Andras Cser

VP, Principal Analyst

Forrester Bio

Author Insights

Blog

CrowdStrike Acquires SaaS Security Specialist Adaptive Shield

Andras Cser November 14, 2024
Cybersecurity platform provider CrowdStrike announced plans to acquire Adaptive Shield, a SaaS security posture management (SSPM) vendor. Some sources reported the purchase price to be around $300 million. If that purchase price is accurate, based on Forrester’s estimates of Adaptive Shield’s current revenue, that price represents an approximately 12–15x revenue multiplier and 6 times more […]
Blog

IATA’s Distributed Digital Identity Framework Serves A Compelling Business Need

Andras Cser November 5, 2024
The International Air Transport Association (IATA) — the trade association for world airlines, representing over 330 airlines and over 80% of global air traffic — announced a new framework and plans for using decentralized digital identity (DDID) to provide end-to-end travel experiences for domestic and international passengers.
Blog

Decentralized Digital Identity: The Global Acceptance Network Gains Momentum

Andras Cser October 10, 2024
Bhutan became the first country to join the Global Acceptance Network (GAN), a foundation that aims to operate a nonprofit decentralized digital identity (DDID) network. Learn more about the use cases for GAN and how it can become successful in this post.
Blog

Visa Risk And Identity Solutions Acquires Fraud Management Vendor Featurespace

Andras Cser October 2, 2024
Last week, Visa announced the acquisition of Featurespace, a UK-based enterprise fraud management and anti-money-laundering (AML) vendor.
Blog

The Benefits Generative AI Brings To Fraud Management

Andras Cser September 16, 2024
Looking for ways to improve your fraud management capabilities? Learn six key ways generative AI can help in this preview of a session at our upcoming Security & Risk Summit in Baltimore December 9-11.
Blog

The CrowdStrike Moment Calls For A Redefinition Of Business Resilience

Charles Betz July 26, 2024
Crises such as the one triggered by CrowdStrike's global outage shine a bright light on many aspects of business and technology. Our new report provides a thorough overview of recommended actions for tech leaders as they face the unfolding long-term repercussions.
Blog

CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders

Andras Cser July 19, 2024
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog

Fortinet Acquires Lacework

Andras Cser June 12, 2024
After a previous sale fell through, Fortinet has announced the acquisition of Lacework for an undisclosed amount, catching some customers by surprise. Get a detailed analysis of the deal including side-by-side product comparisons in this post.
Blog

Adoption Of Cisco’s Hypershield Will Depend On AI And Security Tooling Coexistence

Andras Cser June 11, 2024
Cisco recently announced a new network and cloud security platform, called Hypershield. Find out what benefits it provides and why organizations should pay close attention to its development going forward.
Blog

Cloud Detection And Response Tools Do Not Exist

Allie Mellen May 28, 2024
Cloud detection and response is not a market category — it is a feature of existing cloud tools. Get a formal definition and more in this post previewing a new report.
Blog

Cloud Security Provider Wiz Raises $1B In VC Funding, Passes On Lacework Acquisition

Andras Cser May 20, 2024
Wiz (founded in 2020) announced a new VC funding round of $1 billion at a post-money valuation of $12 billion. Wiz has cumulatively raised $1.8 billion in venture capital, is generating over $350 million in annual recurring revenue, and is on an upward trajectory toward a likely IPO in 2025. This signals high investor confidence […]
Blog

Forrester’s RSAC 2024 Themes, Takeaways, And Observations

Jeff Pollard May 15, 2024
More than 41,000 attendees, 600 exhibitors, and 425 sessions. Get some of the key themes and takeaways from the Forrester security & risk analysts who attended RSA Conference (RSAC) 2024.
Blog

Wiz Acquires Cloud Detection And Response Specialist Gem Security To Round Out Cloud Security Portfolio

Andras Cser April 18, 2024
Recently, Wiz announced the acquisition of cloud detection and response vendor Gem Security. Learn how this move aligns with Wiz’s plan to build a comprehensive cloud security portfolio and accelerate product innovation.
Blog

It Ain’t Just AI: What We Saw At Google Cloud Next

Lee Sustar April 16, 2024
Google recently held its Google Cloud Next conference four months early to unveil new AI offerings and upstage its rivals. Get a detailed review of all of the announcements at the event in this post.
Blog

Travel And Mobile Are Driving Decentralized Digital Identity (DDID) Growth

Andras Cser March 28, 2024
Recently, SITA, the multinational IT company supporting the air travel industry, announced that it would be the lead investor in the Series A funding for Indicio, a decentralized digital identity (DDID) solution provider. Find out what this means for the evolution of DDID.
Blog

Breaking Down The US Executive Order To Protect Americans’ Sensitive Personal Data

Stephanie Liu February 29, 2024
Learn the key takeaways and market impacts from the Biden administration’s executive order to protect Americans’ sensitive personal data.
Blog

Zero Trust For Cloud Workloads? It’s Possible!

Andras Cser September 12, 2023
Curious about Zero Trust in the cloud? Learn more about it in this preview of our upcoming Security & Risk Forum.
Blog

The Web Needs A Way Of Proving That You’re A Real Person — Worldcoin Is Not The Solution

Martha Bennett July 26, 2023
New crypto-focused financial network Worldcoin promises to provide a “new identity and financial network owned by everyone.” But it raises more issues than it solves. Find out why.
Blog

Introducing Detection Surface, The Cybersecurity Defense That Parallels Attack Surface

Allie Mellen June 26, 2023
On traditional infrastructure (laptops, servers, workstations, on-premises network infrastructure), the attack surface was the closest match to true perimeter-based defense we could get. The network infrastructure gave access to the systems within (crunchy outside; gooey, cubicle, khakis, and blue button-downs inside). As such, detection of attacker activity was relegated to network-based activity, endpoint-based activity, and […]
Blog

The CNAPP Product Category is Getting Crowded With Capabilities

Andras Cser May 30, 2023
Learn four key reasons why the packaging of cloud-native application protection platforms into a bundle is unnecessary and possibly even misleading.
More posts