Partner Details

FirstAttribute, a software development and consulting company, was founded in 2000.
We develop strong, robust enterprise Identity Management and security software, and have leading knowledge of AIM (Access and Identity Mangement) and migration projects.

Our Core Competence
An extensive knowledge of and experience with distributed technology platforms and mainframe/legacy environments has enabled us to develop solutions for a wide range of clients in many industries.

Our customer-base
Solid, varied, satisfied. Over 50% are Fortune 500 or Global 500 companies.

Our expertise
Our focus is on the administration and management of the user life-cycle identity management. Our product and consulting solutions benefit our customers by providing them with enhanced security, data integrity, delegated provisioning, cost savings, process improvements and password management automation.

Our edge
Flexibility, Responsiveness. Knowledge. Skill.

 Sponsored Events

Date Title
May 05  ‑ May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.



Cognitive Security: The Future of Cybersecurity is Now

The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]

Latest Insights

Hot Topics


Learn more

Real-Time Security Intelligence & Big Data in Security

Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00