SYNCHRO Workgroup Project
SYNCHRO Workgroup Project is a cloud service designed to coordinate access to SYNCHRO project data within group environments. SYNCHRO Workgroup Project allows multiple users to work on the same data at the same time from SYNCHRO PRO, OpenViewer, Scheduler, SITE, Hololens (both via LINK API) and other 3rd party applications
Features
- Allow multiple users to connect concurrently to the database server
- Obtain latest project data while processing is performed in SYNCHROPRO
- Representation of Digital Models
- Construction BIM Modelling
Benefits
- Allow multiple users to connect concurrently to the database server
- Obtain latest project data while processing is performed in SYNCHROPRO
- Grant access and permissions per company/role/user easily established from SYNCHROPRO
- Enable access to model from multiple mobile clients (iPad, HoloLens)
- Support field-based workflows
- Representation of Digital Model
- Construction BIM Modelling
Pricing
£5,650 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
5 3 8 1 9 0 7 7 1 3 5 0 1 6 6
Contact
Bentley Systems (UK) Limited
Andy Bowles
Telephone: +44 7919 892183
Email: andy.bowles@bentley.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- SYNCHRO PRO
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
- All requirements covered with the offered service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA is within 24 hours on business days. Weekends not included
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support sent to 1 repository, support escalated through tiers.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- SYNCHRO Workgroup Project include one full day of technical set up support and online best practices training for SWP/SITE integration and access to SYNCHRO Academy online training
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- CHM
- End-of-contract data extraction
- Download .sp file as local file available to use open Synchro PRO
- End-of-contract process
- Download .sp file as local file available to use open Synchro PRO
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- Description of service interface
- Synchro Portal used for management of SWP and projects hosted through Bentley on Azure.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The portal allows client admins to manage their projects by adding/deleting projects; changing the name of a project; deploying an .sp file to the project; managing team members who have access to the project on the portal; view the status of the VM hosting the project; retrieve connection details, download .sp file of the project; set start ond stop time of the VM, backup and migrate project.
- Accessibility testing
- No specific interface testing with users of assistive technology has been done.
- API
- Yes
- What users can and can't do using the API
- The SYNCHRO LINK API can connect to other systems, and get and put data
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- SYNCHRO Workgroup Project delivers the LINK API which can be used to connect to external data repositories
Scaling
- Independence of resources
- Systems are logically separated in a virtual cloud environment. All systems are monitored in real-time for performance and availability.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Dedicated function from within SYNCHRO PRO
- Data export formats
- Other
- Other data export formats
-
- SP
- DWF
- DXF
- FBX
- DAE
- HSF
- Data import formats
- Other
- Other data import formats
- More than 25 standard CAD\CAM\BIM file formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- No formal SLA
- Approach to resilience
- All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service.
- Outage reporting
- Planned and unplanned outage notification emails are sent to registered users for affected systems.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User Name or Password
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Information Security policies are designed utilising ISO 27001, SSAE16, ITIL and CSA frameworks. Several SaaS offerings are ISO 27001 certified and others are SOC2 certified.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Active IDS is active on the network perimeter and on selected systems under the scope for ISO 27001 and SOC2 certifications. Compromises are analysed and put through the incident management process for investigation. The response time depends on the severity of the compromise.
- Incident management type
- Supplier-defined controls
- Incident management approach
- The Incident Management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £5,650 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
A test environment can be provided to test the main software features. This environment uses disposable data and is available for up-to 10 days free-of-charge (subject to agreement).
Alternatively, Bentley can provide a chargeable Pilot solution using user data which is run against agreed success criteria for 60-90 days. - Link to free trial
- Access to the test environment will be setup to meet the requirements of each user.