Jon Oltsik

Senior Principal Analyst

  • briefs
    Jun 22, 2015

    Group-based Policy

    The Group-based Policy (GBP) project is an evolving open source project that is beginning to influence commercial products. Inspired by concepts from Cisco’s Application Centric Infrastructure, the project was designed for OpenStack and OpenDaylight to provide infrastructure policy and has emerged as a platform that can become a foundation for commercial products for policy-based networking, as well as other areas, such as service chaining. GBP’s generalized approach shows that it is not tied to any particular vendor and stands alone as an independent project with industry influence. GBP needs to continue accepting contributions from a variety of vendors and extending its reach.

  • Blogs
    Jun 22, 2015

    Malware? Cyber-crime? Call the ICOPs!

    To fully understand the state of cybersecurity at enterprise organizations, it’s worthwhile to review a bit of history. In the early days of Internet connectivity, information security was viewed as a necessary evil, so enterprise security budgets tended to be pretty stingy. CEOs didn’t want good security, they wanted “good enough” security, so they were only willing to provide minimal funding.

  • Blogs
    Jun 18, 2015

    Endpoint Security Technology Nirvana

    For years, endpoint security was defined by antivirus software and a few leading vendors like Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro. This perception has changed over the past few years. CISOs are now demanding endpoint profiling, advanced threat detection, and forensic capabilities, opening the door for other vendors like Bit9/Carbon Black, Cisco, Confer, FireEye, ForeScout, Great Bay Software, Guidance Software, Invincea, Palo Alto, RSA, SentinelOne, Tanium, etc.

  • video
    Jun 17, 2015

    ESG On Location Video: Insights from Cisco Live 2015

    In this ESG On Location Video, ESG's Dan Conde, Jon Oltsik, and Brian Garrett report from Cisco Live 2015 in San Diego CA.

  • Blogs
    Jun 16, 2015

    Cybersecurity Industry Blame Game at RSA Conference

    I’ve been meaning to write this blog since returning from San Francisco in April and I’ve finally gotten around to it. With the dangerous threat landscape and seemingly endless string of data breaches, there was quite a bit of industry bashing at this year’s RSA conference. Discussions featured numerous sound bites accusing the cybersecurity industry of "being stuck in the dark ages," and claiming that the industry "has failed its customers." Pretty strong stuff.

  • lab reports
    Jun 15, 2015

    ESG Lab Review: Integrated Security with Video Surveillance on VCE Vblock System and EMC Isilon

    This ESG Lab review documents hands-on testing of the ability of the VCE Vblock System and VCE Technology Extension for EMC Isilon storage to drive value from video surveillance as part of an overall security strategy. Testing focused on the functionality, security, simplicity, and performance of the converged VCE solution, which is designed to provide a scalable, flexible, end-to-end platform for video surveillance deployments.

  • Blogs
    Jun 12, 2015

    Grading Cisco Cybersecurity after CiscoLive

    In anticipation of CiscoLive in San Diego, I posted a blog last week describing my thoughts on Cisco’s cybersecurity portfolio. After attending the event this week, I’m ready to further elaborate on these opinions by grading Cisco Cybersecurity in a number of areas...

  • Blogs
    Jun 5, 2015

    Cisco Cybersecurity Renaissance and Opportunity

    A few short years ago, Cisco was deep in the cybersecurity doldrums. In spite of years of market leadership with products like Cisco PIX firewalls, IronPort (e-mail security), and IDS/IPS blades on Catalyst switches, the company seemed to have squandered its enviable market position. Alas, Cisco had swung and missed on security management (MARS) and endpoint (Okena) and had fallen behind companies like Fortinet, Juniper, and Palo Alto in its own network security backyard.

  • Blogs
    Jun 2, 2015

    Cybersecurity Views from a National Intelligence Officer

    I participated in the Cyber Exchange Forum earlier today, an event sponsored by the Advanced Cyber Security Center (ACSC). The featured speaker was Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence. In this role, Sean directs the production of national intelligence estimates (for cyber-threats), leads the intelligence community (IC) in cyber analysis, and writes personal assessments about strategic developments in cyberspace.

  • Blogs
    May 29, 2015

    The Highs and Lows of Cybersecurity Integration

    Based upon anecdotal evidence, I estimate that the average large enterprise organization uses more than 70 different security tools from an assortment of vendors. As they say in Texas, “that dog don’t hunt.” In other words, it’s nearly impossible to maintain strong security hygiene or establish best practices when the security organization is chasing cybersecurity optimization on a tool-by-tool basis.

  • News
    May 29, 2015

    ESG: New security approaches wanted to accelerate buisness - Channelnomics

  • Blogs
    May 26, 2015

    Dear CISO, Tear Down These Legacy Cybersecurity Walls!

    Here’s a scenario we’ve all encountered: You go to a nice restaurant to enjoy a meal and the whole experience turns sour. The service is terrible, your entrée arrives before your salad, and your food is overcooked and virtually inedible.

  • News
    May 26, 2015

    A Threat Intelligence-Sharing Reality-Check - Dark Reading

  • News
    May 20, 2015

    Businesses Remain Challenged by Collection, Analysis of Threat Data - eWeek

  • Blogs
    May 19, 2015

    Toward Omniscient Cybersecurity Systems

    Cybersecurity systems suffer from compartmentalization. Vulnerability management systems know which software revisions are installed on which systems, but have no idea how endpoints and servers are connected together. Similarly, an anti-malware gateway can perform static and dynamic analysis on a suspicious file but doesn’t know if a user downloaded analogous malware when she was connected to the Internet on a public network.

More Results:

Phone:
508-381-5166

E-mail

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.

Full Biography