Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

17 results in Reports

  • Andras Cser
  • Past 6 months
  • For Security & Risk Professionals

    Report:Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    For security and risk (S&R) professionals responsible for building their firm's identity and access management strategy (IAM) for both internal and customer-facing IAM properties and processes, we...

    • Downloads: 1294
  • For Security & Risk Professionals

    Report:Use Commercial IAM Solutions To Achieve More Than 100% ROI Over Manual Processes

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage access to sensitive applications and data without inhibiting business agility, compromising...

    • Downloads: 819
  • For Security & Risk Professionals

    Report:Develop Identity And Access Management Metrics For Employee And Customer Processes

    Performance Management: The Identity And Access Management Playbook

    Most security and risk (S&R) professionals struggle to ensure that identity access management (IAM) receives the attention it deserves, and they constantly fight the notion that IAM is a purely...

    • Downloads: 695
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

    • Downloads: 438
  • For Security & Risk Professionals

    Report:Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

    Landscape: The Identity and Access Management Playbook

    As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

    • Downloads: 386
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 378
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 286
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2015

    Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

    Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 243
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management: 2014 To 2015

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....

    • Downloads: 218
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Identity Standards, Q3 2014

    Road Map: The Identity And Access Management Playbook

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology The Zero Trust enterprise...

    • Downloads: 197
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 219
  • For CIO Professionals

    Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

    Amazon's Relentless Pace Continues At re:Invent With Nine New Services

    The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

    • Downloads: 168
  • For Security & Risk Professionals

    Report:Use Voiceprint Biometrics To Eliminate Fraud Without Diminishing Customer Experience

    Tools & Technologies: The Identity And Access Management Playbook

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

    • Downloads: 146
  • For Security & Risk Professionals

    Report:Brief: Reframe The Business Case For Identity And Access Management In Security Terms

    IAM Is More Than Just Operational Streamlining

    The responsibility and the budget for identity and access management (IAM) often reside with a number of different business and technology management teams. Historically, the easy business...

    • Downloads: 109
  • For Security & Risk Professionals

    Report:Role Job Description: Identity And Access Management Architect

    Organization: The Identity And Access Management Playbook

    For security and risk (S&R) executives building a comprehensive identity and access management (IAM) strategy for their digital business, this report provides an overview of the skills, job...

    • Downloads: 94
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Report:Brief: Washington Is Finally Jumping On The Government ID Bandwagon

    Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution

    Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

    • Downloads: 56