Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

81 results in Reports

  • Andras Cser
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management, Q1 2008

    Oracle Emerges As Leader, With IBM, Sun Microsystems, Novell, And CA Close Behind

    Forrester evaluated leading identity and access management (IAM) vendors across 117 criteria and found that Oracle has established itself as the IAM market Leader due to its solid technology base...

    • Downloads: 2725
  • For Security & Risk Professionals

    Report:Identity Management Market Forecast: 2007 To 2014

    Provisioning Will Extend Its Dominance Of Market Revenues

    The identity management — or identity and access management (IAM) — market will grow from nearly $2.6 billion in 2006 to more than $12.3 billion in 2014 (including revenues from both...

    • Downloads: 2673
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management, Q4 2009

    Oracle, CA, And IBM Lead, With Novell And Sun Microsystems Close Behind

    In Forrester's 79-criteria evaluation of identity and access management (IAM) vendors, we found that Oracle, CA, and IBM lead the pack because of a rich IAM portfolio (both organically developed and...

    • Downloads: 2734
  • For Security & Risk Professionals

    Report:Forrester TechRadar™: Identity And Access Management, Q2 2008

    Market Seeks Solutions That Support Business And IT Flexibility And Compliance

    Identity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...

    • Downloads: 2342
  • For Security & Risk Professionals

    Report:Topic Overview: Identity And Access Management

    Identity and access management (IAM) is the entire aspect of maintaining a person's complete set of information, spanning multiple identities and establishing the relationship among these various...

    • Downloads: 2601
  • For Security & Risk Professionals

    Report:Assess Your Identity And Access Management Maturity

    Assessment Framework: The Identity And Access Management Playbook

    An identity and access management (IAM) maturity model is necessary for assessing your current state against industry best practices, understanding your performance relative to that of your peers,...

    • Downloads: 2135
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1577
  • For Security & Risk Professionals

    Report:Identity And Access Management Predictions: 2011 And Beyond

    Requirements For Data Security, Mobile Devices, And Cloud-Based Services Will Forge Ahead

    For 2011, Forrester predicts that IT administration efficiency and business agility will become the main drivers for using identity and access management (IAM). A bevy of acquisitions during the past...

    • Downloads: 1641
  • For Security & Risk Professionals

    Report:Identity-Management-As-A-Service

    The Evolution Of Identity Management

    Redesigning the enterprise architecture for identity and access management (IAM) is an important task. As organizations' requirements become more complex, and to keep administrative costs down, IAM...

    • Downloads: 1528
  • For Security & Risk Professionals

    Report:Market Overview: Fraud Management Solutions

    Seven Tenets Of Effectively Combating Fraud Costs

    Fraud causes companies to lose money in many ways: They face losses due to chargebacks, unrecoverable transfers, and unnecessary shipping costs; and spend extensive time and resources investigating...

    • Downloads: 1623
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1402
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

    • Downloads: 1267
  • For Security & Risk Professionals

    Report:Privileged User Management Market Overview

    Centrally Managing System Administrator And Application Credentials

    Managing privileged users' access to sensitive systems needs to be centralized, policy-driven, and automated: Manual paper- or spreadsheet-based solutions are insecure, expensive, don't scale, and...

    • Downloads: 1034
  • For Security & Risk Professionals

    Report:Market Overview: Privileged Identity Management

    Six New Features And Capabilities Redefine PIM Architecture

    Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...

    • Downloads: 1196
  • For Security & Risk Professionals

    Report:Hosted Identity Is Real — Are You Ready For It?

    Identity and access management (IAM) projects have long been plagued with their long implementation times, high services-to-license ratios, integration challenges, labor-intensive build-out and...

    • Downloads: 1082
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Role Management And Access Recertification, Q3 2011

    Aveksa And SailPoint Lead, With NetIQ, Oracle, And CA Technologies Following

    Role management and access recertification has moved to center stage for security and risk (S&R) professionals, business, and auditors. It provides higher security because it provides a better...

    • Downloads: 1100
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management Suites, Q3 2013

    Comparing The Top Nine IAM Suite Options

    In Forrester's 16-criteria evaluation of comprehensive identity and access management (IAM) suites, we identified the nine most significant vendors in the category — Aveksa, CA Technologies,...

    • Downloads: 999
  • For Security & Risk Professionals

    Report:Best Practices: Enterprise Role Management

    Enterprise role management plays a central role in efficiently managing access rights and enforcing access policies such as segregation of duties (SoD). The processes and tools related to role...

    • Downloads: 1102
  • For Security & Risk Professionals

    Report:Market Overview: Enterprise Role Management

    Access Recertification And Role Management Converge, Integrate With Provisioning

    Enterprise role management, role mining, and access recertification help enterprises with maintaining segregation of duties, keeping up with regulatory compliance requirements, and automating...

    • Downloads: 967
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 1179
  • For Security & Risk Professionals

    Report:Best Practices: Identity Management In The Cloud

    Many companies are struggling to adopt cloud-based identity and access management (hosted IAM) because they typically end up overscoping this initiative or have a difficult time getting funding for...

    • Downloads: 1147
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Identity And Access Management, Q4 2008

    Identity and access management (IAM) continues to be a major topic of interest for security professionals. Between July 2007 and June 2008, Forrester's security and risk management team fielded 1,798...

    • Downloads: 969
  • For Security & Risk Professionals

    Report:Identity And Access Management: 2012 Budget And Planning Guide

    A Review Of Budgets, Spending Intentions, Technology Adoption, And Key Trends

    To help Forrester clients with their identity and access management (IAM) strategy for 2011, Forrester predicted four significant trends. So how'd we do? We got two right and two half right. Heading...

    • Downloads: 1104
  • For Security & Risk Professionals

    Report:Source Your Identity And Access Management Capabilities

    Build/Buy Capabilities: The Identity And Access Management Playbook

    Reducing the costs of an identity and access management (IAM) solution has been a top priority for security and risk professionals for a long time. Although IAM solutions have matured significantly...

    • Downloads: 1062
  • For Security & Risk Professionals

    Report:Enterprise Single Sign-On: The Fast Lane To Identity And Access Management

    Desktop or enterprise single sign-on (E-SSO) is a relatively easy way to provide end user convenience and to get started in identity and access management (IAM). The end user benefits of E-SSO are...

    • Downloads: 988