Bullseye's technology transforms human capital management processes by incorporating automation, gamification, workflow management and analytics to enhance the user experience and help create a more engaged workforce.

Global Infrastructure

The Amazon Cloud spans 66 Availability Zones within 21 geographic Regions around the world, with announced plans for 12 more Availability Zones and four more Regions in Bahrain, Cape Town, Jakarta, and Milan.


Revolutionary Service - Innovative Solutions - Cutting-Edge Technology

  • Desktop Operating Systems
    Internet Explorer 10+, Firefox 2.0+, Chrome 1.0+, Safari 4.0+.
  • Smart Devices (Tablets)
    iPad and iPad mini (Safari), Android (Build-in Browser).
  • Screen Resolution
    Screen with minimum resolution of 1000px.
  • Operating System
    Bullseye solutions are independent cloud services compatible with all OS.

Human Capital Management
  • Java Runtime Environment Requirements
    Java Standard Edition, Version 7 or higher is required.
  • Network Bandwidth Requirements
    Bullseye software solutions are highly responsive and are hosted on powerful servers which do not require extraordinary bandwidth. The recommended connection speed is 250-350 Kbit/second.

Bullseye Software Plugs and Plays with Key Enterprise Apps to Make Life Easier for HR and Employees

Single Sign-On

SAML 2.0 is the Single Sign-On (SSO) open standard that Bullseye Engagement supports when the desire is to have the user login to Bullseye solutions using a third party app or company intranet login.

Login API

The Login API is an alternative method to get an API key that identifies a particular user.

Employee Profile API

The Employee Profile API automatically synchs with profiles stored in other systems - such as HRIS & third-party systems, making it the single source of talent data about an employee.

Through Amazon Cloud, Bullseye is compliant

ISO 27001 & 27002 PCI-DSS SSAE16 SOC 1, 2 & 3 Safe Harbor CPS

Our clients frequently ask us "is my data safe?"

When you entrust Bullseye Engagement with your data and processes, we take it seriously

Access Control


Encrypted Storage & Backups

Log Management

Antivirus software

Intrusion detection system (IDS)