BIMPress Explorer

With BIMPress Explorer, users can work with their Building & Asset Information Models to collaborate on and answer questions around the design, construction and operation of their built assets. A cloud-based integrated 3D viewer, flexible querying and powerful audit trails allow teams of people to easily collaborate around asset data.


  • Cloud-based querying and reporting on data in Building Information Models
  • Integrated 3D visualisation of real-world Building & Asset Models
  • Collaborative management / updating of building information & data
  • Real-time collaboration across organisations and supply chain
  • Role-based access controls
  • Managing 'as-built' asset data and properties during asset lifecycle
  • Full version control and audit trails
  • Import & Export of IFC and COBie format files
  • Real-time Integration with Microsoft Excel
  • Integrated GIS with geometry support


  • Simplifies understanding, updating and maintaining building & asset data
  • Maintain, cleanse and curate data about your asset portfolio
  • Securely access asset data from any connected device 24x7
  • Gain real-time insights into data about your assets
  • Visualise 3D models with integral data using just a browser
  • Fully managed service - no software or hardware to deploy
  • Easily control how building data can be accessed / handled
  • Manage building data without specialist CAD / BIM software
  • Automate manual processes for checking asset data
  • Maintain Asset records over the whole asset lifecycle


£150 per licence per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

7 3 2 1 4 8 9 4 4 2 6 6 7 9 6



Andy Ward



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to BIMPress Explorer is an application that runs on our BIMPress platform. Licences to use the platform are included with the Explorer service
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints Only limited by Microsoft Azure services available in the chosen hosting location.
System requirements
  • Any standard PC, tablet or phone with a modern browser
  • 3D features require WebGL capable browser i.e. Chrome/Edge/Firefox
  • Network connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Priority 1: Respond on receipt, but always within one hour
Priority 2: Within 2 hours
Priority 3: Within 4 hours
Priority 4: With one working day

Support hours: 9 to 5 (UK time), Monday to Friday
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Licence fees include telephone and helpdesk support for all users licenced.

Users will have access to the support team via telephone and email helpdesk.

The support telephone and email help desk is available Monday to Friday inclusive from 09:00 to 17:00 UK hours, excluding UK bank holidays.

Helpdesk requests will be assigned one of the priorities below on each request

• Priority 1: Full Service Outage: a business-critical feature of the Service is unavailable to all users, meaning users are unable to access the service.
• Priority 2: Degraded Service: an important feature of the Service is unavailable to all users, however other areas of the system remain operational
• Priority 3: a feature of the Service is unavailable to one or more users. A workaround may be available
• Priority 4: a feature of the Service is either not performing as it should, or is unavailable, but causing minimal business impact.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We host online training material, including videos and user documentation. We can provide onsite or remote training for users as an additional service.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Authorised users can download asset and model data from the application in the following formats:
- Original BIM models in IFC format
- All native documents in their original format
- Entity registers in Excel format
- Asset Data in COBie Excel format

Data can also be extracted via the API.

An archive of a customer's asset data can be produced on request
End-of-contract process At the end of the contract, the service becomes read-only for 90 days, during which time it is possible for users with admin roles to extract data. After this period the data is permanently deleted from the system.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Due to more limited screen sizes on mobile devices interface is re-arranged on some devices.
Service interface No
What users can and can't do using the API The API permits users to undertake all data operations that can be achieved in the application. That includes, importing models, querying all model entities and properties, obtaining geometry, editing & creating data & interrogating audit trails.

The API can be evaluated through a Swagger interface. Setting up a new service requires a unique client ID obtained during registration of an application.

Fair usage limits apply on the API. Limits can be extended through a separate commercial agreement.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Custom URLs domains
Customer branding
Custom logos


Independence of resources Each customer has dedicated database and storage accounts provisioned, which are automatically and independently monitored and scaled based on utilisation.

Additional Application Servers are automatically provisioned once utilisation reaches a threshold.

'Model Import/Processing' utilises a 'serverless infrastructure' which provisions more computer power as required.

A fair-use 'back-off' system in the API prevents excessive usage from a user from monopolising resources that would affect others.

Additional measures are in place to address DDoS type attacks.


Service usage metrics Yes
Metrics types User session activity & page visits
API Usage
Storage usage
Server uptime & performance
Reporting types
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach In built export functionality for files and data. The API can also be used to export data in a variety of formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • IFC
  • COBie
  • Microsoft Excel
  • JSON
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • IFC2x3
  • IFC4
  • PDF
  • COBie
  • Native files can be uploaded as documents

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% guaranteed uptime
Approach to resilience The BIMPress platform is entirely hosted in Microsoft Azure UK datacenters, using the Azure 'Platform as a Service' components for Storage, Database and Compute.

This means management of individual server and networking infrastructure is undertaken by Microsoft Engineers & systems. Service redundancy is built into the platform, and individual component / service failures are managed and resolved as part of the Microsoft Azure 'Service Fabric'.

The application service is designed to automatically scale out and fail over to new instances in event of failure of a component/sub-system.

All data is automatically replicated between two separate locations in the UK in real-time using Geographically Redundant Storage

Full backups are taken daily with incremental backups every 10 minutes. Backups are stored in 3 logically & geographically separate locations.

In the event of a major outage in the primary data-center region, the data will always be available from a geographically separate secondary region.
Outage reporting We provide a service dashboard where the status of our services can be checked.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels BIMPress platform utilises Role-Based Access Control (RBAC) for all users which controls access to management functionality and data at the Account, Asset and Model levels.

Access to service management & support interfaces is limited to key administrative personnel based on a 'least privilege' approach to access rights. There are no 'shared' administration accounts and all Administrative access and changes are audited against the individual.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have internal policies that align with the ISO27001 ISMS standards, covering the Confidentiality, Integrity and Availability of our information systems and services.
Information security policies and processes The BIMPress Information Security Management System is based on ISO 27001 security policies. Our management team monitors the overall performance of the security management system and all dependent policies, processes, risks, and associated controls.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes are tracked through industry standard change tracking and version control systems. Change requests are risk reviewed before any work commences. All code, infrastructure and configuration changes go through a combination of peer review and automated tests before promotion through multiple quality gates to production.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We actively maintain a threat model of the service to help identify potential weak points in the service that could be targeted by threat actors, and to ensure mitigations are appropriate.

Platform level patches are managed by Microsoft Azure as per https://docs.microsoft.com/en-us/azure/app-service/app-service-patch-os-runtime

Application and Configuration patches are deployed via out automated deployment system, after regression testing in a staging environment.

We subscribe to the Azure Security blog, and the Securities Advisories Alerts service to keep on top of active new threats.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have a layered approach to intrusion detection, enabling us to monitor & trace unusual activity at the infrastructure, application and network levels. This is based on auditing and alerting rules defined in the Azure infrastructure and logging/analytics within our application/service, as well as alerts from the Azure Security Center.

In addition to ad hoc inspections of logs and audit trails, operators are alerted 24x7 if unusual activity is detected, whereupon the incident will be triaged for severity & priority to ensure the appropriate timely response.
Incident management type Supplier-defined controls
Incident management approach We follow an ISO27001 approach to incident management. Incidents are recorded, triaged and remediated based on their impact. Root cause analysis if performed on incidents, and can be provided on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £150 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A free self-service trial version is available. This includes all core functionality with the following limitations:
- Up to 3 users
- Limited to 1 Asset
- 500 MB of storage
- 60 days of history

No time limit but inactive accounts will be deleted after 9 months

Service documents

Return to top ↑