With BIMPress Explorer, users can work with their Building & Asset Information Models to collaborate on and answer questions around the design, construction and operation of their built assets. A cloud-based integrated 3D viewer, flexible querying and powerful audit trails allow teams of people to easily collaborate around asset data.
- Cloud-based querying and reporting on data in Building Information Models
- Integrated 3D visualisation of real-world Building & Asset Models
- Collaborative management / updating of building information & data
- Real-time collaboration across organisations and supply chain
- Role-based access controls
- Managing 'as-built' asset data and properties during asset lifecycle
- Full version control and audit trails
- Import & Export of IFC and COBie format files
- Real-time Integration with Microsoft Excel
- Integrated GIS with geometry support
- Simplifies understanding, updating and maintaining building & asset data
- Maintain, cleanse and curate data about your asset portfolio
- Securely access asset data from any connected device 24x7
- Gain real-time insights into data about your assets
- Visualise 3D models with integral data using just a browser
- Fully managed service - no software or hardware to deploy
- Easily control how building data can be accessed / handled
- Manage building data without specialist CAD / BIM software
- Automate manual processes for checking asset data
- Maintain Asset records over the whole asset lifecycle
£150 per licence per month
- Education pricing available
- Free trial available
7 3 2 1 4 8 9 4 4 2 6 6 7 9 6
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||BIMPress Explorer is an application that runs on our BIMPress platform. Licences to use the platform are included with the Explorer service|
|Cloud deployment model||
|Service constraints||Only limited by Microsoft Azure services available in the chosen hosting location.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Priority 1: Respond on receipt, but always within one hour
Priority 2: Within 2 hours
Priority 3: Within 4 hours
Priority 4: With one working day
Support hours: 9 to 5 (UK time), Monday to Friday
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Licence fees include telephone and helpdesk support for all users licenced.
Users will have access to the support team via telephone and email helpdesk.
The support telephone and email help desk is available Monday to Friday inclusive from 09:00 to 17:00 UK hours, excluding UK bank holidays.
Helpdesk requests will be assigned one of the priorities below on each request
• Priority 1: Full Service Outage: a business-critical feature of the Service is unavailable to all users, meaning users are unable to access the service.
• Priority 2: Degraded Service: an important feature of the Service is unavailable to all users, however other areas of the system remain operational
• Priority 3: a feature of the Service is unavailable to one or more users. A workaround may be available
• Priority 4: a feature of the Service is either not performing as it should, or is unavailable, but causing minimal business impact.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We host online training material, including videos and user documentation. We can provide onsite or remote training for users as an additional service.|
|End-of-contract data extraction||
Authorised users can download asset and model data from the application in the following formats:
- Original BIM models in IFC format
- All native documents in their original format
- Entity registers in Excel format
- Asset Data in COBie Excel format
Data can also be extracted via the API.
An archive of a customer's asset data can be produced on request
|End-of-contract process||At the end of the contract, the service becomes read-only for 90 days, during which time it is possible for users with admin roles to extract data. After this period the data is permanently deleted from the system.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Due to more limited screen sizes on mobile devices interface is re-arranged on some devices.|
|What users can and can't do using the API||
The API permits users to undertake all data operations that can be achieved in the application. That includes, importing models, querying all model entities and properties, obtaining geometry, editing & creating data & interrogating audit trails.
The API can be evaluated through a Swagger interface. Setting up a new service requires a unique client ID obtained during registration of an application.
Fair usage limits apply on the API. Limits can be extended through a separate commercial agreement.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
Custom URLs domains
|Independence of resources||
Each customer has dedicated database and storage accounts provisioned, which are automatically and independently monitored and scaled based on utilisation.
Additional Application Servers are automatically provisioned once utilisation reaches a threshold.
'Model Import/Processing' utilises a 'serverless infrastructure' which provisions more computer power as required.
A fair-use 'back-off' system in the API prevents excessive usage from a user from monopolising resources that would affect others.
Additional measures are in place to address DDoS type attacks.
|Service usage metrics||Yes|
User session activity & page visits
Server uptime & performance
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||In built export functionality for files and data. The API can also be used to export data in a variety of formats.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||99.9% guaranteed uptime|
|Approach to resilience||
The BIMPress platform is entirely hosted in Microsoft Azure UK datacenters, using the Azure 'Platform as a Service' components for Storage, Database and Compute.
This means management of individual server and networking infrastructure is undertaken by Microsoft Engineers & systems. Service redundancy is built into the platform, and individual component / service failures are managed and resolved as part of the Microsoft Azure 'Service Fabric'.
The application service is designed to automatically scale out and fail over to new instances in event of failure of a component/sub-system.
All data is automatically replicated between two separate locations in the UK in real-time using Geographically Redundant Storage
Full backups are taken daily with incremental backups every 10 minutes. Backups are stored in 3 logically & geographically separate locations.
In the event of a major outage in the primary data-center region, the data will always be available from a geographically separate secondary region.
|Outage reporting||We provide a service dashboard where the status of our services can be checked.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
BIMPress platform utilises Role-Based Access Control (RBAC) for all users which controls access to management functionality and data at the Account, Asset and Model levels.
Access to service management & support interfaces is limited to key administrative personnel based on a 'least privilege' approach to access rights. There are no 'shared' administration accounts and all Administrative access and changes are audited against the individual.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users receive audit information on a regular basis|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We have internal policies that align with the ISO27001 ISMS standards, covering the Confidentiality, Integrity and Availability of our information systems and services.|
|Information security policies and processes||The BIMPress Information Security Management System is based on ISO 27001 security policies. Our management team monitors the overall performance of the security management system and all dependent policies, processes, risks, and associated controls.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes are tracked through industry standard change tracking and version control systems. Change requests are risk reviewed before any work commences. All code, infrastructure and configuration changes go through a combination of peer review and automated tests before promotion through multiple quality gates to production.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We actively maintain a threat model of the service to help identify potential weak points in the service that could be targeted by threat actors, and to ensure mitigations are appropriate.
Platform level patches are managed by Microsoft Azure as per https://docs.microsoft.com/en-us/azure/app-service/app-service-patch-os-runtime
Application and Configuration patches are deployed via out automated deployment system, after regression testing in a staging environment.
We subscribe to the Azure Security blog, and the Securities Advisories Alerts service to keep on top of active new threats.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We have a layered approach to intrusion detection, enabling us to monitor & trace unusual activity at the infrastructure, application and network levels. This is based on auditing and alerting rules defined in the Azure infrastructure and logging/analytics within our application/service, as well as alerts from the Azure Security Center.
In addition to ad hoc inspections of logs and audit trails, operators are alerted 24x7 if unusual activity is detected, whereupon the incident will be triaged for severity & priority to ensure the appropriate timely response.
|Incident management type||Supplier-defined controls|
|Incident management approach||We follow an ISO27001 approach to incident management. Incidents are recorded, triaged and remediated based on their impact. Root cause analysis if performed on incidents, and can be provided on request|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£150 per licence per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
A free self-service trial version is available. This includes all core functionality with the following limitations:
- Up to 3 users
- Limited to 1 Asset
- 500 MB of storage
- 60 days of history
No time limit but inactive accounts will be deleted after 9 months