Bentley Systems (UK) Limited

ProjectWise CONNECT Edition

ProjectWise CONNECT Edition extends beyond design coordination to enable comprehensive BIM compliant work-sharing, empowering project teams to collaborate throughout the project delivery lifecycle.
Manage content from design applications including MicroStation, Autodesk AutoCAD, Civil3D, Revit and numerous other file types used in the planning, design, and execution of an infrastructure project.


  • Project Collaboration
  • BIM Compliant to BS1192/ISO 19650
  • Remote Access
  • Cloud Deployed with 99.9% Service Availability
  • Design Work-sharing and Review
  • Content Publishing
  • Transmittal/Submittal workflows via Deliverables Management
  • BIM Review for office-field-site collaboration
  • Project Insights via interactive Dashboards and Key Performance Indicators


  • Enable easy collaboration to Project Stakeholders and wider supply chain
  • Common Data Environment for engineering content and project documentation
  • High performance access to project content for distributed Project Teams
  • Managed service providing 24x7 Global access and 99.9% SLA
  • Manage, publish, and review project content from multiple devices
  • Support both organisational and client standards
  • Manage office-site-field workflows in real-time collaboration
  • Automate manual workflows to streamline collaboration
  • Improve project quality, reduce project rework, and meet project deadlines
  • Secure, scalable cloud service delivered from Microsoft Azure data centres


£7875 per instance per quarter

Service documents


G-Cloud 11

Service ID

6 3 7 6 0 5 3 1 3 1 0 2 8 3 1


Bentley Systems (UK) Limited

Simon Horsley


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Bentley's offering such as:
- Connected Data Environment (CDE);
- AssetWise CONNECT Edition;
- ProjectWise CONNECT Edition - Lot 3
- Success Plans
- Transportation CDE (T-CDE)
- MicroStation;
- AECOsim Building Designer;
- Structural Modeller;
- OpenRoads;
- OpenRail;
and other.
Cloud deployment model
Public cloud
Service constraints
Patching and maintenance windows are scheduled every month to ensure the security and reliability of the service. A notice will be provided and some service disruption may occur during these out-of-hours windows.
System requirements
All requirements covered with the offered service

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are covered by an SLA and are based on priority.
P1 - Availability Support 24x7 - Response 1 hour - Resolution "Worked continuously until resolved" - Update Interval - 1 hour
P2 - Availability Support 24x5 - Response 2 Business Hours - Resolution 1 Business Day – Update Interval 4 hours
P3 - Availability Support 24x5 - Response 4 Business Hours - Resolution 10 Business Days - Update Interval 1 Business Day
P4 - Availability Support 24x5 - Response 8 Business Hours - Resolution Mutually Agreed - Update Interval Mutually Agreed
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
A standard SLA is Included with the subscription providing 24x7 uptime, support, RPO and RTO and product upgrades.
Bentley offers a Success Plan which is a tailored offering to achieve your ever-evolving desired business outcomes by advancing your digital workflows using Bentley applications. With this plan you also get a designated Success Manager to act as your single point of contact for the execution of the service and to assist you to overview the Prioritised Incident Support and Response to any issues that may arise.
Support available to third parties

Onboarding and offboarding

Getting started
After the cloud service is enabled Bentley will engage with the users (stakeholders, representatives from various departments) to define configuration details. Once the system is finally configured, Bentley will perform on-site or remote training sessions for each group/role. There are options to share videos, training material, prepare custom training material.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
Upon termination of the Service, Bentley will deactivate any remaining Subscriber accounts and upon written request provide an export of Subscriber’s data in a standard, generally accepted electronic form within ten (10) business days, and places no restrictions on its use by the Subscriber. Unless otherwise requested, Bentley will delete all copies of Subscriber’s data from its servers within two (2) weeks of being notified that the Subscriber has successfully read the files, or within four (4) weeks of the data being provided if no confirmation or associated Service Request is received.  
Note: it may take up to an additional 30 days for back-ups of that data to expire.
End-of-contract process
Upon termination of your ProjectWise Subscription, Bentley will deactivate any remaining user accounts and provide an export of the Subscriber’s data as stated above. Unless otherwise requested, Bentley will delete all copies of the Subscriber’s data from its servers within two (2) weeks of being notified that the Subscriber has successfully read the files, or within four (4) weeks of the data being provided if no confirmation or associated Service Request is received.  
If required, Bentley can provide Professional Services to assist in the migration of the data to a new service provider for an additional fee which will be determined based on the scope of requirements.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
Following general IT rules, in a Windows install situation, full thick client installation has better options to integrate with the operating system. Mobile technology still limits functionality in comparison to a desktop service.
Service interface
Description of service interface
ProjectWise does not have specific accessibility tunings built-in but uses what comes with the operating system the client system is using.
Accessibility standards
None or don’t know
Description of accessibility
ProjectWise does not have specific accessibility tunings built-in but uses what comes with the operating system the client system is using.
Accessibility testing
No specific interface testing with users of assistive technology has been done.
What users can and can't do using the API
The ProjectWise SDK/API gives full access to all of the system's capabilities. All our delivered clients are using the same API calls.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The ProjectWise SDK/API gives full access to all of the system's capabilities. All our delivered clients are using the same API calls and PowerShell scripting.


Independence of resources
Systems are logically separated in a virtual cloud environment. All systems are monitored in real time for performance and availability.


Service usage metrics
Metrics types
Usage via Bentley's licensing server can be self-reported. In addition, hosted systems will provide a quarterly feature usage report. Feature usage reports include up to 60+ features but based on usage of those features. A real-time dashboard for user usage is provided while feature usage reports are emailed quarterly.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The system has multiple options to export data ranging from simply copying out, via an MS Excel export function or even automated. Which option is most appropriate depends on the purpose of the export.
Data export formats
  • CSV
  • Other
Other data export formats
All native formats including or excluding metadata
Data import formats
  • CSV
  • Other
Other data import formats
  • No limit as to the format type to be uploaded
  • Multiple options to import data, mostly based on excel import
  • Also direct 3rd party connection is supported

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9%, assured by contractual commitment. Service credits when service availability drops below SLA level in a month.
Approach to resilience
All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service.
Outage reporting
99.9% assured by contractual commitment. Service credits when service availability drops below the SLA level in a month.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Multi-factor authentication used for administrative access
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All aspects of the service are covered. The certified scope is available at
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information Security policies are designed utilising the ISO 27001:2013 framework.  Policies are reviewed and audited by a 3rd party on an annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Active IDS and numerous other third-party security tools operational on the network perimeter and selected systems under the scope for ISO 27001 and SOC2 certifications. Compromises are analysed and put through the incident management process for investigation. Response time depends on the severity of the compromise.
Incident management type
Supplier-defined controls
Incident management approach
Incident management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£7875 per instance per quarter
Discount for educational organisations
Free trial available
Description of free trial
A test environment can be provided to test the main software features. This environment uses disposable data and is available for up-to 10 days free-of-charge (subject to agreement).
Alternatively, Bentley can provide a chargeable Pilot solution using user data which is run against agreed success criteria for 60-90 days.
Link to free trial
Access to the test environment will be setup to meet the requirements of each user.

Service documents

Return to top ↑