare properties for priority action
  • Identify wastage against operating hours


£40 to £85 a unit a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 8 2 9 7 4 0 9 7 2 0 6 1 2 1


arbnco Ltd Stephen Preece
Telephone: 07377665536

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
The platform is designed to accept energy bill data in whatever form - monthly cost, daily, hourly or half hourly consumption.
System requirements
No specific system requirements and browsers are listed later.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We would typically respond on the same day to issues raised, however this would not apply at weekends.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We have UK based sales and software staff who will be available to support any customer enquiries raised.
Support available to third parties

Onboarding and offboarding

Getting started
Users will need to contact us for registration details and licence arrangements.
They will receive a welcome mail once registered with links to our training material and video content, as well as contact details for our sales and support staff.
Service documentation
Documentation formats
End-of-contract data extraction
By request from any user, we would remove their data from our system at the end of contract and confirm this to them by e-mail.
End-of-contract process
The licence is structured by number of buildings for a year. This will allow the user to upload as many data files as relevant to the building for the year, and to access the analysis and reporting tools whenever they require during the year.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Service interface
Customisation available


Independence of resources
Being based in the cloud, it’s easy for us to scale our resources so we can meet our user’s demand via the cloud load balancing.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The various reports can be exported in pdf format.
Data export formats
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats
Excel spreadsheet

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We are not in a position to offer specific SLAs for availability
Approach to resilience
This information can be made available on request.
Outage reporting
We do not report outages at the moment.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access in our service can be restricted through the use of three different user roles – admin, manager, and regular user. Admin users would be our own internal staff, while our customers can act as managers and regular users.

Then, on third party solutions we use, management interfaces are only available for lead developers and managers.
Access restriction testing frequency
Less than once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Proactively, the cloud solutions used are able to provide data that enable analysis and detection of malfunction and threats our service may be subject to. Reactively, we also employ logging solutions that send alerts in real time when any malfunction is experienced. We thenrespond to these alerts, coordinating the development team, together with the Chief Technical Officer.
Information security policies and processes
Internal security policies aim to deliver data Integrity, Availability and Confidentiality.

Our service provides data integrity through automatic backups from both databases and file systems and also through automated sanity tests that happen periodically.

Availability is offered through a scalable database as a service which can be easily scaled and tweaked to serve more users.

Confidentiality comes hand in hand with our compliance with GDPR and the training of all internal staff on it.

Then, if a customer needs to report any issues, he has a clear support channel to do so. Meanwhile, if we detect security incidents, affected customers are directly reached by email.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Due to the very nature of the cloud operators we use as basis for our service, components are automatically tracked in regards of location and configuration. This comes hand in hand with source code versioning and automatic backups.

Then, changes to these components are first tested in either a local development environment or a staging server so that security can also be asserted and if any issues are detected they are fixed before reaching productions and, hence, our customers.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Potential threats to our services are assessed during a careful analysis conducted prior to any development and further testing routines prior to deployment. Security threatening patches can be applied in less than a day, while aesthetic issues can be fixed within a week. Information on threats are identified during testing routines and even through analysis of logs kept and statistics from cloud providers.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have never experienced any compromises; hence, this is not a formal process clearly defined for us yet. Currently, we would rely on a Security company identifying it and reporting that to us, such as it happens usually. Then, we would be prompt to act on immediate notice.
Incident management type
Supplier-defined controls
Incident management approach
We have defined processes for the most common incidents our users may experience. The sales and support teams have been trained to answer for the most typical issues experienced by our customers. Then, if needed they would contact development management to report anything that was not yet defined, so we can extend our processes further. Users are able to report incidents wither through tickets, by email, or simply contacting our landline directly. If we detect a user has been affected by any incident, that user would be directly contacted either by email or by phone.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£40 to £85 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
A limited feature version of arbn isight is available through our website for users to upload trial data and review baseline analytics.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.