Andras Cser

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.

Previous Work Experience

Prior to joining Forrester, Andras was a security architect with CA Technical Services through the Netegrity acquisition. Andras designed the architecture and led the implementation of Fortune 500 companies' identity and access management and provisioning solutions. Previously, Andras managed business process re-engineering projects.


Andras holds an MBA degree from Technical University of Budapest and Heriot-Watt University, Edinburgh, UK, and an M.Sc. in computer science and electrical engineering from Technical University of Budapest.

Refine your results

Date Range





Market Imperatives



147 results in Reports

  • Andras Cser
  • For Security & Risk Professionals

    Report:Navigate The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook

    This report helps you understand and navigate the major business and technology management trends affecting IAM in the next five years. Increasingly in 2015, IAM has become a tool not just for...

    • Downloads: 3123
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management, Q1 2008

    Oracle Emerges As Leader, With IBM, Sun Microsystems, Novell, And CA Close Behind

    Forrester evaluated leading identity and access management (IAM) vendors across 117 criteria and found that Oracle has established itself as the IAM market Leader due to its solid technology base...

    • Downloads: 2745
  • For Security & Risk Professionals

    Report:Identity Management Market Forecast: 2007 To 2014

    Provisioning Will Extend Its Dominance Of Market Revenues

    The identity management — or identity and access management (IAM) — market will grow from nearly $2.6 billion in 2006 to more than $12.3 billion in 2014 (including revenues from both...

    • Downloads: 2690
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management, Q4 2009

    Oracle, CA, And IBM Lead, With Novell And Sun Microsystems Close Behind

    In Forrester's 79-criteria evaluation of identity and access management (IAM) vendors, we found that Oracle, CA, and IBM lead the pack because of a rich IAM portfolio (both organically developed and...

    • Downloads: 2765
  • For Security & Risk Professionals

    Report:Forrester TechRadar™: Identity And Access Management, Q2 2008

    Market Seeks Solutions That Support Business And IT Flexibility And Compliance

    Identity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...

    • Downloads: 2372
  • For Security & Risk Professionals

    Report:Topic Overview: Identity And Access Management

    Identity and access management (IAM) is the entire aspect of maintaining a person's complete set of information, spanning multiple identities and establishing the relationship among these various...

    • Downloads: 2613
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The continued adoption of social, mobile, and cloud technologies, together with a multitude of new partnership and customer engagement models, has extended the identity boundary of today's digital...

    • Downloads: 1490
  • For Security & Risk Professionals

    Report:Assess Your Identity And Access Management Maturity

    An identity and access management (IAM) maturity model is necessary for assessing your current state against industry best practices, understanding your performance relative to that of your peers,...

    • Downloads: 2273
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1713
  • For Security & Risk Professionals

    Report:Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

    • Downloads: 1784
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1590
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Identity And Access Management Suites, Q3 2013

    Comparing The Top Nine IAM Suite Options

    In Forrester's 16-criteria evaluation of comprehensive identity and access management (IAM) suites, we identified the nine most significant vendors in the category — Aveksa, CA Technologies,...

    • Downloads: 1334
  • For Security & Risk Professionals

    Report:Market Overview: Fraud Management Solutions

    Seven Tenets Of Effectively Combating Fraud Costs

    Fraud causes companies to lose money in many ways: They face losses due to chargebacks, unrecoverable transfers, and unnecessary shipping costs; and spend extensive time and resources investigating...

    • Downloads: 1725
  • For Security & Risk Professionals

    Report:Identity And Access Management Predictions: 2011 And Beyond

    Requirements For Data Security, Mobile Devices, And Cloud-Based Services Will Forge Ahead

    For 2011, Forrester predicts that IT administration efficiency and business agility will become the main drivers for using identity and access management (IAM). A bevy of acquisitions during the past...

    • Downloads: 1660
  • For Security & Risk Professionals


    The Evolution Of Identity Management

    Redesigning the enterprise architecture for identity and access management (IAM) is an important task. As organizations' requirements become more complex, and to keep administrative costs down, IAM...

    • Downloads: 1553
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

    • Downloads: 1386
  • For Security & Risk Professionals

    Report:Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility, compromising...

    • Downloads: 1243
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1104
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Role Management And Access Recertification, Q3 2011

    Aveksa And SailPoint Lead, With NetIQ, Oracle, And CA Technologies Following

    Role management and access recertification has moved to center stage for security and risk (S&R) professionals, business, and auditors. It provides higher security because it provides a better...

    • Downloads: 1166
  • For Security & Risk Professionals

    Report:Market Overview: Privileged Identity Management

    Six New Features And Capabilities Redefine PIM Architecture

    Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...

    • Downloads: 1235
  • For Security & Risk Professionals

    Report:Privileged User Management Market Overview

    Centrally Managing System Administrator And Application Credentials

    Managing privileged users' access to sensitive systems needs to be centralized, policy-driven, and automated: Manual paper- or spreadsheet-based solutions are insecure, expensive, don't scale, and...

    • Downloads: 1065
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 1249
  • For Security & Risk Professionals

    Report:Identity And Access Management Metrics For Business Value

    Performance Management: The Identity And Access Management Playbook

    Most security and risk (S&R) professionals struggle to ensure that identity access management (IAM) receives the attention it deserves. S&R pros who are successful at nurturing their IAM programs...

    • Downloads: 1115
  • For Security & Risk Professionals

    Report:Hosted Identity Is Real — Are You Ready For It?

    Identity and access management (IAM) projects have long been plagued with their long implementation times, high services-to-license ratios, integration challenges, labor-intensive build-out and...

    • Downloads: 1091
  • For Security & Risk Professionals

    Report:Best Practices: Enterprise Role Management

    Enterprise role management plays a central role in efficiently managing access rights and enforcing access policies such as segregation of duties (SoD). The processes and tools related to role...

    • Downloads: 1121