Andras Cser

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an MBA degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

28 results in Reports

  • Andras Cser
  • Past 6 months
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The continued adoption of social, mobile, and cloud technologies, together with a multitude of new partnership and customer engagement models, has extended the identity boundary of today's digital...

    • Downloads: 1340
  • For Security & Risk Professionals

    Report:Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility, compromising...

    • Downloads: 1084
  • For Security & Risk Professionals

    Report:Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

    • Downloads: 690
  • For Security & Risk Professionals

    Report:Introducing Forrester's Customer IAM Security Maturity Assessment Model

    Assessment: The Identity And Access Management Playbook

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register for or log into your website, mobile app, or phone...

    • Downloads: 683
  • For Infrastructure & Operations Professionals

    Report:Predictions 2016: The Cloud Accelerates

    Eleven Key Developments For Cloud And What I&O Pros Should Do About Them

    After reaching mainstream acceptance in 2015, cloud will shift into the next gear in 2016. This next stage will focus on expanding cloud use cases and infrastructure and operations (I&O)...

    • Downloads: 528
  • For Security & Risk Professionals

    Report:Sizing The Cloud Security Market

    Companies Will Spend $2 Billion Over The Next Five Years To Protect Data In The Cloud

    As enterprises embrace a diverse cloud ecosystem, a new generation of software is emerging to address the security requirements of highly distributed IT infrastructure. These new offerings make up...

    • Downloads: 459
  • For Security & Risk Professionals

    Report:Forrester's Customer IAM Security Maturity Model

    Customer identity and access management (IAM) is essential to providing customers an easy-to-use, easy-to-administer, cost-effective, and most importantly, secure, experience. This Customer IAM...

    • Downloads: 49
  • For Infrastructure & Operations Professionals

    Report:Quick Take: Dell Buys EMC, Creating A New Legacy Vendor

    The Federation Will Disband; Dell-EMC Won't Spawn A Public Cloud Titan

    With Dell announcing its $67 billion intent to acquire EMC, EMC's long-anticipated exit begins in earnest. While the new Dell will offer infrastructure and operations (I&O) professionals a path to...

    • Downloads: 264
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To IoT Security

    How The Internet Of Things Will Shatter Traditional Enterprise Security

    The Internet of Things (IoT), or what Forrester refers to as the connected world, combines technologies that enable devices, objects, and infrastructure to interact with monitoring, analytics, and...

    • Downloads: 338
  • For Security & Risk Professionals

    Report:Brief: The Emergence Of The Cloud Security Gateway

    Vendors Aim To Provide S&R Pros With One Consolidated Offering For All Their Cloud Security Requirements

    Vendors are a on a cloud-security buying spree. Microsoft announced its acquisition of cloud access specialist Adallom, and security vendor Blue Coat Systems announced its acquisition of cloud...

    • Downloads: 290
  • For Security & Risk Professionals

    Report:How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords

    S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months

    As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...

    • Downloads: 266
  • For Security & Risk Professionals

    Report:Vendor Landscape: Identity Verification Solutions

    Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels

    Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...

    • Downloads: 183
  • For Security & Risk Professionals

    Report:Predictions 2016: Customers Boost IAM

    Landscape: The Identity And Access Management Playbook

    For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. They now must govern access across...

    • Downloads: 188
  • For Security & Risk Professionals

    Report:Vendor Landscape: Cloud Access Security Intelligence (CASI) Solutions

    S&R Pros Can Use CASI To Discover Cloud Apps, Monitor Employee Behavior, And Prevent Data Leaks

    To support their firms' cloud strategy without compromising security or compliance, security and risk (S&R) pros need to develop a number of important capabilities. They need the capability to: 1)...

    • Downloads: 207
  • For Application Development & Delivery Professionals

    Report:Planning For Retail Payment Innovation

    AD&D Professionals Must Prepare For Changes In The Payment Landscape

    The rise of new payment options are changing the world of retail payments — Apple Pay and Android Pay are just the beginning. Retailers have long disliked the charges levied by the card...

    • Downloads: 205
  • For CIO Professionals

    Report:Quick Take: All Grown Up, AWS Drives Home Its Enterprise-Friendly Advantage

    With Announcements Of New Capabilities Like SPICE, QuickSight, And AWS IoT, Amazon Makes A Play For Even More Enterprise Workloads

    Amazon Web Services (AWS) is not just for applications anymore. Data, the Internet of Things (IoT), and business intelligence (BI) services dominated the announcements at AWS re:Invent 2015 as the...

    • Downloads: 152
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Identity Standards, Q1 2016

    Road Map: The Identity And Access Management Playbook

    Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud apps,...

    • Downloads: 138
  • For Security & Risk Professionals

    Report:Four Quick Wins To Improve Security Without Detracting From Customer Experience

    Increasing Customer Security And Privacy Concerns Are Driving Security Enhancements

    While many digital businesses have optimized digital customer experiences, rising customer awareness and concerns regarding security and privacy mean customers now want assurances your firm is...

    • Downloads: 135
  • For Security & Risk Professionals

    Report:Brief: What Dell's EMC Acquisition Means For Security And Risk Pros

    If The New Dell Pulls Off A Thorny IAM Integration And Adds Native-Cloud Security, Add It To Your Shortlist

    With Dell announcing its $67 billion intent to acquire EMC, security and risk (S&R) pros need to pay close attention to three factors: 1) the shape of the final company; 2) the integration of the two...

    • Downloads: 126
  • For Security & Risk Professionals

    Report:TechRadar™: Identity And Access Management (IAM), Q1 2016

    PIM, Federation, Directories, Risk-Based And Two-Factor Authentication, And Web Single Sign-On Provide High Business Value

    Identity and access management (IAM) has experienced significant transformation during the past two to three years, from support for cloud workloads and apps, to availability of identity-as-a-service...

    • Downloads: 162
  • For Security & Risk Professionals

    Report:Improve Customer Account Security Without Compromising Experience

    Password Policies, Notifications, And Attribute Immutability Are Key For Online Account Security

    When customers fall victim to online account hijacking, it can be both upsetting and confusing. It can also cause them lasting damage financially and personally. Unfortunately, most digital...

    • Downloads: 119
  • For Security & Risk Professionals

    Report:Brief: Top 10 Fraud Management Trends S&R Pros Should Watch In 2016

    Biometric Authentication Is Set To Take Off

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, consultations, and vendor briefings; research projects; and...

    • Downloads: 110
  • For Security & Risk Professionals

    Report:Forrester's Identity And Access Management Cost Model

    Security and risk (S&R) executives must manage identities and control access to sensitive applications and data because of security and compliance requirements — and they need to do so as...

    • For Security & Risk Professionals

      Report:Vendor Landscape: Active Directory Security And Governance Solutions

      Solutions To Help You Secure And Monitor Your Active Directory Infrastructure

      Microsoft's Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD's growing importance also means it's a tempting target for hackers who attack...

      • Downloads: 88
    • For Security & Risk Professionals

      Report:The Forrester Wave™: Enterprise Fraud Management, Q1 2016

      The Seven Providers That Matter Most And How They Stack Up

      In Forrester's 15-criteria evaluation of enterprise fraud management vendors, we identified the seven most significant providers in the category — Accertify, ACI, BAE Systems, Feedzai, Fair Isaac...

      • Downloads: 84