Lucernex

Lucernex Integrated Workplace Management System (IWMS)

Lucernex is a leading Cloud-based Integrated Workplace Management System (IWMS), providing advanced solutions for organizations in any industry seeking FASB/IASB-compliant real estate and equipment lease accounting software. The platform also provides solutions for project management, market planning & site selection, facility management, rent accounting, and contract compliance.

Features

  • Real time application dashboards and reporting
  • True multi-tenant Cloud architecture for the IWMS suite
  • Self-Service Toolkit for building pages, screens, dashboards, forms, workflows.
  • Sophisticated financial calculation engine for handling all lease accounting needs
  • Templates and Automation - pre-packaged templates built off best practices
  • Built-In Integration Engine – simplifies integrations with enterprise applications.
  • Data Conversion Tool ensures fast and accurate data conversions.
  • IFRS & FASB Compliance
  • Forecasting and mapping integrations
  • Document management with OCR, bookmarks and markup tools

Benefits

  • Real-time data to drive business decisions
  • Single source of truth for real estate, facilities, and assets
  • Direct control of the data necessary for runing your organizations
  • Ensure accuracy of lease obligations
  • Automate business processes
  • Exchange data across business critical systems
  • Ensure successful implemenations
  • Compliance under the new lease accounting guidelines
  • Improve your real estate performance
  • Increase collaboration through document viewing and markup tools

Pricing

£5000 per licence per year

Service documents

Framework

G-Cloud 11

Service ID

3 9 7 3 4 1 6 5 1 3 9 1 3 3 7

Contact

Lucernex

Andrew Schafer

447764661582

aschafer@accruent.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
All scheduled maintenance (except emergency patches) is performed during regularly scheduled maintenance windows. Those windows are: nightly – small product patches and/or emergency patches of any kind from 10pm EST to 11pm EST; weekly – Friday 10pm EST to Saturday 3am EST. Providing the client has Internet access, there are no other constraints to using the service.
System requirements
Use of a secure, supported Internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are based on Severity Levels as defined in our SLAs along with what level of maintenance a customer purchases.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Accessibility standards have been discussed in general but no project as yet to set aside for this specifically. At a minimum, we ensure that foreground and background combinations provide sufficient contrast when viewed by someone having colour deficits.
Web chat accessibility testing
None. But we just want to inform you that our 'phone support' is Monday - Friday from 7AM – 7PM CST. After hours phone support is only available for severity 1 and severity 2 issues. We did not have the opportunity to say this in the previous response.
Onsite support
Yes, at extra cost
Support levels
24x7 phone support for high severity issues and 7 AM - 7 PM CT US business hours is the default support offering for the Lucernex solution. Options available for an additional cost.

Accruent Support offers Technical Account Managers for an added cost. Technical Account Managers are responsible for understanding the client's business process in the context of our applications and providing the customer with subject matter expertise in both the application and their use of it.
Support available to third parties
No

Onboarding and offboarding

Getting started
Our best-in-class solution is supported by a team of experts who work with our clients throughout the discovery, implementation, and go-live phases of the implementation project. Our team identifies and cleans any necessary legacy data and fully supports the configuration of this data into the Lucernex solution. Lease and contract abstraction can be expensive and time-consuming; however, our lease abstraction services assist in cutting the time and expense of the process by up to 50%. Our Professional Services team is among the most experienced in the industry. Our market-leading knowledge and experience allow us to quickly develop a deep understanding of our clients’ strategic goals and business processes so they can tailor the Lucernex solution to provide maximum value for every client. Our Project Managers have extensive experience leading successful software implementations, allowing each project to be delivered on-time and on-budget. Our implementation team also has a proven methodology to ensure compliance with IASB standards. There are a variety of training methodologies we employ for the Lucernex solution--System Administrator(s) and Lease Administrator(s) training, ‘train-the-trainer’ training, and on-the-job training conducted during implementation by our subject matter experts (SMEs).
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All client data will be returned to the client in a consumable format upon contract termination.
End-of-contract process
All client data will be returned to the client in a consumable format upon contract termination. This is subject to Professional Services fees to be scoped at the time based on level of effort.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None. 100% of the end user functionality is available through the mobile browser just as it is on the laptop/desktop machines.
Service interface
Yes
Description of service interface
Lucernex can push and pull data to different web and/or database solutions through a variety of methodologies. We currently support bulk loads of master data via our Microsoft Excel upload templates, incremental updates through our sFTP technology, interface technology and well as using our RESTful API to create standard interfaces between the two solutions.
Accessibility standards
None or don’t know
Description of accessibility
This is a topic that has been discussed in general but no project as yet to set aside for this specifically. As our web application is growing and we have more resource and engagement with User Experience teams we see accessibility hitting our design and development teams. We need to provide interaction with our product without any user barriers.
Accessibility testing
None.
API
Yes
What users can and can't do using the API
Lucernex can integrate with all database-driven or web-based applications on the market today. These integrations are facilitated primarily through a full RESTful API set using XML for data representation. Our APIs are mainly fine/atomic. We have REST query ability for returning composite information. Generally, customers orchestrate API calls with our support. Lucernex supports both synchronous and asynchronous API calls and supports batch processing as well. For asynchronous requests, a job ID is returned that can be polled to determine when it is completed.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
We allow our customers to effectively "customize" their instance of the Lucernex solution using our numerous configuration options. Lucernex is the most configurable system available in this space. Clients can add fields, re-label fields, build pages/screens, build dashboard objects and reports utilizing the included System Administrator Tools. We do not offer any code customization nor have we had a single client ask us to do so since our configurations are designed to meet a wide array of business use cases with no need for costly and complex code customizations. Our configuration tools allow every client to configure their environment to their exact needs without incurring any additional costs.

Scaling

Independence of resources
Capacity is more than adequate at all times. Capacity and performance are monitored and planned well in advance. Daily monitoring occurs regularly and actions are taken to resolve issues as they occur.

Analytics

Service usage metrics
Yes
Metrics types
Uptime statistics are generated through dynamic monitors that emulate application interactions through various synthetic transactions.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
During the contract term, Lucernex can push and pull data to different web and/or database solutions through a variety of methodologies. We currently support bulk loads of master data via our Microsoft Excel upload templates, incremental updates through our sFTP technology, interface technology and well as using our RESTful API to create standard interfaces between the two solutions.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
  • CSV
  • XML
  • HTML
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • XML
  • CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLAs are defined in the terms and conditions document, which has been uploaded with our submission.
Approach to resilience
Uptime statics for the service are public and show a pattern of high uptime and resilience. The service includes redundancy at all levels of the architecture to ensure high uptime and availability for both operational issues and natural disasters.
Outage reporting
An internal dashboard is maintained with service availability reports that provide great detail and insight into potential causes for outages. A simplified, external dashboard is available to clients.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Clients are able to configure as many security groups, called 'User Classes' as necessary. Each user class can be configured for page level, form level, action level and field level security access. These configurable security options can be used to restrict or allow access by management, support, or other roles to specific areas of the solution.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
10/8/2017
What the ISO/IEC 27001 doesn’t cover
The platform itself, and associated development practices, are not covered under the ISO 27001 certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • SOC 1 (Type 2) - SSAE18
  • SOC 2 (Type 2) - SSAE18

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
ISO27001 for the data center. SAE-16/ISAE-3402 for the application service.
Information security policies and processes
Accruent has developed internal information security policies and processes aligned with industry standards. All Accruent employees are required to read and acknowledge our security policies, as well as complete Information Security and Privacy training in the Accruent Learning Management System (LMS) on an annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Requests are prioritized and documented by product development teams. When development is completed, it is passed on to testing via a workflow tool. Only approved/tested changes are committed to release candidates. Further release testing occurs, and at the time of release only approved/tested code is released. Continual web app security assessments are done on the service to ensure new vulnerabilities are not introduced.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilites are evaluated based on CVSS ratings. Accruent maintains remediation targets for identified vulnerabilities based on criticality and standards for evaluating security fixes alongside feature requests and other development activities. Operating systems are kept in a current state to ensure continued supportability and to ensure critical security vulnerabilities are remediated.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Security related events (AV, IDS, dynamic monitors) are collected and dynamically reported on using centralized interfaces. A formalized security incident handling process is pre-defined in the event that a breach occurs.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Accruent maintains formalized Incident Management procedures. All employees that work in a role scoped for platform maintenance, monitoring, or support are trained on this process at least annually.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5000 per licence per year
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑