Bentley Systems (UK) Limited

AssetWise CONNECT Edition Linear Analytics

Enables users to visualise and understand vast quantities of linear network data to identify trends and anomalies of linear assets such as road or rail networks. Dashboards provide users with instant access to data at any location on the network for timely and accurate maintenance decisions.


  • Linear Asset Decision Support
  • Data-driven interactive electric track charts
  • Linear Data Analysis
  • Linear Asset Condition Assessment and Visualisation
  • Data Cleaning and Alignment
  • Work Capital Planning
  • Monitoring Performance Metrics, Investment
  • Prioritisation, and Trend Analysis and Forecasting
  • Scripting Language supporting custom linear analytics
  • Near-real time processing of the data


  • Actionable information, enabling better decisions about linear assets
  • Improved decision making through controlled access to accurate trusted information
  • Enables automated compliance with industry/regulatory standards
  • Single source of truth for linear asset and related information
  • Easy to access in context all asset related Information
  • Reduce operational costs
  • Focused risk-based prioritisation of maintenance
  • Streamlined capital planning and operations
  • Improved overall service, safety, and reliability


£27,298.75 an instance a quarter

  • Free trial available

Service documents


G-Cloud 12

Service ID

7 1 3 8 2 0 3 3 3 2 0 1 1 8 9


Bentley Systems (UK) Limited Simon Horsley
Telephone: +447899852176

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
AssetWise Linear Analytics and forecasting can be integrated with other AssetWise modules and EAM systems, such as SAP, Maximo, Ellipse.
Cloud deployment model
Public cloud
Service constraints
Patching and maintenance windows are scheduled every month to ensure the security and reliability of the service. A notice will be provided and some service disruption may occur during these out-of-hours windows.
System requirements
HTML 5 compatible browser or Windows for desktop client

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are covered by an SLA and are based on priority. P1 - Availability Support 24x7 - Response 1 hour - Resolution Worked continuously until resolved - Update Interval - 1 hour P2 - Availability Support 24x5 - Response 2 Business Hours - Resolution 1 Business Day – Update Interval 4 hours P3 - Availability Support 24x5 - Response 4 Business Hours - Resolution 10 Business Days - Update Interval 1 Business Day P4 - Availability Support 24x5 - Response 8 Business Hours - Resolution Mutually Agreed - Update Interval Mutually Agreed
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
A standard SLA is included with the subscription providing 24x7 uptime, support, RPO and RTO and product upgrades. Bentley offers a Recurring Advancement Services Program which is a tailored offering to achieve your ever-evolving desired business outcomes by advancing your digital workflows using Bentley applications.
Support available to third parties

Onboarding and offboarding

Getting started
After the cloud service is enabled Bentley will engage with the users (stakeholders, representatives from various departments) to define configuration details. Once the system is finally configured, Bentley will perform on-site or remote training sessions for each group/role. There are options to share video, training material, and prepare custom training material.
Service documentation
Documentation formats
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
There are different ways to extract data depending on the volume of data to be extracted. It ranges from simple document check out, to using a bulk export utility or automated using SSIS packages.
End-of-contract process
Bentley reccommends engaging with us to get your data extracted before the contract ends. At a minimum, Bentley will provide the database and file repositories.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
The web client includes system administration and security tools, data import configuration tools and the data read only viewer. The desktop client offers enhanced data processing, analytics and visualisation.
Service interface
Description of service interface
Web-based interface access through a browser or a desktop client. The UI and built-in scripting language allows to read and write data and to make some configuration changes to the System. The data is presented as a single unified view. Users can set up and schedule a series of calculations and rules that operate on track network data to generate a wide variety of actionable results.
Accessibility standards
None or don’t know
Description of accessibility
User Interface or content elements are differentiated through more than just color, such that colorblind individuals can gain the intended meaning.
When using tab keys to navigate to form elements or links, there is a Focus state that shows what element the user is on.
Content does not include a “flash” or “strobe” effect that covers the screen and lasts longer than three seconds.
Text used in a hyperlink clearly describes what users might expect to find after clicking unless the content found is intended to be obfuscated.
User can navigate between form elements using the tab or arrow keys.
Accessibility testing
No specific interface testing with users of assistive technology has been done.
What users can and can't do using the API
Web service with REST API. All traffic uses TLS1.2 encryption with a certificate issued by a trusted Certificate Authority (DIgicert). The API allows to read and write data to the system. It also allows to make some configuration changes to the System.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The user interfaces and linear analytics are highly configurable and the configuration can be performed by the end users who have the required security permissions. AssetWise Linear Analytics has a library of more than 200 linear network-aware data processing rules and commands that can be applied to extract actionable information. These rules can find clusters of defects, trend track degradation to plan surfacing, filter spikes and flat lines from measurement data. These rules can be combined to perform sophisticated data analysis to extract more value from existing data.
Information is clearly presented in linear, schematic electronic track charts that can be built to the needs of a specific user to make asset, condition, and historical data comprehensible and exploitable for users across the enterprise. These track charts are data driven with real time updates providing users with the latest and most accurate data. Users can optionally modify what data is shown and how it is displayed.


Independence of resources
Systems are logically separated in a virtual cloud environment. All systems are monitored in real time for performance and availability.


Service usage metrics
Metrics types
Usage statistics are provided within a quarterly report. These reports include SLA statistics, including uptime and Service Request resolution.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The system has multiple options to export data ranging from simply copying out, via bulk export or even automated using SSIS packages. Which option is most appropriate depends on the purpose of the export.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • PNG
  • XML via configuration
Data import formats
  • CSV
  • Other
Other data import formats
Export from SHAPE files into CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9%, assured by contractual commitment. Service credits when service availability drops below SLA level in a month.
Approach to resilience
All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service.
Outage reporting
Planned and unplanned outage notification emails are sent to registered users for affected systems.

Identity and authentication

User authentication needed
User authentication
Other user authentication
Users authenticate against the Bentley Identity Management System (IMS) which is federated against the buyers own AD.
Access restrictions in management interfaces and support channels
Access to management features within the user interface is controlled by permissions within the application.
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
Access to management features within the user interface is controlled by permissions within the application.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All aspects of the service are covered. The certified scope is available at
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information Security policies are designed utilising the ISO 27001:2013 framework. Policies are reviewed and audited by a third party on an annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Numerous other third-party products such as Antivirus, Antimalware, IPS and EDR, operational on selected systems under the scope of ISO27001 and SOC2 certifications. Compromises are analysed and put through the incident management process for investigation. Response time depends on the severity of the compromise.
Incident management type
Supplier-defined controls
Incident management approach
The Incident Management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£27,298.75 an instance a quarter
Discount for educational organisations
Free trial available
Description of free trial
A test environment can be provided to test the main software features. This environment uses disposable data and is available for up to 30 days free-of-charge (subject to agreement).
Link to free trial
Access to the pilot/proof of concept environment will be setup to meet the requirements of each user.

Service documents