Software as a Service for the applications available from the Oracle Primavera product suite. These applications include Primavera P6EPPM, Primavera Unifier, Primavera Prime, Oracle Aconex, and other applications designed to support the delivery of Portfolio, Project and Contract Management.
- Common Data Environment (CDE) designed to meet your projects' requirements
- Neutral Platform for communications, processes, documents & models between stakeholders
- BIM Capability, viewing, federation and co-ordination of the models
- Integrate scope, cost, schedule and contract under a single platform
- Empower users autonomy and greater contribution to value added work
- Multiple scenarios and data linked to projects during execution
- Configure and automate business processes to match workflow needs
- Budget, commitment, spend, variance, and forecast management
- Visibility of resource requirements to support effective Capacity Management
- "What if” scenario planning, optimization and water-lining capability
- Single source of truth for communications, documents, processes, and models
- Connect all data for better insights and continuous improvement
- Understand performance and trends across all your projects and portfolios
- Unite stakeholders with a host of collaboration and feedback capabilities
- Fulfill governance and regulatory reporting and auditing requirements
- Capture audit trail of decisions, changes and approvals for compliance
- Embed a common minimum standard for working and capturing data
- Enforce business rules for budgeting, commits and funding
- Optimise resource use across Programmes and Projects
- Easily compare key information and KPIs side-by-side for scenarios
£90.55 to £218 per user per month
- Education pricing available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
- Modern Slavery statement
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Periodic maintenance windows typically occur during weekends are published in advance.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
This will be dependent upon the 'Severity' of any issue raised.
Oracle will use reasonable efforts to respond to Severity 1 service requests within fifteen (15) minutes. Oracle will work 24x7 until the Severity 1 service request is resolved, a reasonable work-around is put in place, or as long as useful progress can be made.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Oracle support for Oracle Cloud Services consists of:
» Diagnoses of problems or issues with the Oracle Cloud Services
» Reasonable commercial efforts to resolve reported and verifiable errors in the Oracle Cloud Services so that those Oracle Cloud Services perform in all material respects as described in the associated Program Documentation
» Support during Change Management activities described in the Oracle Cloud Change Management Policy
» Assistance with technical service requests 24 hours per day, 7 days a week
» 24 x 7 access to a Cloud Customer Support Portal designated by Oracle (e.g., My Oracle Support) and Live Telephone Support to log service requests
» Access to community forums
» Non-technical Customer service assistance during normal Oracle business hours (8:00 to 17:00) local time
This service is at no extra cost.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide on-line training and user documentation. We can provide further training if required, both on-line and on-site.|
|End-of-contract data extraction||
For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, Your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
Database export of the Applications schema is included.
If data is required in additional formats or reports then this will require additional cost.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The native mobile applications are designed for field users to view, update, and collaborate on projects.
They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
|What users can and can't do using the API||
The API is accessed through exposed Web Service End-Points.
Nearly all application data and functionality is exposed through these Web Services.
Full documentation is available that lists all exposed data elements, business objects and operations.
|API documentation formats||
|API sandbox or test environment||Yes|
|Independence of resources||
The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.
The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.
|Service usage metrics||No|
|Supplier type||Reseller providing extra support|
|Organisation whose services are being resold||Oracle Primavera|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Other data at rest protection approach||Data at Rest is encrypted via 'Transparent Data Encryption', a Security function of the oracle Database.|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint
Proprietary formats include Primavera P6 and Microsoft Project.
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
|Approach to resilience||Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.|
|Outage reporting||Any outages are initially reported to your designated contacts via email.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.
Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.
Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||SSAE 16 SOC 2 Type I/II|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.
|Information security policies and processes||
Oracle’s overarching Organizational Security is described in the Oracle Security Organization Policy and the Oracle Information Security Policy.
The Chief Corporate Architect, who reports directly to the CTO, manages the functional departments directly responsible for identifying and implementing security controls at Oracle . The Global Information Security, Global Product Security, Global Physical Security, and Oracle Security Architecture organizations comprise Oracle Corporate Security, which provides in dependent security policy, guidance and compliance oversight to Oracle worldwide.
The Oracle Security Oversight Committee (OSOC) oversees the implementation of Oracle-wide security programs, including security
policies and data privacy standards. The OSOC is chaired by Oracle’s
CEO, General Counsel, and Chief Corporate Architect.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.
The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.
Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:
Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal
Report privacy concerns to Oracle’s Privacy office at email@example.com
Incident reports and updates will be provided to the designated customer contacts.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£90.55 to £218 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||No|