HYDE PARK SOLUTIONS LIMITED

Oracle Aconex

Oracle Aconex is used globally as a means for project delivery organisations to gain visibility, control and reduce risk across all stakeholders in a collaborative way.
Automated processes drive efficiency from design through construction to project conclusion.
Aconex is able to be deployed within days.

Features

  • Secure document management
  • Advanced communications and forms
  • Model coordination in a common data environment
  • Integrated cost management
  • Quality and safety processes
  • Unparalleled service and support

Benefits

  • Manage millions of documents and models without limits.
  • Strict version control. Ensures consistency throughout supply chain
  • Correspondence is logged and cannot be deleted (audit trail)
  • Visibility into budgets, forecasts, and projective outcomes enables corrective action
  • Track/report on any project level with unlimited WBS elements
  • Automate/Standardize any inspection process with Aconex Field (Mobile App)
  • Minimize delays/risks recognizing red flags early with in-depth visual dashboards
  • Use EVM such as cost-performance-index and schedule-performance-index to forecast costs

Pricing

£51 to £83 per user per month

  • Education pricing available

Service documents

G-Cloud 11

947164641984469

HYDE PARK SOLUTIONS LIMITED

Jonathan Hill

0203 1740070

jonathan.hill@hydeparksolutions.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Periodic maintenance windows typically occur during weekends are published in advance
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times This will be dependent upon the 'Severity' of any issue raised and according to the SLA's agreed with the organisation.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide a range of support dependant on the issue requiring attention.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We can provide onsite training, online training or user documentation
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, your Content residing in the production Cloud Services environment, or keep the service system accessible, for the purpose of data retrieval by You.
Typically this will be of the form of a Database extract.
End-of-contract process Database export of the Applications schema is included.

If data is required in additional formats or reports then this will require additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The native mobile applications are designed for field users to view, update, and collaborate on projects.

They are designed to be intuitive and easy to use for simple status update tasks or project collaboration. They do not feature the full capability and functions of the full browser based solutions.
API Yes
What users can and can't do using the API The API is accessed through exposed Web Service End-Points.

Nearly all application data and functionality is exposed through these Web Services.

Full documentation is available that lists all exposed data elements, business objects and operations.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources The solution is provided on fully scalable platform and infrastructure. The deployment is sized and architected such that the system will provide a responsive end user experience to all of the proposed users of the system.

The infrastructure includes network load balancers and clustered application/data tiers and Oracle Oracle monitors the performance and availability of Services environments through various toolsets. Monitoring information is used to tune the Services environment and improve Cloud Services performances through maintenance activities.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Oracle

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Exporting from the applications is standard capability and formats available include Excel/CSV and XML.
Also standard reporting capability provides multiple formats of output including: Excel, PDF, RTF, PowerPoint
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Availability and RPO/RTO Metrics are available through the Primavera Service Descriptions:
https://www.oracle.com/assets/primavera-service-descriptions-1840505.pdf
Approach to resilience Oracle Cloud Services are deployed in resilient computing facilities with resilient infrastructure, redundant network connections, and power at each hosting facility.
Outage reporting Any outages are initially reported to your designated contacts via email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels For service components managed by Oracle, Oracle’s access to Your Content is restricted to authorized staff on a need to know basis.

Oracle uses the principle of "Least privilege" in which user permissions and system functionality are carefully evaluated and access is restricted to the resources required for users or systems to perform their duties.

Oracle Cloud operations teams access Services environments through a DMZ environment inside a dedicated extranet isolated from Oracle's internal corporate networks. Only approved operations and support engineers with a valid account can access a customer environment using multi-factor authentication through a virtual private network (VPN).
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications SSAE16 SOC 3 Type I/II

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach An Oracle standard
Information security policies and processes Oracle has adopted security controls and practices for Oracle Cloud Services that are designed to protect the confidentiality, integrity, and availability of Your Content that is hosted by Oracle in Your Oracle Cloud Services environment and to protect Your content from any unauthorized processing activities such as loss or unlawful destruction of data. Oracle continually works to strengthen and improve those security controls and practices.
Oracle Cloud Services operates under practices which are aligned with the ISO/IEC 27002 Code of Practice for information security controls, from which a comprehensive set of controls are selected.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software that is provided by Oracle to maintain operational stability, availability, security, performance, and currency of the Services. Oracle follows formal change management procedures to review, test, and approve changes prior to application in the production service.

The Oracle Cloud quality assurance process includes security-specific test plans. These test plans include the review of data visibility, access control, password control, administrative privileges, end-user role privileges, and data access rules. Security-specific testing focuses on operation and processing according to the Oracle Cloud design and specifications.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services and Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to Services environments.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Oracle evaluates incidents that create suspicions of unauthorized access to or handling of customer data whether the data is held on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's GIS organization is informed of such incidents, it defines escalation paths and response teams to address those incidents. GIS will work with the Customer, internal LoBs, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal will be to restore confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps.
Incident management type Supplier-defined controls
Incident management approach Oracle employees are required report suspected incidents in accordance with the Oracle Information Security Incident Reporting and Response Policy.

Every Cloud Service user is responsible for reporting information security issues. Customers can formally report security concerns according to the terms specified in the ordering document and according to the following information:

Reporting security vulnerabilities - An Oracle Cloud Services customer can use the Cloud Customer Support Portal

Report privacy concerns to Oracle’s Privacy office at privacy_ww@oracle.com
Incident reports and updates will be provided to the designated customer contacts.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £51 to £83 per user per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑