Andras Cser

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.


Andras holds an MBA degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results




Market Imperatives



7 results in Reports

  • Andras Cser
  • Security & Risk
  • Tech Sector Economics
  • Past 12 months
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management: 2014 To 2015

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....

    • Downloads: 428
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 446
  • For Security & Risk Professionals

    Report:Sizing The Cloud Security Market

    Companies Will Spend $2 Billion Over The Next Five Years To Protect Data In The Cloud

    As enterprises embrace a diverse cloud ecosystem, a new generation of software is emerging to address the security requirements of highly distributed IT infrastructure. These new offerings make up...

    • Downloads: 370
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Workload Security Management Solutions — Automate Or Die

    Security Must Scale To Large Numbers Of IaaS Workloads

    Cloud has become a viable, if not preferred, option for a variety of technology workloads, but securing cloud workloads is no easy business. Security and risk (S&R) professionals must implement and...

    • Downloads: 296
  • For Security & Risk Professionals

    Report:Prioritize Tokenization To Secure The Payment Chain

    EMV Is Not A Panacea For Card Payment Vulnerabilities

    Is the credit card as US consumers know it dead? With the recent massive credit card data breaches at retailers such as Target and Home Depot, the payment industry is ripe for change. In this report,...

    • Downloads: 286
  • For Security & Risk Professionals

    Report:Market Overview: Customer Identity And Access Management (CIAM) Solutions

    S&R Pros Should Dump Home-Grown Approaches For Managing Customer Identities

    Business leaders entrust their security teams to protect customers' privacy and shield them from fraud and other malicious activities. To do this, security and risk (S&R) professionals must implement...

    • Downloads: 252
  • For Security & Risk Professionals

    Report:How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords

    S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months

    As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...

    • Downloads: 208