Primavera P6 for project resource management

Oracle Primavera’s P6 project portfolio management solution enables project-driven organisations to intelligently manage their project resources effectively and efficiently. Projects no matter how small or large, simple or complex P6 properly configured manages all resources labour and non-labour. HPS’s professional services team configure Primavera to manage resources effectively.


  • Plan, schedule, and control large-scale projects and their resources
  • Enables project manager to manage, coordinate project resource costs
  • Resource with roles and named individuals to optimise plan
  • Assign resource cost to cost load plan
  • Optimize resources to keep projects on track
  • Role and resource optimization, demand, and capacity planning
  • Communicate resource requirements and decisions throughout project lifecycle
  • Explore scenarios with what-if analysis
  • Graphical analysis of resource and role utilization
  • Track progress via Mobile App for time and expense tracking


  • Ensure project deliver to schedule, time and cost
  • Ability to see portfolio of current projects and inter-relationships
  • Gantt view with resource loadings
  • Risk and Issue tracking and mitigation
  • Resource load and levelling for more effective resource management
  • Graphical analysis of resource and role utilisation enable plan efficiency
  • Integrate using ICS to pull cost, resources and documentation
  • Adaptive reporting views and integration with Power BI using RCS
  • Explore scenarios with what-if analysis


£66.35 to £99.03 a licence a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@hydeparksolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 6 0 7 7 8 6 9 1 6 7 4 3 5 1


HYDE PARK SOLUTIONS LIMITED Hyde Park Solutions Sales Team
Telephone: 0203 174 0070
Email: sales@hydeparksolutions.com

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Periodic maintenance windows typically occur during weekends are published in advance
System requirements
No specific system requirements, the product is browser based

User support

Email or online ticketing support
Email or online ticketing
Support response times
Answers based on Oracle Support. This will be dependent upon the 'Severity' of any issue raised. Oracle will use reasonable efforts to respond to Severity 1 service requests within fifteen (15) minutes. Oracle will work 24x7 until the Severity 1 service request is resolved, a reasonable work-around is put in place, or as long as useful progress can be made.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via the Cloud Customer Support Portal
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
Oracle support included in subscription. Additional support is available from Hyde Park Solutions via G-Cloud Cloud Support offerings.
Support available to third parties

Onboarding and offboarding

Getting started
Oracle training videos available via the Oracle website and inside the tool.
HPS can provide onsite training, online training or user documentation as an additional service via G-Cloud Support offerings.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
End-of-contract process
If data is required in additional formats or reports then this will require additional cost.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
The native mobile applications are designed for field users to view, update, and collaborate on projects.

They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
Service interface
Description of service interface
Standards based SOAP or REST Web Services are available.
Nearly all application data and functionality is exposed through these Web Services.

Full documentation is available that lists all exposed data elements, business objects and operations.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Oracle is committed to building standards-based products to help customers reduce complexity and get the most out of existing technology investments, and this commitment extends to our approach to accessibility. Oracle uses industry-standard technologies such as HTML, JavaScript and Java to render most user interfaces, and we follow internationally-recognized accessibility standards allowing support for a broad range of assistive technology (AT) such as screen readers, screen magnifiers, and voice recognition.
What users can and can't do using the API
The API is accessed through exposed Web Service End-Points.

Nearly all application data and functionality is exposed through these Web Services.

Full documentation is available that lists all exposed data elements, business objects and operations.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available


Independence of resources
The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.

The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.


Service usage metrics


Supplier type
Reseller (no extras)
Organisation whose services are being resold
Oracle Corporation UK Limited

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
Approach to resilience
Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.
Outage reporting
Any outages are initially reported to your designated contacts via email.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.

Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.

Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Certification covers all aspects of the HPS’s operations, in all office locations. The only aspects out of scope relate to items 11.1.5 and 11.1.6 of the Statement of Applicability as the company does not currently have any premises where these are applicable.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
SSAE16 SOC 3 Type I/II

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Oracle Security Organization Policy and the Oracle Information Security Policy. The Chief Corporate Architect, who reports directly to the CTO, manages the functional departments directly responsible for identifying and implementing security controls at Oracle . The Global Information Security, Global Product Security, Global Physical Security, and Oracle Security Architecture organizations comprise Oracle Corporate Security, which provides independent security policy, guidance and compliance oversight to Oracle worldwide.
The Oracle Security Oversight Committee (OSOC) oversees the implementation of Oracle-wide security programs, including security
policies and data privacy standards. The OSOC is chaired by Oracle’s
CEO, General Counsel and Chief Corporate Architect.
Information security policies and processes
Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.

The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.
Incident management type
Supplier-defined controls
Incident management approach
Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.

Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:

Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal

Report privacy concerns to Oracle’s Privacy office at privacy_ww@oracle.com
Incident reports and updates will be provided to the designated customer contacts.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£66.35 to £99.03 a licence a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@hydeparksolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.