Lucernex Integrated Workplace Management System (IWMS)

Lucernex is a leading Cloud-based Integrated Workplace Management System (IWMS), providing advanced solutions for organizations in any industry seeking FASB/IASB-compliant real estate and equipment lease accounting software. The platform also provides solutions for project management, market planning & site selection, facility management, rent accounting, and contract compliance.


  • Real time application dashboards and reporting
  • True multi-tenant Cloud architecture for the IWMS suite
  • Self-Service Toolkit for building pages, screens, dashboards, forms, workflows.
  • Sophisticated financial calculation engine for handling all lease accounting needs
  • Templates and Automation - pre-packaged templates built off best practices
  • Built-In Integration Engine – simplifies integrations with enterprise applications.
  • Data Conversion Tool ensures fast and accurate data conversions.
  • IFRS & FASB Compliance
  • Forecasting and mapping integrations
  • Document management with OCR, bookmarks and markup tools


  • Real-time data to drive business decisions
  • Single source of truth for real estate, facilities, and assets
  • Direct control of the data necessary for runing your organizations
  • Ensure accuracy of lease obligations
  • Automate business processes
  • Exchange data across business critical systems
  • Ensure successful implemenations
  • Compliance under the new lease accounting guidelines
  • Improve your real estate performance
  • Increase collaboration through document viewing and markup tools


£5000 per licence per year

Service documents

G-Cloud 11



Andrew Schafer


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints All scheduled maintenance (except emergency patches) is performed during regularly scheduled maintenance windows. Those windows are: nightly – small product patches and/or emergency patches of any kind from 10pm EST to 11pm EST; weekly – Friday 10pm EST to Saturday 3am EST. Providing the client has Internet access, there are no other constraints to using the service.
System requirements Use of a secure, supported Internet browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times are based on Severity Levels as defined in our SLAs along with what level of maintenance a customer purchases.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Accessibility standards have been discussed in general but no project as yet to set aside for this specifically. At a minimum, we ensure that foreground and background combinations provide sufficient contrast when viewed by someone having colour deficits.
Web chat accessibility testing None. But we just want to inform you that our 'phone support' is Monday - Friday from 7AM – 7PM CST. After hours phone support is only available for severity 1 and severity 2 issues. We did not have the opportunity to say this in the previous response.
Onsite support Yes, at extra cost
Support levels 24x7 phone support for high severity issues and 7 AM - 7 PM CT US business hours is the default support offering for the Lucernex solution. Options available for an additional cost.

Accruent Support offers Technical Account Managers for an added cost. Technical Account Managers are responsible for understanding the client's business process in the context of our applications and providing the customer with subject matter expertise in both the application and their use of it.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Our best-in-class solution is supported by a team of experts who work with our clients throughout the discovery, implementation, and go-live phases of the implementation project. Our team identifies and cleans any necessary legacy data and fully supports the configuration of this data into the Lucernex solution. Lease and contract abstraction can be expensive and time-consuming; however, our lease abstraction services assist in cutting the time and expense of the process by up to 50%. Our Professional Services team is among the most experienced in the industry. Our market-leading knowledge and experience allow us to quickly develop a deep understanding of our clients’ strategic goals and business processes so they can tailor the Lucernex solution to provide maximum value for every client. Our Project Managers have extensive experience leading successful software implementations, allowing each project to be delivered on-time and on-budget. Our implementation team also has a proven methodology to ensure compliance with IASB standards. There are a variety of training methodologies we employ for the Lucernex solution--System Administrator(s) and Lease Administrator(s) training, ‘train-the-trainer’ training, and on-the-job training conducted during implementation by our subject matter experts (SMEs).
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All client data will be returned to the client in a consumable format upon contract termination.
End-of-contract process All client data will be returned to the client in a consumable format upon contract termination. This is subject to Professional Services fees to be scoped at the time based on level of effort.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None. 100% of the end user functionality is available through the mobile browser just as it is on the laptop/desktop machines.
Accessibility standards None or don’t know
Description of accessibility This is a topic that has been discussed in general but no project as yet to set aside for this specifically. As our web application is growing and we have more resource and engagement with User Experience teams we see accessibility hitting our design and development teams. We need to provide interaction with our product without any user barriers.
Accessibility testing None.
What users can and can't do using the API Lucernex can integrate with all database-driven or web-based applications on the market today. These integrations are facilitated primarily through a full RESTful API set using XML for data representation. Our APIs are mainly fine/atomic. We have REST query ability for returning composite information. Generally, customers orchestrate API calls with our support. Lucernex supports both synchronous and asynchronous API calls and supports batch processing as well. For asynchronous requests, a job ID is returned that can be polled to determine when it is completed.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation We allow our customers to effectively "customize" their instance of the Lucernex solution using our numerous configuration options. Lucernex is the most configurable system available in this space. Clients can add fields, re-label fields, build pages/screens, build dashboard objects and reports utilizing the included System Administrator Tools. We do not offer any code customization nor have we had a single client ask us to do so since our configurations are designed to meet a wide array of business use cases with no need for costly and complex code customizations. Our configuration tools allow every client to configure their environment to their exact needs without incurring any additional costs.


Independence of resources Capacity is more than adequate at all times. Capacity and performance are monitored and planned well in advance. Daily monitoring occurs regularly and actions are taken to resolve issues as they occur.


Service usage metrics Yes
Metrics types Uptime statistics are generated through dynamic monitors that emulate application interactions through various synthetic transactions.
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach During the contract term, Lucernex can push and pull data to different web and/or database solutions through a variety of methodologies. We currently support bulk loads of master data via our Microsoft Excel upload templates, incremental updates through our sFTP technology, interface technology and well as using our RESTful API to create standard interfaces between the two solutions.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
  • CSV
  • XML
  • HTML
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • XML
  • CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability SLAs are defined in the terms and conditions document, which has been uploaded with our submission.
Approach to resilience Uptime statics for the service are public and show a pattern of high uptime and resilience. The service includes redundancy at all levels of the architecture to ensure high uptime and availability for both operational issues and natural disasters.
Outage reporting An internal dashboard is maintained with service availability reports that provide great detail and insight into potential causes for outages. A simplified, external dashboard is available to clients.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Clients are able to configure as many security groups, called 'User Classes' as necessary. Each user class can be configured for page level, form level, action level and field level security access. These configurable security options can be used to restrict or allow access by management, support, or other roles to specific areas of the solution.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 10/8/2017
What the ISO/IEC 27001 doesn’t cover The platform itself, and associated development practices, are not covered under the ISO 27001 certification.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • SOC 1 (Type 2) - SSAE18
  • SOC 2 (Type 2) - SSAE18

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards ISO27001 for the data center. SAE-16/ISAE-3402 for the application service.
Information security policies and processes Accruent has developed internal information security policies and processes aligned with industry standards. All Accruent employees are required to read and acknowledge our security policies, as well as complete Information Security and Privacy training in the Accruent Learning Management System (LMS) on an annual basis.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Requests are prioritized and documented by product development teams. When development is completed, it is passed on to testing via a workflow tool. Only approved/tested changes are committed to release candidates. Further release testing occurs, and at the time of release only approved/tested code is released. Continual web app security assessments are done on the service to ensure new vulnerabilities are not introduced.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerabilites are evaluated based on CVSS ratings. Accruent maintains remediation targets for identified vulnerabilities based on criticality and standards for evaluating security fixes alongside feature requests and other development activities. Operating systems are kept in a current state to ensure continued supportability and to ensure critical security vulnerabilities are remediated.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Security related events (AV, IDS, dynamic monitors) are collected and dynamically reported on using centralized interfaces. A formalized security incident handling process is pre-defined in the event that a breach occurs.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Accruent maintains formalized Incident Management procedures. All employees that work in a role scoped for platform maintenance, monitoring, or support are trained on this process at least annually.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £5000 per licence per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑