Oracle Aconex is used globally as a means for project delivery organisations to gain visibility, control and reduce risk across all stakeholders in a collaborative way.
Automated processes drive efficiency from design through construction to project conclusion.
Aconex is able to be deployed within days.
- Secure document management
- Advanced communications and forms
- Model coordination in a common data environment
- Integrated cost management
- Quality and safety processes
- Unparalleled service and support
- Manage millions of documents and models without limits.
- Strict version control. Ensures consistency throughout supply chain
- Correspondence is logged and cannot be deleted (audit trail)
- Visibility into budgets, forecasts, and projective outcomes enables corrective action
- Track/report on any project level with unlimited WBS elements
- Automate/Standardize any inspection process with Aconex Field (Mobile App)
- Minimize delays/risks recognizing red flags early with in-depth visual dashboards
- Use EVM such as cost-performance-index and schedule-performance-index to forecast costs
£51 to £83 per user per month
- Education pricing available
HYDE PARK SOLUTIONS LIMITED
01926 911 446
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Periodic maintenance windows typically occur during weekends are published in advance|
|Email or online ticketing support||Email or online ticketing|
|Support response times||This will be dependent upon the 'Severity' of any issue raised and according to the SLA's agreed with the organisation.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||We provide a range of support dependant on the issue requiring attention.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We can provide onsite training, online training or user documentation|
|End-of-contract data extraction||
For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
Database export of the Applications schema is included.
If data is required in additional formats or reports then this will require additional cost.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The native mobile applications are designed for field users to view, update, and collaborate on projects.
They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
|What users can and can't do using the API||
The API is accessed through exposed Web Service End-Points.
Nearly all application data and functionality is exposed through these Web Services.
Full documentation is available that lists all exposed data elements, business objects and operations.
|API documentation formats||
|API sandbox or test environment||Yes|
|Independence of resources||
The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.
The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.
|Service usage metrics||No|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Oracle|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||
Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
|Approach to resilience||Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.|
|Outage reporting||Any outages are initially reported to your designated contacts via email.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.
Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.
Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
|Access restriction testing frequency||At least once a year|
|Management access authentication||2-factor authentication|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||SSAE16 SOC 3 Type I/II|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||An Oracle standard|
|Information security policies and processes||
Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.
The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.
Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:
Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal
Report privacy concerns to Oracle’s Privacy office at email@example.com
Incident reports and updates will be provided to the designated customer contacts.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£51 to £83 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||No|