Primavera EPPM Cloud Hosting Service
We provide Cloud Hosting facilities for Enterprise Project and Portfolio Management (EPPM) and Enterprise Cost and Contract Management (ECCM) software for organisations where the main supplier does not have a cloud solution or where the supplier offering is inappropriate
Features
- Secure private hosting
- Primavera hosting managed by Primavera consultants
- Bespoke managed secure hosting
- Remote access
Benefits
- Privately managed Primavera hosting
- Support from Primavera consultants
- Highly resilient and robust
- Quickly access from anywhere
Pricing
£80 to £90 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 8 3 2 1 0 2 7 6 3 3 7 0 7 5
Contact
Primo Milestone
Jinesh Patel
Telephone: (0)1525 243404
Email: jinesh.patel@milestoneuk.com
Service scope
- Service constraints
-
From time to time there will be planned maintenance. These are usually once per quarter and are normally required for security reasons. Customers will be informed in advance.
We endeavour to have these outside normal business hours. - System requirements
-
- Business grade desktop or laptop
- Reliable Internet Connection
- Exclusion from Content Inspection is desirable to reduce latency
- Oracle licencing
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our metrics show average response time to email is 7 minutes. Our standard contracted support excludes weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Definitions
1 - Urgent Total loss of service
Service unavailable or severely degraded to all users.
2 – High Service impaired or degraded
Poor response times experiences by some users.
Issues with non-essential functionality.
3 - Medium Service change requests, non urgent tasks
Create, delete or suspend accounts.
Change permissions.
Expired passwords, other login issues.
4 – Change Request Non service affecting works
Upgrades.
Upgrade versions.
Add new applications.
Restore Databases to previous points in time.
First Line Response Target Resolution
1 – Urgent 30 Minutes 2 Hours
2 – High 1 Hour 4 Hours
3 – Medium 2 Hours 8 Hours
4 - Change Request 1 day To be agreed
Customers are provided wit Account managers and direct access to support engineers. Support cost is included in service cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We advise clients on options for migrating their data. If required we can run integrity scripts on user data to identify inconsistencies and corruption. We can cleanse data and upgrade database versions.
For user we provide detailed documentation on using the service and can run workshops on getting started.
We provide a sandbox environment for users to test scenarios. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
First there is no charge for data handover.
User can request their data as a standard Oracle RMAN backup or Oracle DBDump file. In addition users can export individual project as Oracle Primavera XML or XER files. - End-of-contract process
-
We offer to provide the data to the client free of charge.
We will keep the data for 30 days and will securely erase it to UK Government standards after that time.
There is no additional costs at the end of the contract for transferring or destroying the data.
Using the service
- Web browser interface
- Yes
- Using the web interface
- All functions are available via the web interface
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- Testing was done by Oracle.
- API
- Yes
- What users can and can't do using the API
-
Web Services are implemented and fully documented.
There are no particular limitations.
Oracle's web interface follows Oracle accessibility philosophy and policies found at www.oracle.com/us/corporate/accessibility/policies/index.html.
The Oracle Accessibility Guidelines are based on the2017 Revised Section 508 of the Rehabilitation Act of 1973 as amended, and the World Wide Web Consortium's(W3C) Web Content Accessibility Guidelines version 2.0 guidelines at the AA level (WCAG 2.0 AA). Oracle is committed to developing new products in conformance with Revised Section 508 and the WCAG 2.0 AA standards to the extent practicable. Our online documentation follows OAG 3.0, by fully adopting the Revised Section 508standards. In 2017 the U.S. Access Board announced the Revised Section 508 standard that is based on the WCAG 2.0 AA standards. In 2014, the European Union standard EN 301 549 ‘Accessibility requirements suitable for public procurement of ICT products and services in Europe’ was issued in response to Mandate 376, and it too was based on the WCAG 2.0 AA standards. Oracle has been an active participant in the development of these guidelines and is closely tracking their progress. - API automation tools
-
- Ansible
- Chef
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Each customer environment is unique. They are not shared or federated.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Oracle
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Entire customer database
- Virtual server snapshots
- Backup controls
-
As standard, backups of customer databases are made on a daily basis, 7 days a week and a minimum of 10 backup iterations are kept. Customers do not control backups.
In addition snapshots of database and application servers are made on a daily basis and a minimum of 10 iterations are kept. - Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We guarantee 95% availability for the entire service.
customers are refunded on a pro-rata basis for any downtime that exceeds 1one working day. - Approach to resilience
-
We use virtualisation technology to dynamically move servers between physical hosts when hosts are highly loaded.
We use dual independent power feeds to all server racks and servers.
We use 2 separate backup technologies and copy server images to a standby datacentre on a daily basis.
We use Highly Available clustered internal and external firewalls. - Outage reporting
-
A private dashboard in our operations centre
email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are on a dedicated firewalled subnet.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Dedicated link (for example VPN)
- Devices users manage the service through
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 19/02/2023
- What the ISO/IEC 27001 doesn’t cover
-
Both datacentres are ISO 27001 certified.
The hosting service offered by Milestone is not yet certified. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Out Technical director defines policies for the management of information security and sets direction and provides advice to help protect client data.
They coordinate the reporting of information security risk to our Directors.
Our Information Security programs are designed to preserve the confidentiality, integrity and availability of data , accessed, used, maintained, and hosted by us. - Information security policies and processes
-
The hosting and security teams both report to our technical director
We implement a number of security policies including but not limited to
Remote access
Password management
Portable media
Acceptable use
Data Destruction
Use of management network
Backups
Disaster Recovery
Security Training
Account disablement
We ensure policies are followed by monthly reviews where we review incidents, access logs, account usage. Serious breaches of policy result in disciplinary proceedings.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our change management process follows clear steps
Description - what will change.
Why it must be done and will it impact security.
Who will be involved.
Links to documentation, e.g., security bulletin
Pre-installation plan including
Consent - warn those affect and obtain consent
Backup.
Install plan - in as much detail as possible
Post-installation. Check that the system and anything interacting with it works correctly. revert any temporary settings. Make changes to the documentation.
Backout Plan. Actions that will be performed in case of problems within a reasonable time; - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We are in receipt of various security bulletins including those specific to our services - for example Oracle's quarterly security bulletin.
We access new vulnerabilities and plan our mitigation approach accordingly.
Normally we patch once a month in a regular scheduled 4 hour window. However with serious vulnerabilities we liaise with clients to schedule an emergency patch window. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We use intrusion protection on external firewalls to block IPs with suspicious activity.
We review all outbound activity on firewall logs and investigate any anomalies e.g., denied requests.
We continuously monitor servers for various conditions such as URL availability. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Users may report incidents via email or phone call or we may discover incidents from monitoring or alerts.
We use a straightforward incident management process that defines procedures for
Incident Logging and Categorisation
Notification & Escalation
Investigation and Diagnosis
Resolution and Recovery
Incident Closure
users are informed of an incident as soon as one is detected and will receive updates as new information become available. After resolution the receive an full incident report.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
We uses a walled garden approach where each organisation have an entirely separate environment with its own dedicated database and application servers and subnet.
It is not a federated solution.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Telstra is part of the Climate Change Agreement in the UK, and complies with the 2018 Streamlined Energy and Carbon Reporting scheme and the Energy Savings Opportunity Scheme.
The datacentre is now running on 100% renewable energy sources. In addition, all fixtures and fittings now include motion detector LED lighting to improve energy efficiency, and a water osmosis system has been implemented to improve the building’s water efficiency and cooling. These important steps follow changes we made in 2018, when we installed new chiller units that have improved energy efficiency by more than 40 per cent.
more info: https://www.telstra.co.uk/en/news-research/articles/running-on-100-renewable-energy-powering-telstras-move-to-sustainability
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Primo Milestone Ltd recognises that discrimination and victimisation is unacceptable and that it is in the interests of the Company and its employees to utilise the skills of the total workforce. It is the aim of the Company to ensure that no employee or job applicant receives less favourable facilities or treatment (either directly or indirectly) in recruitment or employment on grounds of age, disability, gender / gender reassignment, marriage / civil partnership, pregnancy / maternity, race, religion or belief, sex, or sexual orientation (the protected characteristics).
Pricing
- Price
- £80 to £90 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
We provide a free trial if the client can provide a rational for the trial.
Trials include all features of the service.
Trials are limited by time - typically this is 15-30 days.