ProjectWise CONNECT Edition
ProjectWise CONNECT Edition extends beyond design coordination to enable comprehensive BIM compliant work-sharing, empowering project teams to collaborate throughout the project delivery lifecycle.
Manage content from design applications including MicroStation, Autodesk AutoCAD, Civil3D, Revit and numerous other file types used in the planning, design, and execution of an infrastructure project.
Features
- Project Collaboration
- BIM Compliant to BS1192/ISO 19650
- Remote Access
- Cloud Deployed with 99.9% Service Availability
- Design Work-sharing and Review
- Content Publishing
- Transmittal/Submittal workflows via Deliverables Management
- BIM Review for office-field-site collaboration
- Project Insights via interactive Dashboards and Key Performance Indicators
Benefits
- Enable easy collaboration to Project Stakeholders and wider supply chain
- Common Data Environment for engineering content and project documentation
- High performance access to project content for distributed Project Teams
- Managed service providing 24x7 Global access and 99.9% SLA
- Manage, publish, and review project content from multiple devices
- Support both organisational and client standards
- Manage office-site-field workflows in real-time collaboration
- Automate manual workflows to streamline collaboration
- Improve project quality, reduce project rework, and meet project deadlines
- Secure, scalable cloud service delivered from Microsoft Azure data centres
Pricing
£7875 per instance per quarter
- Education pricing available
Service documents
Framework
G-Cloud 11
Service ID
637605313102831
Contact
Service scope
Software add-on or extension | Yes, but can also be used as a standalone service |
What software services is the service an extension to |
Bentley's offering such as: - Connected Data Environment (CDE); - AssetWise CONNECT Edition; - ProjectWise CONNECT Edition - Lot 3 - Success Plans - Transportation CDE (T-CDE) - MicroStation; - AECOsim Building Designer; - Structural Modeller; - OpenRoads; - OpenRail; and other. |
Cloud deployment model | Public cloud |
Service constraints | Patching and maintenance windows are scheduled every month to ensure the security and reliability of the service. A notice will be provided and some service disruption may occur during these out-of-hours windows. |
System requirements | All requirements covered with the offered service |
User support
Email or online ticketing support | Email or online ticketing |
Support response times |
Response times are covered by an SLA and are based on priority. P1 - Availability Support 24x7 - Response 1 hour - Resolution "Worked continuously until resolved" - Update Interval - 1 hour P2 - Availability Support 24x5 - Response 2 Business Hours - Resolution 1 Business Day – Update Interval 4 hours P3 - Availability Support 24x5 - Response 4 Business Hours - Resolution 10 Business Days - Update Interval 1 Business Day P4 - Availability Support 24x5 - Response 8 Business Hours - Resolution Mutually Agreed - Update Interval Mutually Agreed |
User can manage status and priority of support tickets | Yes |
Online ticketing support accessibility | None or don’t know |
Phone support | Yes |
Phone support availability | 24 hours, 7 days a week |
Web chat support | No |
Onsite support | Yes, at extra cost |
Support levels |
A standard SLA is Included with the subscription providing 24x7 uptime, support, RPO and RTO and product upgrades. Bentley offers a Success Plan which is a tailored offering to achieve your ever-evolving desired business outcomes by advancing your digital workflows using Bentley applications. With this plan you also get a designated Success Manager to act as your single point of contact for the execution of the service and to assist you to overview the Prioritised Incident Support and Response to any issues that may arise. |
Support available to third parties | Yes |
Onboarding and offboarding
Getting started | After the cloud service is enabled Bentley will engage with the users (stakeholders, representatives from various departments) to define configuration details. Once the system is finally configured, Bentley will perform on-site or remote training sessions for each group/role. There are options to share videos, training material, prepare custom training material. |
Service documentation | Yes |
Documentation formats |
|
Other documentation formats | CHM |
End-of-contract data extraction |
Upon termination of the Service, Bentley will deactivate any remaining Subscriber accounts and upon written request provide an export of Subscriber’s data in a standard, generally accepted electronic form within ten (10) business days, and places no restrictions on its use by the Subscriber. Unless otherwise requested, Bentley will delete all copies of Subscriber’s data from its servers within two (2) weeks of being notified that the Subscriber has successfully read the files, or within four (4) weeks of the data being provided if no confirmation or associated Service Request is received. Note: it may take up to an additional 30 days for back-ups of that data to expire. |
End-of-contract process |
Upon termination of your ProjectWise Subscription, Bentley will deactivate any remaining user accounts and provide an export of the Subscriber’s data as stated above. Unless otherwise requested, Bentley will delete all copies of the Subscriber’s data from its servers within two (2) weeks of being notified that the Subscriber has successfully read the files, or within four (4) weeks of the data being provided if no confirmation or associated Service Request is received. If required, Bentley can provide Professional Services to assist in the migration of the data to a new service provider for an additional fee which will be determined based on the scope of requirements. |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | Yes |
Compatible operating systems |
|
Designed for use on mobile devices | Yes |
Differences between the mobile and desktop service | Following general IT rules, in a Windows install situation, full thick client installation has better options to integrate with the operating system. Mobile technology still limits functionality in comparison to a desktop service. |
Accessibility standards | None or don’t know |
Description of accessibility | ProjectWise does not have specific accessibility tunings built-in but uses what comes with the operating system the client system is using. |
Accessibility testing | No specific interface testing with users of assistive technology has been done. |
API | Yes |
What users can and can't do using the API | The ProjectWise SDK/API gives full access to all of the system's capabilities. All our delivered clients are using the same API calls. |
API documentation | Yes |
API documentation formats | Other |
API sandbox or test environment | Yes |
Customisation available | Yes |
Description of customisation | The ProjectWise SDK/API gives full access to all of the system's capabilities. All our delivered clients are using the same API calls and PowerShell scripting. |
Scaling
Independence of resources | Systems are logically separated in a virtual cloud environment. All systems are monitored in real time for performance and availability. |
Analytics
Service usage metrics | Yes |
Metrics types | Usage via Bentley's licensing server can be self-reported. In addition, hosted systems will provide a quarterly feature usage report. Feature usage reports include up to 60+ features but based on usage of those features. A real-time dashboard for user usage is provided while feature usage reports are emailed quarterly. |
Reporting types | Real-time dashboards |
Resellers
Supplier type | Not a reseller |
Staff security
Staff security clearance | Other security clearance |
Government security clearance | Up to Baseline Personnel Security Standard (BPSS) |
Asset protection
Knowledge of data storage and processing locations | Yes |
Data storage and processing locations |
|
User control over data storage and processing locations | Yes |
Datacentre security standards | Complies with a recognised standard (for example CSA CCM version 3.0) |
Penetration testing frequency | At least once a year |
Penetration testing approach | Another external penetration testing organisation |
Protecting data at rest |
|
Data sanitisation process | Yes |
Data sanitisation type | Deleted data can’t be directly accessed |
Equipment disposal approach | Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001 |
Data importing and exporting
Data export approach | The system has multiple options to export data ranging from simply copying out, via an MS Excel export function or even automated. Which option is most appropriate depends on the purpose of the export. |
Data export formats |
|
Other data export formats | All native formats including or excluding metadata |
Data import formats |
|
Other data import formats |
|
Data-in-transit protection
Data protection between buyer and supplier networks | TLS (version 1.2 or above) |
Data protection within supplier network | TLS (version 1.2 or above) |
Availability and resilience
Guaranteed availability | 99.9%, assured by contractual commitment. Service credits when service availability drops below SLA level in a month. |
Approach to resilience | All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service. |
Outage reporting | 99.9% assured by contractual commitment. Service credits when service availability drops below the SLA level in a month. |
Identity and authentication
User authentication needed | Yes |
User authentication |
|
Access restrictions in management interfaces and support channels | Multi-factor authentication used for administrative access |
Access restriction testing frequency | At least once a year |
Management access authentication | 2-factor authentication |
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | At least 12 months |
Access to supplier activity audit information | Users contact the support team to get audit information |
How long supplier audit data is stored for | At least 12 months |
How long system logs are stored for | At least 12 months |
Standards and certifications
ISO/IEC 27001 certification | Yes |
Who accredited the ISO/IEC 27001 | A-Lign |
ISO/IEC 27001 accreditation date | 12/10/2018 |
What the ISO/IEC 27001 doesn’t cover | All aspects of the service are covered. The certified scope is available at https://www.bentley.com/en/trust-center |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | No |
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | ISO/IEC 27001 |
Information security policies and processes | Information Security policies are designed utilising the ISO 27001:2013 framework. Policies are reviewed and audited by a 3rd party on an annual basis. |
Operational security
Configuration and change management standard | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Configuration and change management approach | Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production. |
Vulnerability management type | Supplier-defined controls |
Vulnerability management approach | Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality. |
Protective monitoring type | Supplier-defined controls |
Protective monitoring approach | Active IDS and numerous other third-party security tools operational on the network perimeter and selected systems under the scope for ISO 27001 and SOC2 certifications. Compromises are analysed and put through the incident management process for investigation. Response time depends on the severity of the compromise. |
Incident management type | Supplier-defined controls |
Incident management approach | Incident management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure. |
Secure development
Approach to secure software development best practice | Supplier-defined process |
Public sector networks
Connection to public sector networks | No |
Pricing
Price | £7875 per instance per quarter |
Discount for educational organisations | Yes |
Free trial available | Yes |
Description of free trial |
A test environment can be provided to test the main software features. This environment uses disposable data and is available for up-to 10 days free-of-charge (subject to agreement). Alternatively, Bentley can provide a chargeable Pilot solution using user data which is run against agreed success criteria for 60-90 days. |
Link to free trial | Access to the test environment will be setup to meet the requirements of each user. |