Do you have a complex IAM project on the horizon? Given our team’s expertise and innovative spirit, along with a shared quest to do the right thing, we’re happy to take you through our second-to-none experience and respond to even the most grueling of adventures.

Do you have a challenging IAM project to bring to the finish line? Nulli has a knack for turning struggling projects around and achieving success, nimbly and quickly.

Design

Think of us as your IAM expedition leaders. Expedition leaders assess each stage of the IAM journey delivering a balanced approach that addresses all facets of identity. IAM regulations, protocols, middleware, security, usability and reliability are assessed by Nulli to define a path to a successful IAM deployment. We use our experience and innovative flair to make your success our highest priority.

Some unique areas of expertise:

 

 

Customer Identity Access Management (CIAM)   

Nulli CIAM deployments let you focus on your customers and not the other way around. 

 

Nulli thrives on big, customer-facing deployments that service millions of identities. These identities of people, processes, and things are secured by an access management system to provide a true Identity Relationship Management (IRM) solution.

 

Role Mining

Our expertise with role-based access control systems, data modelling, and graph algorithms allows us to deliver creative solutions that promise effective and performant role mining based on graph traversal techniques. Our team of Neo4j Certified Professionals can work with your solution delivery team to resolve the complexities of your role mining requirements.

 

Graph Repositories

All identities in your organization – from customers, employees, contractors, devices, networks and more — require securing. Using a Graph structure, we establish relationships and connections in your security infrastructure at the identity layer, including the exposure of invalid relationships. Graphing sensitive Personally Identifiable Information (PII) helps us collect and manage PII under the present and future regulatory requirements.

 

 

 

Securing Microservices

Nulli leverages its experience with graph databases to establish and enforce policies required to protect an organization's microservices architecture.

 

Proof of Concept (POC)

You may be looking to prove out your recommendations for the best solution to meet your Identity Management needs. Nulli has an excellent Proof of Concept (POC) track record. We are able to rapidly understand the business challenge at hand and we make recommendations in the best interest of the client regardless of what that might mean for future opportunities for Nulli.

 

Whether you want to offer your users the convenience of social login or strong multi-factor authentication, we can supply you with the cost-benefit and risk-exposure analysis for deploying and supporting each technique.

 

Deploy

Understanding the nature of your business needs allows us to define a deployment approach to best achieve your identity goals.

We know all about:

 

 

Identity Management

Following well-established paths, Nulli deploys rapid, reliable, and repeatable Identity Management services. These include identity data stores, user profile management, user authentication, access policy enforcement and more.

 

We model and maintain the relationship between human identities, machine identities and process identities to achieve a secure, scalable and supportable IAM infrastructure.

 

Authorization

In order to make authorization decisions that keep your business secure, we need to understand the relationships between what defines your customer identities, your roles and the devices people use. Access management has long been our specialty, having successfully executed over 100 implementations since 1998.

 

 

Authentication

We believe that enforcing your security policies while providing a fast and accurate authentication experience is critical for your organization.

 

Our understanding of the importance of speed and accuracy is reflected by how we use proven identity protocols to provide reliability and scalability. This is especially true for customer-facing applications that are key to an organization’s growth in revenue stream.

 

If you are wanting to implement authentication via Google, Facebook or other social media platforms, Nulli has experience and can help.

 

 

Directories

We started our identity journey by working with clients deploying LDAP (Lightweight Directory Access Protocol) solutions to secure their online presence. Nulli leads the way in deploying an identity repository that is secure, always available, fault-tolerant and performant.

 

Drawing on our innovations deploying LDAP enabled directories, in conjunction with graph databases, we help clients scale their user directories with hundreds of millions of entries in a secure, manageable fashion.

 

We have experience with a variety of products including ForgeRock DS (formerly OpenDJ), Radiant VDS, Radiant FID, Microsoft AD and ODSEE. We’ve also automated the installation and configuration of DS and VDS/FID.

 

Graph Identity Repositories

We can steer you through using Neo4j authorization policies and plug-ins for ForgeRock AM or through Neo4j graph-based role management for IAM. If a graph database strategy or a deployment roadmap is what you are looking for, we can also help lead the way.

 

Cloud, On-Prem or Hybrid

We commonly work with cloud services such as Amazon AWS, Google GCP and Microsoft Azure to provide rapid access and managed deployment environments. Alternatively, if your organization requires an on-premises solution or a hybrid of both, we employ similar tactics to ensure rapid access in a managed environment.

 

Innovate

Innovation isn’t a result of doing a good job — innovation is our job, and we live it every day. The forward-thinking graphing technology we’ve developed helps us model and query any connected data, making your own Identity Management system easier to understand.

Some of our innovative projects:

 

 

Authentication and Authorization using Neo4j

Nulli authentication and authorization plugins expose contextual relationships between identity attributes using the Neo4j database. These plugins provide ForgeRock AM with the results of complex relationship-based access policy decisions.

 

Authorization decisions are returned to AM using the Nulli graph database plugin as a policy decision point (PDP). The Nulli plugin conforms to the ForgeRock AM API enabling AM to make graph-based authorization decisions in its own pluggable framework.

 

NIAM - Graph Based Identity Management

A graph data model gives you a flexible, future-proof and fast identity data store. We support a graph-based solution for resolving authentication solely through a Neo4j graph database.

 

Common methods like OIDC, OIDC2, and social login are deployed using a microservices architecture and are out-of-the-box ready today.

 

Neo4j Grand Stack Microservices Deployment

Using GraphQL, React, Apollo and a Neo4j graph database, we have rapidly completed the first microservices-based authentication platform, NIAM. Our development of NIAM is entirely reliant on our Grand Stack approach and our unique skill set. Coupled with CI/CD expertise for the cloud and the use of agile tools like Jira, Bitbucket and Confluence, we see the cost savings and benefits to our customers every day.

 
 

Support

Online applications and the way people interact with them will constantly change, whether it is through iterative minor changes facilitated by the power of DevOps or more significant product upgrades. Our commitment to our clients, even after project completion, means that you can trust that you have a resource ready to assist at any time.

Some ways we provide support:

 

 

Ongoing Support

Our commitment doesn’t end when the project does. We have the skill and expertise to provide post-implementation and upgrade support services for your complex IAM solutions.

Service Level Commitment

Our work isn’t done even after deploying the right solution for you. Our knowledge of IAM and our problem-solving skills go beyond the planning, design and deployment. We’re here whenever you need us.

ForgeRock Upgrades

We have proven reliable and repeatable upgrade processes for your ForgeRock infrastructure, regardless of whether your version is still supported by ForgeRock. Upgrades from all release levels and complexities are not new to us. Call for a consult on how we can bring you back up to speed in no time.

DevOps

We bring our expertise using Docker containers, Kubernetes, Ansible, Vagrant and other DevOps tools to every globally deployed and supported identity infrastructure. These infrastructures provide secure access management to millions of identities, saving you money and, more importantly, time.

 

Our experience automating ForgeRock deployments support any of your cloud(s) DevOps strategies. We support your strategy or assist with defining a move to automation of your IAM support and maintenance. If needed, we can help direct you through utilizing Continuous Integration and Continuous Deployment (CI/CD) DevOps Platforms.

 

Can't find what you're looking for?

Let us guide you through the world of Identity Management.