Bullseye's technology transforms human capital management processes by incorporating automation, gamification, workflow management and analytics to enhance the user experience and help create a more engaged workforce.

Global Infrastructure

Through Rackspace, our enterprise-grade global data centers are located in Chicago, Dallas, Northern Virginia, London, Hong Kong and Sydney.

Bullseye Technology Global Infrastructure


Revolutionary Service - Innovative Solutions - Cutting-Edge Technology

  • Desktop Operating Systems
    Internet Explorer 10+, Firefox 2.0+, Chrome 1.0+, Safari 4.0+.
  • Smart Devices (Tablets)
    iPad and iPad mini (Safari), Android (Build-in Browser).
  • Screen Resolution
    Screen with minimum resolution of 1000px.
  • Operating System
    Bullseye solutions are independent cloud services compatible with all OS.

Human Capital Management
  • Java Runtime Environment Requirements
    Java Standard Edition, Version 7 or higher is required.
  • Network Bandwidth Requirements
    Bullseye software solutions are highly responsive and are hosted on powerful servers which do not require extraordinary bandwidth. The recommended connection speed is 250-350 Kbit/second.

Bullseye Software Plugs and Plays with Key Enterprise Apps to Make Life Easier for HR and Employees

Single Sign-On

SAML 2.0 is the Single Sign-On (SSO) open standard that Bullseye Engagement supports when the desire is to have the user login to Bullseye solutions using a third party app or company intranet login.

Login API

The Login API is an alternative method to get an API key that identifies a particular user.

Employee Profile API

The Employee Profile API automatically synchs with profiles stored in other systems - such as HRIS & third-party systems, making it the single source of talent data about an employee.

Through Rackspace, Bullseye is compliant

ISO 27001 & 27002 PCI-DSS SSAE16 SOC 1, 2 & 3 Safe Harbor CPS

Our clients frequently ask us "is my data safe?"

When you entrust Bullseye Engagement with your data and processes, we take it seriously

Access Control


Encrypted Storage & Backups

Log Management

Antivirus software

Intrusion detection system (IDS)