HYDE PARK SOLUTIONS LIMITED

Oracle Prime

Oracle Prime provides organisations with the industry best practice solution to manage ideas and initiatives, portfolio management, prioritisation and selection, planning scheduling and resource management. It also enables organisations to identify and mitigate risk.
Oracle Prime integrates with Oracle P6/EPPM.

Features

  • Idea (initiative) Management
  • Portfolio Management (Prioritisation and Selection)
  • Project Management, Planning and Scheduling
  • Resource Management
  • Risk Management
  • Dashboard reports to support decision making
  • Cost Management
  • Change Management
  • Contract Management

Benefits

  • Managed organisational portfolio to deliver strategy
  • Ability to see organisational portfolio including dependencies
  • Powerful planning and scheduling functionality
  • Monte Carlo Risk Tracking and Mitigation
  • Resource role load and levelling for more effective resource management
  • Mobile and web interface
  • Powerful collaborative change management solution
  • Single solution for P3M3

Pricing

£2 to £207 per user per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

7 8 5 1 5 2 5 7 5 7 2 8 5 1 3

Contact

HYDE PARK SOLUTIONS LIMITED

Hyde Park Solutions Sales Team

0203 174 0070

sales@hydeparksolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Periodic maintenance windows typically occur during weekends are published in advance
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
This will be dependent upon the 'Severity' of any issue raised and according to the SLA's agreed with the organisation.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide a range of support dependant on the issue requiring attention.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We can provide onsite training, online training or user documentation
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
End-of-contract process
Database export of the Applications schema is included.

If data is required in additional formats or reports then this will require additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The native mobile applications are designed for field users to view, update, and collaborate on projects.

They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
Service interface
No
API
Yes
What users can and can't do using the API
The API is accessed through exposed Web Service End-Points.

Nearly all application data and functionality is exposed through these Web Services.

Full documentation is available that lists all exposed data elements, business objects and operations.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.

The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Oracle

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
https://www.oracle.com/assets/primavera-service-descriptions-1840505.pdf
Approach to resilience
Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.
Outage reporting
Any outages are initially reported to your designated contacts via email.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.

Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.

Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
SSAE16 SOC 3 Type I/II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
An Oracle standard
Information security policies and processes
Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.

The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.
Incident management type
Supplier-defined controls
Incident management approach
Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.

Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:

Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal

Report privacy concerns to Oracle’s Privacy office at privacy_ww@oracle.com
Incident reports and updates will be provided to the designated customer contacts.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£2 to £207 per user per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑