Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Date Range

Methodology

Topics

Region

Vendor

7 results in Reports

  • Andras Cser
  • IT Services
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 763
  • For Security & Risk Professionals

    Report:Source Your Identity And Access Management Capabilities

    Build/Buy Capabilities: The Identity And Access Management Playbook

    Reducing the costs of an identity and access management (IAM) solution has been a top priority for security and risk professionals for a long time. Although IAM solutions have matured significantly...

    • Downloads: 1056
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 574
  • For Security & Risk Professionals

    Report:Best Practices: Identity Management In The Cloud

    Many companies are struggling to adopt cloud-based identity and access management (hosted IAM) because they typically end up overscoping this initiative or have a difficult time getting funding for...

    • Downloads: 1146
  • For Security & Risk Professionals

    Report:Case Study: Ingres Takes Advantage Of Identity Management In The Cloud

    Ingres, an open source database software and support services provider, knew that it needed to reform its online community by improving its ease of use, particularly in the area of identity...

    • Downloads: 417
  • For Security & Risk Professionals

    Report:Hosted Identity Is Real — Are You Ready For It?

    Identity and access management (IAM) projects have long been plagued with their long implementation times, high services-to-license ratios, integration challenges, labor-intensive build-out and...

    • Downloads: 1081
  • For Security & Risk Professionals

    Report:Identity-Management-As-A-Service

    The Evolution Of Identity Management

    Redesigning the enterprise architecture for identity and access management (IAM) is an important task. As organizations' requirements become more complex, and to keep administrative costs down, IAM...

    • Downloads: 1526