Skip to main content

Help us improve the Digital Marketplace - send your feedback

PENTAGON SOLUTIONS (NI) LIMITED

Accruent RedEye with Maintenance Connection

Accruent RedEye - SaaS based Document Management Solution for asset owners and critical infrastructure operators - Change, release, handover, collaboration management, IP Control, Regulatory Compliance.
Maintenance Connection - CMMS built for real time maintenance management of assets with the scalability of an EMS.

Features

  • Engineering Change Management
  • Release Management
  • Handover Management
  • Collaboration
  • Fully managed concurrent engineering
  • Integration with other Enterprise systems
  • Work Order Management
  • Preventative Maintenance
  • Reporting

Benefits

  • Visibility and control - Quick set up of controlled projects
  • Integration with other enterprise systems removing data silos
  • Full control of change management process
  • Reduced search time
  • Seamless handover of as-built data
  • Improved compliance to internal quality standards and procedures
  • Real time maintenance management of assets
  • Create work orders in seconds, track and update from field
  • Record and access critical PM Data across multiple locations
  • Tailored reports, keep all informed on Preventative Maintenance

Pricing

£12,600 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@pentagonsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 6 9 4 7 2 3 5 3 3 1 1 5 8 4

Contact

PENTAGON SOLUTIONS (NI) LIMITED Matt McVicker
Telephone: 02890455355
Email: info@pentagonsolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
Cloud service regular updates and patches. Updates every 3 months. 99% up time
System requirements
Windows operating client 64 bit

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Response times depend on the individual SLA and support package purchased.

Support is provided Monday to Friday between the hours of 9am and 5pm
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Basic support direct with Accruent included in subscription price.

Price can be supplied for SLA directly with Pentagon Solutions, based on individual requirements
Support available to third parties
No

Onboarding and offboarding

Getting started
On-line training and User documentation
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
In-build tools - export to cloud, version history, extended Meta data
End-of-contract process
Contract purchased as a minimum term. Additional cost applies for renewal for further term.
12 months notice required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Same functionality
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Runs on Azure service
Accessibility standards
None or don’t know
Description of accessibility
CONNECTIVITY
• Cloud based with data stored locally
• Connect field teams
• Mark-up in the field
• Full off-line functionality
• Any device Any time with Web, IOS and Android applications
• CAD licences not required to view files in RedEye
Accessibility testing
N/A Runs on Azure service
API
Yes
What users can and can't do using the API
Public API
- RESTful API that supports GET and POST requests
- Used to retrieve and update information within RedEye
- is a set of HTTP endpoints
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
RedEye is designed around feature-rich industry best practices related to engineering document management where features can be enabled and disabled on organization needs and configuration options are available for those elements that are unique to an organization.
Custom solution design with API integration capability with 3rd party applications.

Scaling

Independence of resources
Shared resource for bulk upload. General usage each user has assigned resource

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Accruent, LLC

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Check out or drag out
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service runs on Azure server.
Approach to resilience
Runs on Azure Service
Outage reporting
Status.accruent.com Accruent status page is a real time view of Accruent hosted solutions and services.
Reports on service, UP, AFFECTED, DOWN and provides notifications and planned maintenance.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
OAUTH2 compatable authentication can be configured to allow SSO and MFA
Access restrictions in management interfaces and support channels
Security account control access and rights.
Authentication is one of the most basic and top-layer security
requirements, as it establishes the identity and credentials of the user accessing the system. Access to the RedEye requires authentication via one of the supported methods, including SAML based Federation, Social Login or OpenID Connect. Tenant administrators can configure as many identity providers as needed to support their business use cases.
RedEye utilizes new-user approvals, account management, session timeouts, and more to manage overall authentication and controls.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
System security encompasses preventive measures that protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Successful network security creates a secure platform (across all physical and software components) for computers, users and programs to perform critical functions within a secure environment. VFA's network security policy encompasses details about overall application architecture, systems protocols, encryption, firewalls, antivirus, intrusion and vulnerability management.
Platform Design : RedEye is hosted on Microsoft azure platform leveraging best-practice security, scalability and management tools. RedEye is built upon multi-tenant SaaS Architecture that is designed to segregate and restrict data access for customers based on their business needs. Software Design - Technology - Utilizes Azure Paas and Saas services.
Data Architecture and Logic: Data architecture is contained within Microsoft Azure and uses a combination of databases, such as SQL Azure, for structured data and blob, and table storage or unstructured data.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Minor updates applied every 2 months, major updates applied ever 6 months. End users made aware and have the opportunity to test in their own environment. If you don't want changes applied you can opt out. More details can be supplied if required.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Normal priority patches are deployed monthly. Emergency patches will be expedited.

Change Management: All changes undergo a risk based multi-discipline evaluation before deployment to production environments.

Accruent notifies tenants when material changes are made to information security and/or privacy policies.

All third parties, undergo their own independent testing and adherence to ISAE 3402 and Soc 2 Type compliance, as well as HIPPA and several other compliance measures.Multi-level security training is required for all Accruent personal.
Pentests are performed through the development process and full tests aon a yearly basis.
Static and Dynamic Application Security Testing tools integrated in development process.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All RedEye servers are equipped with an antivirus software which is part of the application monitoring.
Penetration Testing: External penetration testing is conducted on a yearly basis. Internal security testing happens on a continuous basis.
Vulnerability Management: During penetration testing, network layer vulnerability scans are also performed to identify weaknesses within the application as well as the infrastructure and the OS layers.
Vulnerability Classification: Security issues are classified into low, medium and high priority incidents in alignment with production team and organizational leaders.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Logged to Pentagon support page for evaluation collation and to address as required

All RedEye servers are equipped with an antivirus software which is part of the application monitoring.
Penetration Testing: External penetration testing is conducted on a yearly basis. Internal security testing happens on a continuous basis.
Vulnerability Management: During penetration testing, network layer vulnerability scans are also performed to identify weaknesses within the application as well as the infrastructure and the OS layers.
Vulnerability Classification: Security issues are classified into low, medium and high priority incidents in alignment with production team and organizational leaders.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

Committed to providing quality service in manner that ensures safe and healthy workplace for employees and minimise potential impact on environment. Operate in compliance with all relevant environmental legislation and strive to use pollution prevention and environmental best practices. As part of drive to reduce waste Pentagon have a paperless office and integrated Electronic DMS, core to business since 2003 implementing a ‘Think before you print’ policy. Pentagon have a fully integrated recycling system, including initiatives for provision of company water bottles and reduce waste of disposable cups. Key strategy is to:
1. Integrate consideration of environmental concerns and impacts into all decision making and activities;
2. Promote environmental awareness amongst employees and encourage them to work in environmentally responsible manner;
3. Train, educate and inform employees about environmental issues that may affect his/her work;
4. Reduce waste through re-use and recycling and by purchasing recycled, recyclable or re-furbished products and materials where these alternatives are available, economical and suitable;
5. Promote efficient use of materials and resources throughout its facility including water, electricity, raw materials and other resources, particularly those that are non-renewable;
6. Avoid unnecessary use of hazardous materials and products, seek substitutions when feasible, and take all reasonable steps to protect human health and the environment when such materials must be used, stored and disposed of;
7. Purchase and use environmentally responsible products accordingly; where required by legislation or where significant health, safety or environmental hazards exist.
8. Communicate its environmental commitment to clients, customers and public and encourage them to support it;
9. Strive to continually improve its environmental performance and minimise the social impact and damage of activities by periodically reviewing its environmental policy in light of current and planned future events.
10. Meet or exceed all environmental legislation that relates to the Company.

Equal opportunity

We recognise that discrimination is unacceptable and although equality of opportunity has been a long standing feature of our employment practices and procedure, we have made the decision to adopt a formal equal opportunities policy. Breaches of the policy will lead to disciplinary proceedings and, if appropriate, disciplinary action.
The aim of the policy is to ensure no job applicant, employee or worker is discriminated against either directly or indirectly on the grounds of race, colour, ethnic or national origin, religious belief, political opinion or affiliation, sex, marital status, sexual orientation, gender reassignment, age or disability.
The recruitment and selection process is crucially important to any equal opportunities policy. All applicants who apply for jobs with us will receive fair treatment and will be considered solely on their ability to do the job.
Senior staff receive training in the application of this policy to ensure that they are aware of its contents and provisions.
We maintain and review the employment records of all employees in order to monitor the progress of this policy.

Wellbeing

We at Pentagon Solutions Limited recognise our duties under the Health and Safety at Work (Northern Ireland) Order 1978 and the accompanying protective legislation. We will endeavour to meet the requirements of this legalisation to ensure that we maintain a safe and healthy working environment. Our managers and supervisory staff are informed of their responsibilities to ensures they take all reasonable precautions, to ensure the safety, health and welfare of those that are likely to be affected by our undertaking.
Pentagon Solutions Limited recognises so far as is reasonably practicable the duty to ensure the following:
• To provide and maintain a safe place of work, safe systems of work, safe equipment and a healthy and safe working environment.
• To ensure that hazards are identified, and regular assessments of risks are undertaken.
• To provide information, instruction and training as is necessary to ensure employees and others are assured of a safe and healthy working environment.
• Promoting the awareness of health and safety and encouraging health and safety best practice throughout our organisation.
• To ensure we are taking the appropriate protective and preventative measures.
• To ensure that we have access to competent advice and are able to secure compliance with statutory duties.

Pricing

Price
£12,600 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@pentagonsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.