Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.


Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Date Range





Market Imperatives



97 results in Reports

  • Andras Cser
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 3
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management: 2014 To 2015

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....

    • Downloads: 133
  • For Security & Risk Professionals

    Report:Develop Identity And Access Management Metrics For Employee And Customer Processes

    Performance Management: The Identity And Access Management Playbook

    Most security and risk (S&R) professionals struggle to ensure that identity access management (IAM) receives the attention it deserves, and they constantly fight the notion that IAM is a purely...

    • Downloads: 650
  • For Security & Risk Professionals

    Report:Role Job Description: Identity And Access Management Architect

    Organization: The Identity And Access Management Playbook

    For security and risk (S&R) executives building a comprehensive identity and access management (IAM) strategy for their digital business, this report provides an overview of the skills, job...

    • Downloads: 71
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 364
  • For Security & Risk Professionals

    Report:Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    For security and risk (S&R) professionals responsible for building their firm's identity and access management strategy (IAM) for both internal and customer-facing IAM properties and processes, we...

    • Downloads: 1251
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 263
  • For Security & Risk Professionals

    Report:Use Commercial IAM Solutions To Achieve More Than 100% ROI Over Manual Processes

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage access to sensitive applications and data without inhibiting business agility, compromising...

    • For Security & Risk Professionals

      Report:Use Voiceprint Biometrics To Eliminate Fraud Without Diminishing Customer Experience

      Tools & Technologies: The Identity And Access Management Playbook

      While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

      • For Security & Risk Professionals

        Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

        Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

        Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

        • Downloads: 381
      • For CIO Professionals

        Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

        Amazon's Relentless Pace Continues At re:Invent With Nine New Services

        The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

        • Downloads: 161
      • For Security & Risk Professionals

        Report:Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

        Landscape: The Identity and Access Management Playbook

        As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

        • For Security & Risk Professionals

          Report:Brief: Washington Is Finally Jumping On The Government ID Bandwagon

          Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution

          Although identity federation and trusted identity providers (IdPs) such as Experian,, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

          • Downloads: 51
        • For Security & Risk Professionals

          Report:TechRadar™: Zero Trust Identity Standards, Q3 2014

          Road Map: The Identity And Access Management Playbook

          This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology The Zero Trust enterprise...

          • Downloads: 178
        • For Security & Risk Professionals

          Report:Brief: Apple Throws Down The Privacy Gauntlet

          Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

          On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

          • Downloads: 61
        • For Security & Risk Professionals

          Report:Brief: Apple Pay Signals A Fundamental Shift In Secure Payments Technologies

          During the past year, customers, US customers in particular, were rocked by revelations that hackers had stolen their credit and debit card numbers from trusted and respected retailers such as Target...

          • Downloads: 233
        • For Security & Risk Professionals

          Report:Transform And Protect Your Customers' Mobile Moments With Seamless Authentication

          Business Case: The Mobile Security Playbook

          Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers' privacy...

          • Downloads: 184
        • For CMO Professionals

          Report:Quick Take: Apple Puts Mobile Moments At The Center Of Its Strategy

          With Apple Pay And Apple Watch, The Mobile Style Setter Will Make Payments And Wearables Worth The CMO's Trouble

          Today, Apple announced an integrated set of applications and connected devices — Apple Pay, the Apple Watch, and two iPhone 6 models — that will change how the CMO's team engages with...

          • Downloads: 307
        • For Security & Risk Professionals

          Report:Critical Questions To Ask Your Privileged Identity Management Solution Provider

          Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features

          Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

          • Downloads: 167
        • For Security & Risk Professionals

          Report:Evolve Your Identity Strategy For Your Digital Business

          Executive Overview: The Identity And Access Management Playbook

          The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

          • Downloads: 976
        • For Security & Risk Professionals

          Report:Quick Take: IBM Acquires CrossIdeas To Refresh Its Identity Management Product Line

          Business-Friendly IAM Is Essential To Security And Business Agility

          On July 31, 2014, IBM announced its intent to acquire CrossIdeas, an identity and access management (IAM) specialist headquartered in Rome, for an undisclosed sum. With this acquisition, IBM will add...

          • Downloads: 86
        • For Security & Risk Professionals

          Report:What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

          This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success

          The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast...

          • Downloads: 179
        • For Security & Risk Professionals

          Report:Protect Your Digital Assets — Without Driving Customers Away

          The Eight Techniques That Show Promise In This Seemingly Hopeless Fight

          In the publishing, media and entertainment, and services industries, and across many other verticals, fewer and fewer companies deliver their products as physical assets such as printed reports,...

          • Downloads: 139
        • For Security & Risk Professionals

          Report:Forrester's Risk-Driven Identity And Access Management Process Framework

          Processes: The Identity And Access Management Playbook

          Identity and access management (IAM) processes have always been convoluted. They affect many people, systems, and organizations, and this complexity makes it difficult to protect against new or...

          • For Security & Risk Professionals

            Report:Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

            Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management

            On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

            • Downloads: 170