Andras Cser

VP, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.

Education

Andras holds an M.B.A. degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

42 results in Reports

  • Andras Cser
  • Past 18 months
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2015

    Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

    Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 243
  • For Security & Risk Professionals

    Report:Brief: Reframe The Business Case For Identity And Access Management In Security Terms

    IAM Is More Than Just Operational Streamlining

    The responsibility and the budget for identity and access management (IAM) often reside with a number of different business and technology management teams. Historically, the easy business...

    • Downloads: 109
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 219
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management: 2014 To 2015

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....

    • Downloads: 218
  • For Security & Risk Professionals

    Report:Develop Identity And Access Management Metrics For Employee And Customer Processes

    Performance Management: The Identity And Access Management Playbook

    Most security and risk (S&R) professionals struggle to ensure that identity access management (IAM) receives the attention it deserves, and they constantly fight the notion that IAM is a purely...

    • Downloads: 695
  • For Security & Risk Professionals

    Report:Role Job Description: Identity And Access Management Architect

    Organization: The Identity And Access Management Playbook

    For security and risk (S&R) executives building a comprehensive identity and access management (IAM) strategy for their digital business, this report provides an overview of the skills, job...

    • Downloads: 94
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 378
  • For Security & Risk Professionals

    Report:Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    For security and risk (S&R) professionals responsible for building their firm's identity and access management strategy (IAM) for both internal and customer-facing IAM properties and processes, we...

    • Downloads: 1294
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 286
  • For Security & Risk Professionals

    Report:Use Commercial IAM Solutions To Achieve More Than 100% ROI Over Manual Processes

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage access to sensitive applications and data without inhibiting business agility, compromising...

    • Downloads: 819
  • For Security & Risk Professionals

    Report:Use Voiceprint Biometrics To Eliminate Fraud Without Diminishing Customer Experience

    Tools & Technologies: The Identity And Access Management Playbook

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

    • Downloads: 146
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

    • Downloads: 438
  • For CIO Professionals

    Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

    Amazon's Relentless Pace Continues At re:Invent With Nine New Services

    The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

    • Downloads: 168
  • For Security & Risk Professionals

    Report:Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

    Landscape: The Identity and Access Management Playbook

    As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

    • Downloads: 386
  • For Security & Risk Professionals

    Report:Brief: Washington Is Finally Jumping On The Government ID Bandwagon

    Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution

    Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

    • Downloads: 56
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Identity Standards, Q3 2014

    Road Map: The Identity And Access Management Playbook

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology The Zero Trust enterprise...

    • Downloads: 197
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Report:Brief: Apple Pay Signals A Fundamental Shift In Secure Payments Technologies

    During the past year, customers, US customers in particular, were rocked by revelations that hackers had stolen their credit and debit card numbers from trusted and respected retailers such as Target...

    • Downloads: 251
  • For Security & Risk Professionals

    Report:Transform And Protect Your Customers' Mobile Moments With Seamless Authentication

    Business Case: The Mobile Security Playbook

    Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers' privacy...

    • Downloads: 196
  • For CMO Professionals

    Report:Quick Take: Apple Puts Mobile Moments At The Center Of Its Strategy

    With Apple Pay And Apple Watch, The Mobile Style Setter Will Make Payments And Wearables Worth The CMO's Trouble

    Today, Apple announced an integrated set of applications and connected devices — Apple Pay, the Apple Watch, and two iPhone 6 models — that will change how the CMO's team engages with...

    • Downloads: 320
  • For Security & Risk Professionals

    Report:Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

    • Downloads: 183
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 996
  • For Security & Risk Professionals

    Report:Quick Take: IBM Acquires CrossIdeas To Refresh Its Identity Management Product Line

    Business-Friendly IAM Is Essential To Security And Business Agility

    On July 31, 2014, IBM announced its intent to acquire CrossIdeas, an identity and access management (IAM) specialist headquartered in Rome, for an undisclosed sum. With this acquisition, IBM will add...

    • Downloads: 86
  • For Security & Risk Professionals

    Report:What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

    This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success

    The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast...

    • Downloads: 184
  • For Security & Risk Professionals

    Report:Protect Your Digital Assets — Without Driving Customers Away

    The Eight Techniques That Show Promise In This Seemingly Hopeless Fight

    In the publishing, media and entertainment, and services industries, and across many other verticals, fewer and fewer companies deliver their products as physical assets such as printed reports,...

    • Downloads: 145