fingerprint.png

We are

problem-solvers

at our core.

Do you have a complex IAM project on the horizon? Given our team’s expertise and innovative spirit, along with a shared quest to do the right thing, we’re happy to take you through our second-to-none experience and respond to even the most grueling of adventures.

Do you have a challenging IAM project to bring to the finish line? Nulli has a knack for turning struggling projects around and achieving success, nimbly and quickly.

Strategic IAM Advisors

Requirements Gathering

Understanding your needs allows us to deliver the most efficient and effective solution for your Identity Management situation. Our requirements gathering process is defined by the years of asking the right questions of our clients and prospects. Your team and Nulli address strategic and tactical questions to establish objectives to achieve your goals.

 

IAM Architecture

Accounting for your functional and technical constraints, we design and define an identity infrastructure to represent a workable and supportable solution.

Proof of Concept

We rapidly understand your IAM vision and business challenge at hand and make impartial recommendations in your best interest.

Choosing IAM Cloud or On-Prem or Hybrid Solutions

We will help you decide which solutions work best for your situation and we have deep experience in implementing any approach. We work with all Cloud services and are experienced in ForgeRock Identity Cloud.

IAM Health Check

The continuing exponential growth of IAM technology, combined with regulatory requirements requires regular assessments of your IAM platform. Trust us to assess your IAM deployment with an eye to bringing you the most up-to-date IAM direction for securing solutions.

 

Identity Management

CIAM - Customer IAM

Big, customer-facing deployments servicing millions of identities are where we excel. The identities of people, processes, and things need to be secured at scale and will rely on the latest in true Identity Relationship Management (IRM) solutions.

 

DevSecOps for IAM

We understand the importance of deployment automation through DevOps. Further, DevSecOps ensures that security is in the forefront and we have a team who do this including leveraging ForgeOps and our own proprietary templates.

IAM Implementation Success

With over 250 years of experience in the Identity and Access Management industry, and over 100 IAM clients all around the world, you can trust Nulli to deliver implementation success. We know how to integrate any IAM solution with all of your enterprise applications.

Multi-factor Authentication

Our experience with MFA means that we are able to knowledgeably assess your needs. We work with you to define and deliver a strategy that allows your customers and workforce to trust that their access is secure in a world where trust is easily lost.

SSO, Federation, SAML, OIDC, OAUTH

Whichever type of authentication and authorization method best suits your organization, we can apply it.

True Identity Relationship Management (IRM)

Authorization policies for consent or secure access to protected resources is most granular when applied at the relationship level. Using graph-managed IAM data to achieve these goals provides an organization a long term solution to supporting complex authorization decisions. We can help you with our out-of-the-box integration for ForgeRock AM and IG using graph-based authorization policies.

 

ForgeRock Expertise

Customizations

Rely on us to provide you with experience and expertise customizing ForgeRock IAM solutions that address your organization’s requirements. We are known for our ability to create custom ForgeRock Nodes or modify existing Nodes to meet your business needs.

 

Upgrades and Support Programme

  • Nulli is your ForgeRock Accredited Delivery Partner. Trust us to provide continuous, on-going support for your ForgeRock IAM solution, even after the project go-live has occurred.

  • ForgeRock ver x to 7.x version upgrades is something we excel at delivering. Stay current on the supported releases of ForgeRock with upgrades or patches and more by relying on Nulli.

  • ForgeOps is a model DevOps template that we support to provide a reliable automation of your ForgeRock platform across multiple environments. Automation of deployments reduces time and costs of supporting and upgrading your ForgeRock investment.

Access Management (AM)

We know AM. We implemented AM when it was a Sun Microsystems open-source product and have been at ForgeRock’s side since they opened their doors.

IDM

We have years of experience with ForgeRock IDM, dating back to when it was first launched in ForgeRock Version 5.

Identity Gateway (IG)

ForgeRock IG is the “swiss-army” knife module that allows legacy applications and current day applications to interact in an identity architecture that is transparent to both. Nulli has years of experience leveraging this module to the benefit of our clients.

Directory Services (DS)

Allow us to assist in implementing the ForgeRock Directory Services platform. It is the fastest and most secure directory platform to manage all the identities in your organization.

Identity Cloud

We worked on one of the first Identity Cloud implementations. Most digital environments are moving towards the cloud, and Identity Management is too. Work with us to transform your identity platform to be safely and securely managed in the cloud.

Neo4j Integrations

Nulli is the only partner that provides integration of the Neo4j graph database and the ForgeRock Identity Platform. Extending ForgeRock to utilize the power of graph technology to secure every person and every thing based on granular identity relationships.

 
 

Identity and Graph

Role Mining

Our expertise with role-based access control systems, data modelling, and graph algorithms allows us to deliver creative solutions that promise effective and performant role mining based on graph traversal techniques.

 

ABAC, RBAC and ReBAC

Relationship-Based Access Control (ReBAC) is the next step to strive for in your Role-Based Access Control (RBAC) journey, already a finer grain than the Attribute-Based Access Control (ABAC).  Nulli has defined and deployed the ReBAC model to provide granular access management decisions to your Access Management architecture.

Consent and UMA

Using our RelBAC model from IRM, Nulli is at the forefront of Consent and UMA, addressing who has access to what information for any specific time frame.

IRM Neo4j Graph and Graph Integration

Nulli embraced Neo4j graph solutions in 2013 and we've been building our expertise and experience with defining, deploying and supporting this leading technology. Applying graph-managed relationships to the IAM field is a natural path for your organization to follow. Let us be your guides.

Graph Repositories

Using a Graph structure, we establish relationships and connections in your security infrastructure at the identity layer, including the exposure of invalid relationships.

Identity Analytics

Using graphs allows us to apply Identity Analytics, providing insight on the data that translates into actions that need to be taken. This effort supports your Identity Governance and Risk Management specifications.

Can't find what you're looking for?

Let us guide you through the world of Identity Management.