> SECURITY > IAM > Consulting & Services
A+ A-

Consulting services
Building on its in-depth expertise in identity and access management, Bull helps organizations to define their authorization processes and implement decentralized or centralized IAM infrastructures.

Audit and consulting: Align IAM security and business processes, in line with industry best practice and standards (ISO 2700x, PCI-DSS...)

From strategic analysis to operational consulting, Bull’s specialist security consultants work with you to identify and prioritize risks, define security governance and deploy the most appropriate security solutions for your particular business process needs.

  • Strategic plans and IT masterplans
  • Specifications and ROI studies
  • User awareness-building and change management
  • ‘Cyber crisis’ management
  • Risk audits
  • Vulnerability tests
  • Intrusion tests
  • Dashboards and control mechanisms
Architecture and integration: Build powerful, yet flexible IAM systems, that actively support the organization's business growth and development

From architecture to implementation, Bull’s security experts help you with the design, development, integration and implementation of secure IT infrastructures.

  • Security architecture
  • Pilot programs: implementation and integration
  • Proof-of-concept
  • Product and interoperability tests
  • Developing technical components
  • Implementing security solutions
  • Program management support
  • Project management
Security operations: ensure end-to-end support of IAM systems over time and ensure that they evolve, from development of recovery plans to secure IS facilities management

Bull’s outsourcing and support services provide you with a wide range of tailored front-line assistance, disaster recovery planning and outsourcing services.

  • Operational support: remote operation, hot-lines…
  • Secure outsourcing
  • Disaster recovery planning

A full range of advanced security technologies

As a security integrator, Bull selects and integrates the best products and technologies on the market, to create solutions that are very closely adapted to the needs of each type of business. The company uses corporate directory, user provisioning, PKI, biometric access control and SSO technologies, and much more, from partners or its own labs (Evidian, MetaPKI, MetaSign, MetaTime, globull…). Through its subsidiary Bull Evidian, Bull is the European leader in IAM.

Retour haut de page
Print page.Send page.Share on Facebook.Share on Linkedin.Share on Viadeo.Share on Technorati.Share on Digg.Share on Delicious.Bookmark this page on Google.Share on Windows Live.Share on Twitter.
For a successful economic recovery in complete security
More info
By Hassan Maad, General Manager, Bull Evidian
Total chooses Bull for its access control security
More info