6DBIM Software Ltd.

Information Manager

6DBIM Information Manager was created to automate population of As-Installed Information for COBie; Type, Component, Spare, Resource, Job and Impact tabs with Supply Chain Information.

The System also allows viewing and auditing IFC models, generating: QR codes, As-Installed IFCs, O&M documents to BS and Federating COBie.


  • IFC BIM Model/COBie uploads with Audit functionality
  • Work Packages Creation and Assigning to Supply Chain
  • Hosting Product Information for repeated use
  • Checking and validating of manufacturer product information
  • Allowing the Supply Chain to input all As-Installed Product Data
  • Automatic generation of QR codes with links to the System
  • BIM Model Viewer with links to As-Installed Data
  • O&Ms Collated and Named to Project and British Standards
  • COBie Federation to include 'Required' and 'As-Required' tabs
  • Generation of As-Installed Data Updated IFCs


  • Quick and easy BIM model checking with reporting
  • Assigning jobs to Suppliers with easy progress tracking
  • Quick and easy access to Product Information
  • Great control and high quality of Product Data available
  • Easy to use and user-friendly System Interface
  • Future proof and security as system hosted on UK AWS
  • System web-pages are scalable to work on multiple platforms
  • Immense amount of time saved on Digital Documentation collation
  • Time saved on COBie Federation for project purposes
  • BIM compliant project as IFC automatically regenerated with As-Installed Information


£1000 to £9000 per licence

  • Free trial available

Service documents


G-Cloud 11

Service ID

9 1 5 6 4 1 9 2 6 7 5 9 7 4 9


6DBIM Software Ltd.

Barbara Daszczyszak



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no System constraints.
System requirements
  • Access to the internet
  • PC with Windows or any iOS or Android device
  • Standard web browser. Google Chrome is preferable.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We are always aiming to respond within 24 hours to all queries but during business hours response is usually immediate.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Onsite support
Support levels All technical issues related to system are deal with free of charge. We are also providing free of charge webinar introductions and guides are available under help tab at all times. System is accepting multiple external input formats and if they are incorrectly formatted error report is issued. If user decides to ask us to step in and help correct those issues we are charging equivalent day rate as BIM Consultancy.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Each user is provided with quick start guide webinar. We are also providing manuals within the help button. We can also offer a webinar with software training and onsite training for an additional charge.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Users have multiple options to extract their data enriched with As-Installed Information. This option is always available at main project page and includes COBie spreadsheet completed with all required tabs and optional Spares, Resource, Jobs and Documents tabs filled in. Furthermore users are getting correctly named and validated O&Ms related to his project. System also based on users IFCs populates them with As-Installed information and regenerates them. Last but not least user is getting Excel spreadsheets with all available project info. All of the above can be adjusted by adding formatted EIR so data can be filtered down just to relevant end user requirements.
End-of-contract process We are working to create transfer option from Main Contractor to Facilities Team where small monthly fee is charged for retaining all of the system URL links. User specifies construction project end date then system automatically archives project. This time can be extended if needed by earlier agreement.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All system pages can scale down to work correctly on hand held devices. Customer should bear in mind that the most comfortable user experience is on devices with screen 7" or larger.
Service interface No
What users can and can't do using the API Application fully supports open API. This means that any aspect of the system can be run by using API. Therefore if user requests an access we will first review what exactly is needed and propose a custom access point. This workflow will ensure that only required information is accessible and system security is maintained.
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation 6DBIM Team if needed can adjust and customize User Interface to match Customer preferences for an additional fee.


Independence of resources System is well optimized for the multiple projects and processors’ usage is monitored. We are using Amazon Web Services which offer a selection of multiple levels of CPU power. Therefore if system indicates low performance, we will increase number of CPUs.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Once project is paid user has an option to generate Project Documentation. Once Construction Project is completed System is capable of generating complete Documentation with O&Ms Collated and Named to Project and British Standards, COBie Federation to include 'Required' and 'As-Required' tabs and Generation of As-Installed Data Updated IFCs. System is also capable of maintaining URL links to assets for future Facilities Management use.
Data export formats Other
Other data export formats
  • IFC
  • XLSX
  • PDF
  • DOC
  • JPG
Data import formats Other
Other data import formats
  • IFC
  • XLSX

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 6DBIM provides the functionalities of the Cloud Service as described in Service Availability during the following system run-time (“Target Run-time/Availability”) up to a percentage of 96%:
Target Run-time/Availability: 24 hours/day and 365 day/year up to 96%.

The Cloud Service might be unavailable during Planned Non-Availability as set out in Service Availability.
Non-Availability exists if for the rest the agreed functionalities are not usable.
If the Cloud Service availability is below target Licensee may request a partial project cost refund (no larger than 5% of entire project value).
Approach to resilience All the details are available on request.
Outage reporting If outage report is needed users will be notified by email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels We cannot access user account after they update their password. Within system support we can track issues and see what caused errors. Therefore support can be effective. Management wise we are using simplified interface where we are sending commands to system to create new projects, add new users, companies etc.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Starfield Class 2 Certification

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach System is accessible by limited number of trusted members (Company Directors). All access is protected with secure passwords which are changed regularly.
Information security policies and processes System is monitored by the project admin (one of the Company Directors). Any suspicious activities are monitored and checked.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All system components are monitored and checked regularly. System is enclosed in its secure features so any updates are done within current secure environment. AWS database provides all protection and certificates.
Vulnerability management type Supplier-defined controls
Vulnerability management approach During system development we are doing extensive testing to highlight any potential weak spots. We are making sure that any potential threats are taken into consideration and tested against our security. In case of any issues we are able to deploy patches within one hour. In regards to knowledge about potential threats we are using developer’s channels.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All incidents are dealt as quickly as possible and are usually resolved within one hour. We are testing our application regularly therefore we are able to alleviate all possible issues even before system will reach production environment. This extensive testing is also capable of identifying any potential compromises therefore we are very confident about system security.
Incident management type Supplier-defined controls
Incident management approach Each user can quickly raise concerns and any incidents to us either via website, email or call. If we indicate any issues we are informing our users as early as possible. In case of any problems we are able to temporarily disable access to the system to ensure data protection. This will enable us to fix any potential issues.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1000 to £9000 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial We offer unlimited number of a Demo Projects with complete System functionality but limited with number of building elements to 20.

Service documents

Return to top ↑