Hoffredder 40 • 21456 Wentdorf • Deutschland
Phone: +49 40 72 97 60 94
Fax: +49 40 72 97 60 95
FirstAttribute, a software development and consulting company, was founded in 2000.
We develop strong, robust enterprise Identity Management and security software, and have leading knowledge of AIM (Access and Identity Mangement) and migration projects.
Our Core Competence
An extensive knowledge of and experience with distributed technology platforms and mainframe/legacy environments has enabled us to develop solutions for a wide range of clients in many industries.
Solid, varied, satisfied. Over 50% are Fortune 500 or Global 500 companies.
Our focus is on the administration and management of the user life-cycle identity management. Our product and consulting solutions benefit our customers by providing them with enhanced security, data integrity, delegated provisioning, cost savings, process improvements and password management automation.
Flexibility, Responsiveness. Knowledge. Skill.
|May 05 ‑ May 08, 2009||
European Identity Conference 2009
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]