Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Date Range

Role

Methodology

Topics

Market Imperatives

Region

Vendor

19 results in Reports

  • Andras Cser
  • Tech Sector Economics
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management: 2014 To 2015

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....

    • Downloads: 145
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 364
  • For Security & Risk Professionals

    Report:Transform And Protect Your Customers' Mobile Moments With Seamless Authentication

    Business Case: The Mobile Security Playbook

    Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers' privacy...

    • Downloads: 186
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1003
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 727
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 714
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1506
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 841
  • For Security & Risk Professionals

    Report:The 15 Most Important Questions To Ask Your Cloud Identity And Access Management Provider

    During the past three years, cloud-based identity and access management (IAM) solutions have become a viable and cost-effective alternative to on-premises, commercial off-the-shelf (COTS), or...

    • Downloads: 549
  • For Security & Risk Professionals

    Report:Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

    • Downloads: 687
  • For Security & Risk Professionals

    Report:Identity And Access Management: 2012 Budget And Planning Guide

    A Review Of Budgets, Spending Intentions, Technology Adoption, And Key Trends

    To help Forrester clients with their identity and access management (IAM) strategy for 2011, Forrester predicted four significant trends. So how'd we do? We got two right and two half right. Heading...

    • Downloads: 1111
  • For Security & Risk Professionals

    Report:Enterprise Single Sign-On: The Fast Lane To Identity And Access Management

    Desktop or enterprise single sign-on (E-SSO) is a relatively easy way to provide end user convenience and to get started in identity and access management (IAM). The end user benefits of E-SSO are...

    • Downloads: 1001
  • For Security & Risk Professionals

    Report:State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because software-as-a-service...

    • Downloads: 686
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 577
  • For Security & Risk Professionals

    Report:Oracle Buys Sun Microsystems — And Its Identity Management Portfolio

    What To Look For From Oracle, And How To Respond

    Oracle's acquisition of Sun Microsystems' identity management (IAM) portfolio was largely unintended — the assets that lured Oracle to buy Sun were Java and its hardware business. Once the...

    • Downloads: 492
  • For Security & Risk Professionals

    Report:Market Overview: Enterprise Role Management

    Access Recertification And Role Management Converge, Integrate With Provisioning

    Enterprise role management, role mining, and access recertification help enterprises with maintaining segregation of duties, keeping up with regulatory compliance requirements, and automating...

    • Downloads: 969
  • For Security & Risk Professionals

    Report:Identity And Access Management Mitigates Risks During Economic Uncertainty

    Using Identity And Access Management To Protect Your Business

    Any economic downturn brings new risks to your organization. As it becomes clear that your business is struggling, nervous employees who fear downsizing may be tempted to gain unauthorized access to...

    • Downloads: 720
  • For Security & Risk Professionals

    Report:Understanding The Identity Management Market To Make Better Planning Decisions

    Organizations need quantified guidance on how adoption of specific identity and access management (IAM) technologies is succeeding in order to be able to plan their projects....

    • Downloads: 656
  • For Security & Risk Professionals

    Report:Identity Management Market Forecast: 2007 To 2014

    Provisioning Will Extend Its Dominance Of Market Revenues

    The identity management — or identity and access management (IAM) — market will grow from nearly $2.6 billion in 2006 to more than $12.3 billion in 2014 (including revenues from both...

    • Downloads: 2679