AssetWise Rail Condition Analytics (RCA)
AssetWise Rail Condition Analytics unlocks the potential of organisational data with predictive maintenance strategies using the latest innovations in linear analytics. With pre-configured data-import, analytical, and decision support tools, it enables transit agencies to benefit from optimised rail maintenance strategies using existing data, thus accelerating ROI while maintaining linear assets.
Features
- Linear Asset Decision Support
- Data-driven interactive electric track charts
- Linear Data Analysis
- Linear Asset Condition Assessment and Visualisation
- Data Cleaning and Alignment
- Work Capital Planning
- Monitoring Performance Metrics, Investment
- Prioritisation, and Trend Analysis and Forecasting
- Scripting Language supporting custom linear analytics
- Near-real time processing of the data
Benefits
- Actionable information, enabling better decisions about linear assets
- Improved decision making through controlled access to accurate trusted information
- Enables automated compliance with industry/regulatory standards
- Single source of truth for linear asset and related information
- Easy to access in context all asset related Information
- Reduce operational costs
- Focused risk-based prioritisation of maintenance
- Streamlined capital planning and operations
- Improved overall service, safety, and reliability
Pricing
£10,242.75 an instance a quarter
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 8 1 1 0 0 3 1 0 9 2 2 5 9 8
Contact
Bentley Systems (UK) Limited
Andy Bowles
Telephone: +44 7919 892183
Email: gcloud@bentley.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- AssetWise Linear Analytics and forecasting can be integrated with other AssetWise modules and EAM systems, such as SAP, Maximo, Ellipse, PowerBI.
- Cloud deployment model
- Public cloud
- Service constraints
- Patching and maintenance windows are scheduled every month to ensure the security and reliability of the service. A notice will be provided and some service disruption may occur during these out-of-hours windows.
- System requirements
- HTML 5 compatible browser or Windows for desktop client
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are covered by an SLA and are based on priority. P1 - Availability Support 24x7 - Response 1 hour - Resolution Worked continuously until resolved - Update Interval - 1 hour P2 - Availability Support 24x5 - Response 2 Business Hours - Resolution 1 Business Day – Update Interval 4 hours P3 - Availability Support 24x5 - Response 4 Business Hours - Resolution 10 Business Days - Update Interval 1 Business Day P4 - Availability Support 24x5 - Response 8 Business Hours - Resolution Mutually Agreed - Update Interval Mutually Agreed
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- A standard SLA is included with the subscription providing 24x7 uptime, support, RPO and RTO and product upgrades. Bentley offers a Recurring Advancement Services Program which is a tailored offering to achieve your ever-evolving desired business outcomes by advancing your digital workflows using Bentley applications.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- After the cloud service is enabled Bentley will engage with the users (stakeholders, representatives from various departments) to define configuration details. Once the system is finally configured, Bentley will perform on-site or remote training sessions for each group/role. There are options to share video, training material, and prepare custom training material.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Wiki
- End-of-contract data extraction
- There are different ways to extract data depending on the volume of data to be extracted. It ranges from simple document check out, to using a bulk export utility or automated using SSIS packages.All data imported into the system and derived within the system can be exported in documented file formats.
- End-of-contract process
- Bentley reccommends engaging with us to get your data extracted before the contract ends. At a minimum, Bentley will provide the database and file repositories.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The web client includes system administration and security tools, data import configuration tools, and the data read-only viewer. The desktop client offers enhanced data processing.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The web client includes system administration and security tools, data import configuration tools and the data read only viewer. The desktop client offers enhanced data processing, analytics and visualisation.
- Accessibility standards
- None or don’t know
- Description of accessibility
- User Interface or content elements are differentiated through more than just color, such that colorblind individuals can gain the intended meaning. When using tab keys to navigate to form elements or links, there is a Focus state that shows what element the user is on. Content does not include a “flash” or “strobe” effect that covers the screen and lasts longer than three seconds. Text used in a hyperlink clearly describes what users might expect to find after clicking unless the content found is intended to be obfuscated. User can navigate between form elements using the tab or arrow keys.
- Accessibility testing
- No specific interface testing with users of assistive technology has been done.
- API
- Yes
- What users can and can't do using the API
- Web service with REST API. All traffic uses TLS1.2 encryption with a certificate issued by a trusted Certificate Authority (DIgicert). The API allows to read and write data to the system. It also allows to make some configuration changes to the System.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The user interfaces and linear analytics are highly configurable and the configuration can be performed by the end users who have the required security permissions. AssetWise Linear Analytics has a library of more than 200 linear network-aware data processing rules and commands that can be applied to extract actionable information. These rules can find clusters of defects, trend track degradation to plan surfacing, filter spikes and flat lines from measurement data. These rules can be combined to perform sophisticated data analysis to extract more value from existing data. Information is clearly presented in linear, schematic electronic track charts that can be built to the needs of a specific user to make asset, condition, and historical data comprehensible and exploitable for users across the enterprise. These track charts are data driven with real time updates providing users with the latest and most accurate data. Users can optionally modify what data is shown and how it is displayed.
Scaling
- Independence of resources
- Systems are logically separated in a virtual cloud environment. All systems are monitored in real time for performance and availability.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Monthly user activity.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The system has multiple options to export data ranging from simply copying out, via bulk export or even automated using SSIS packages. Which option is most appropriate depends on the purpose of the export.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PNG
- XML via configuration
- Data import formats
-
- CSV
- Other
- Other data import formats
- Export from SHAPE files into CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- HTTPS
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Logging of service, user, file integrity monitoring, and network intrusion detection are logged and correlated to detect suspicious network behavior. Bentley and Azure provide tools to protect against data leaks. IT tools such as CrowdStrike are used to detect suspicious activity and protect against data leaks.
Availability and resilience
- Guaranteed availability
- 99.9%, assured by contractual commitment. Service credits when service availability drops below SLA level in a month.
- Approach to resilience
- All services are deployed in a fully redundant configuration within fully redundant data centres meaning that any failure of equipment, service provider or software service will result in zero, or minimal, impact to the overall service.
- Outage reporting
- Planned and unplanned outage notification emails are sent to registered users for affected systems.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Other
- Other user authentication
- Bentley’s IMS authenticates through the users Identity Provider. If MFA is enabled by the user then by default it is utilised in the authentication process. Bentley currently supports federated identity via the OIDC, SAML2 protocol, so MFA is supported via your identity provider.
- Access restrictions in management interfaces and support channels
- Bentley follows a role based access (RBAC) process to approve and review all access to infrastructure and data. Bentley has controls in place to restrict access, provide separation of duties, enforce role-based access and has a least privilege access principle. Segregation of duties is split by tasks upon the individual responsible group.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- Bentley follows a role-based access (RBAC) process to approve and review all access to infrastructure and data. Bentley has controls in place to restrict access, provide separation of duties, enforce role-based access and has a least privilege access principle. Segregation of duties is split by tasks upon the individual responsible group. In order for any Bentley administrator to access a system using this account, they must be on a Bentley network. Non-Bentley network access (via RDP) has Two Factor Authentication in place.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC 2
- Information security policies and processes
- Information Security policies are designed utilising ISO 27001, SSAE16, ITIL and CSA frameworks. Several SaaS offerings are ISO 27001 certified and others are SOC2 certified. All Bentley colleagues are required to review and acknowledge Bentley's Information Security Policy upon hire and thereafter annually. The policies themselves are emailed out at least annually and reside permanently on Bentley's intranet site for quick retrieval.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management is conducted through various technologies internal and external to the Bentley network. Threats are identified using industry standard listings and patches/updates are applied at least monthly or as needed based on criticality.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
IDS/IPS is active on the network perimeter and on selected systems under the scope for SOC2 certifications. Bentley has an Incident Management Service Plan that includes cybersecurity events.
Bentley can quarantine any system on demand and will do so based on its incident response process. In the event of an incident, Bentley's incident response plan is compliant with GDPR requirements. Information security events will be assessed and a decision will be made if the event should be considered a security incident. Reporting requirements shall align with the corporate Incident Response Plan. - Incident management type
- Supplier-defined controls
- Incident management approach
- The Incident Management process covers all aspects of a potential incident from start to finish with defined procedures and colleague involvement. Common events are handled depending on severity, users have multiple methods of reporting and reports are provided as part of the incident management procedure.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
AssetWise Linear Analytics aims to ensure that maintenance work is done at the right time and in the right place. This reduced duplicated or unnecessary work. Increasing reliability of the rail network in turn makes it more likely that people will switch back from their cars to public transport.
Bentley’s mission is to leverage our leading software and services to drive impact through the world’s infrastructure – advancing both the global economy and the environment for improved quality of life. As part of our Environmental, Social, & Governance (“ESG”) strategy, we are committed to managing our business in a way that enhances the environmental impacts of our products and mitigates environmental risks from our operations. Our Environmental Policy details our commitments to Environmental Responsibility and the ways in which we expect our colleagues to act to drive progress on our ESG strategy. Bentley expects all colleagues, visitors, vendors, and suppliers to follow the below practices in order to drive progress on Bentley’s ESG strategy. Bentley's Environmental Policy is here: https://prod-bentleycdn.azureedge.net/-/media/files/documents/miscellaneous/environmental_policy.pdf?la=en&modified=20211021075240" - Covid-19 recovery
-
Covid-19 recovery
When the world locked down to combat the COVID-19 virus, we took immediate action to ensure our colleagues had the equipment and resources they needed to work from home, which also enabled success for our users. Our global task force provided continuous communication, education, and support services to our colleagues. Their well-being fueled our response plan, and we created learning resources to support them throughout the pandemic. These resources included guides and practices for managers to lead virtually with empathy, tips for maintaining team collaboration, and resources and support for colleagues to maintain a healthy work-life balance.
As the pandemic continues, and work flexibility is seen as the key to success for the business and our colleagues’ wellbeing, we’ve introduced the Infrastructure Empowered Workforce Plan (IEWP). The IEWP is built on a solid foundation of trust. Colleagues are empowered to make responsible and effective choices on the right balance between working from the office and remotely. This plan does not require colleagues to come into the office at any specific frequency. Rather, it provides colleagues the flexibility to make these choices with their manager and within their teams to achieve business success and maintain a high level of productivity and engagement. - Tackling economic inequality
-
Tackling economic inequality
As a global company with colleagues of different cultures, backgrounds, and perspectives based in more than 40 countries worldwide, our diversity is what makes us successful. We have developed strategies and programs focused on increasing diversity and equity, as well as fostering a culture of inclusion and wellbeing in the workplace. These initiatives include building a pipeline of diverse candidates by recruiting at and partnering with Historically Black Colleges and Universities.
We also partner with educational and professional organisations to provide internships, scholarships, grants, and projects that support groups underrepresented in technology.
Bentley has active and engaged colleague resource groups within the Inclusion, Diversity, and Equity Alliance (IDEA) that have allowed colleagues, during this pandemic, to join their peers from all regions and departments with the goals of building community and fostering diversity and inclusion. IDEA currently has four focus groups open to all global colleagues: OpenPride, OpenAbilities, People of Color in the U.S., and Women at Bentley. IDEA has been a platform for education and a place to securely have difficult discussions about racism, discrimination, and bias through book clubs, panel discussion, speakers, and global awareness events. Members of executive management are key sponsors of each focus group and have been instrumental as sounding boards and in providing access to resources and the executive team.
We have implemented robust training with topics focused on respect in the workplace, identifying and overcoming bias, and anti-discrimination. We have held interactive sessions with our executives, emerging leaders, and talent acquisition in fostering diversity, equity, and inclusion and eliminating unconscious bias, and have implemented training for hiring managers to ensure fairness in the interview process.
You can find additional information, including our commitment to anti-slavery on our ESG website: https://www.bentley.com/en/esg/data-center - Equal opportunity
-
Equal opportunity
Bentley is an equal opportunity employer and considers all qualified applicants for employment without regard to race, colour, sex, sexual orientation, gender identity, disability, protected veteran status, religion, national origin, age, or any other protected characteristic. This commitment extends to all aspects of employment, including, but not limited to, hiring, placement, promotion, compensation, and training. EEO is the Law and EEO is the Law Supplement documents provide additional information about your rights as an applicant under the law. - Wellbeing
-
Wellbeing
As a company, it is our goal to ensure our colleagues know they are supported and valued as the first order of business.
Therefore, our Talent Management strategy puts colleagues at the centre of the workplace at Bentley. We focus on enriching colleague experience and creating memorable, meaningful, and purposeful connections. We invest in developing an impactful experience that reflects the company’s mission and values. We build practices and programs that deliver on engagement, recognition, communication, and development while rewarding colleagues through our robust total rewards package.
Pricing
- Price
- £10,242.75 an instance a quarter
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A test environment can be provided to test the main software features. This environment uses disposable data and is available for up to 30 days free-of-charge (subject to agreement).
- Link to free trial
- Access to the pilot/proof of concept environment will be setup to meet the requirements of each user.