Bentley Systems International Limited

AssetWise CONNECT Edition

Cloud hosted business process solution to enable BIM Level 2 but also a platform for BIM Level 3 (asset-centric) solution. AssetWise CONNECT Edition enables Management of Change, Configuration Management, Asset Information Management, Document Management and Control, Contract Management as well as nuclear approved document/asset management.


  • Asset Information Management - asset registry and tag management
  • Management of Change and Configuration Management (CMII)
  • Document Management and Control (Transmittals, RFIs, Comment Tracking, Business Workflow)
  • Records Management (in accordance with DoD5015, MoReq)
  • Spatial and Linear Network Management
  • Compliance and Safety including Requirements Management
  • Comprehensive Audit Trail capabilities
  • Integrated 2D/3D Model Management
  • Enterprise Interoperability Service


  • Simplified access to enterprise information by all project stakeholders
  • Reduced training and license costs through fewer systems
  • Improved decision making through controlled access to accurate trusted information
  • Enables automated compliance with industry/regulatory standards
  • Single Source of Truth for all asset and related Information
  • Easy to access all asset and related Information in context
  • Maximise re-use of information throughout the lifecycle of a project
  • Improve accuracy of available information creating a safer workplace
  • Reduce operational costs by reducing search time for information
  • Reduce asset handover cost through increased efficiency of electronic handover


£28098 per instance per quarter

Service documents

G-Cloud 10


Bentley Systems International Limited

Bentley Systems Business Ops

+44 207 861 0900

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Bentley Connected Data Environment (CDE);
ProjectWise CONNECT Edition;
AssetWise ALIM;
AssetWise Asset Reliability;
AssetWise Operational Analytics;
AssetWise Enterprise Interoperability;
Electronic Plan Review;
Bentley Success Plans as per Lot 3
Cloud deployment model Public cloud
Service constraints Patching and maintenance windows are scheduled every month to ensure the security and reliability of the service. A notice will be provided and some service disruption may occur during these out-of-hours windows.
System requirements All requirements covered with the offered service

User support

User support
Email or online ticketing support Email or online ticketing
Support response times The response times are covered by SLA and are based on priority. P1 - Availability Support 24x7 - Response 1 Hour - Resolution 4 Hours - Update Interval - 1 Hour
P2 - Availability Support 24x5 - Response 2 Hours - Resolution 1 Day – Update Interval 4 Hours
P3 - Availability Support 24x5 - Response 4 Hours - Resolution 10 Business Days - Update Interval 1 Day
P4 - Availability Support 24x5 - Response 8 Hours - Resolution Mutually Agreed - Update Interval Mutually Agreed
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Our initial level is SELECT. That, along with licensing and content access benefits, gives access to the Support team and Product Upgrades and Bentley Success Plans. They align software with company goals and provide Service Level Agreements based on incident priority, access to senior talent and subject matter experts. Every Success Plan comes with a named Success Plan Manager providing extended reports and monitoring of mutually agreed KPIs. Based on the priority of the incident, SLA times range from 2 hours to 24 hours.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started After the cloud service is enabled we engage with the users (stakeholders, representatives from various departments) to define configuration details. Once the system is finally configured, we perform on-site or remote training sessions for each group/role. Options to share video, training material, and prepare custom training material are possible.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction There are different ways to extract data depending on the volume of data to be extracted. It ranges from simple document check out, to using a bulk export utility or automated using SSIS packages.
End-of-contract process It is recommended to engage with Bentley to get your data extracted before the contract ends. At a minimum, Bentley would provide the database and file repositories.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The main UI is a web front-end that can be used on desktop computers, but also on mobile devices.
Accessibility standards WCAG 2.0 AAA
Accessibility testing No specific interface testing with users of assistive technology has been done.
What users can and can't do using the API The API allows you to customise the UI, add additional event handlers, wizards or business rules.
API documentation Yes
API documentation formats Other
API sandbox or test environment No
Customisation available Yes
Description of customisation Bentley is providing APIs to customise AssetWise-ALIM and to customise the user interface. It means you can create/modify and delete any AssetWise-ALIM object in any way you want until your required modifications are supported by functions provided in the SDK. The SDK consists of .NET API (can be used to modify UI, create wizards, create engines, etc.) and SQL API (can be used in event handlers or database jobs). Bentley can do the customisation for you, but Bentley can also provide training on the API, so that you can do customisation by yourself. If the customisation is a server side customisation, then it needs to pass a customisation review process at Bentley and get approval before it could be used in the cloud environment. Therefore, we recommend to let Bentley do the customisation.


Independence of resources Systems are logically separated in a virtual cloud environment. All systems are monitored in real-time for performance and availability.


Service usage metrics Yes
Metrics types Usage via Bentley licensing server can be self-reported.


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The system has multiple options to export data ranging from simply copying out, via bulk export or even automated using SSIS packages. Which option is most appropriate depends on the purpose of the export.
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9%, assured by contractual commitment. Service credits when service availability drops below SLA level in a month.
Approach to resilience All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service.
Outage reporting Planned and unplanned outage notification emails are sent to registered users for affected systems.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Multi-factor authentication used for administrative access.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 A-Lign
ISO/IEC 27001 accreditation date 30/10/2015
What the ISO/IEC 27001 doesn’t cover All aspects of the service are covered. Certified scope is available at
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Information Security policies are designed utilising ISO 27001, SSAE16, ITIL and CSA frameworks. Several SaaS offerings are ISO 27001 certified and others are SOC2 certified.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Active IDS is active on the network perimeter and on selected systems under the scope for ISO 27001 and SOC2 certifications. Compromises are analysed and put through the incident management process for investigation. The response time depends on the severity of the compromise.
Incident management type Supplier-defined controls
Incident management approach The Incident Management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £28098 per instance per quarter
Discount for educational organisations No
Free trial available Yes
Description of free trial A test environment can be provided to test the main software features. This environment uses disposable data and is available for up to 30 days free-of-charge (subject to agreement).
Link to free trial Access to the pilot/proof of concept environment will be setup to meet the requirements of each user.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑