Jon Oltsik

Senior Principal Analyst

  • Blogs
    Aug 27, 2012

    Software-defined Security?

    Get ready for a new acronym at VMworld, Software-defined Security (SDS).  Lots of vendors will be selling SDS but I'm not buying it. 

  • research briefs
    Aug 24, 2012

    Online File Sharing and Collaboration: Security Challenges and Requirements

    Security is the primary concern for organizations contemplating online file sharing and collaboration, and their concerns are proving to be well-founded. According to ESG research, organizations that have already adopted online file sharing say that security challenges continue to plague their deployments. The research also reveals the security controls that are important (and not so important) to organizations evaluating online file sharing providers, and highlights the biggest worries IT professionals have about online file sharing.

  • research briefs
    Aug 24, 2012

    Cloud Computing and Server Virtualization Security Confounds CISOs

    Large organizations are virtualizing infrastructure and adopting cloud computing in order to improve efficiencies, lower costs, and accelerate IT responsiveness. These are tremendous business benefits, but ESG Research indicates that these new technology initiatives present numerous security challenges that can increase IT risk or even slow down forward-looking IT projects.

  • Blogs
    Aug 22, 2012

    Information Security: A Sobering Topic at VMworld

    Lack of information security skills, best practices, and appropriate technical controls continue to dog server virtualization and cloud computing initiatives.

  • Blogs
    Aug 17, 2012

    Biggest Information Security Management Challenges for Enterprise Organizations

    Budget constraints top the list of information security management challenges but there is an assortment of other issues.

  • Blogs
    Aug 15, 2012

    Politics 1 Cybersecurity 0

    Earlier this month, senate republicans blocked the latest version of the Lieberman/Collins cybersecurity bill.  Good for politics, bad for national security. 

  • Blogs
    Aug 14, 2012

    What's Driving Enterprise Security Strategy?

    New ESG Research finds that CISOs use a combination of traditional drivers and new requirements to shape their information security strategy. 

  • Blogs
    Aug 8, 2012

    Beyond Basic Mobile Management

    Everyone's talking BYOD and MDM but hardly anyone is considering mobile application development's growing impact.  This has to change. 

  • research briefs
    Aug 3, 2012

    Best Practices for Secure Software Development

    As part of the software development process, information security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible. ESG research found organizations that are considered security “leaders” tend to make different choices than other firms. For example, leaders rely on integrated development and testing suites, scan their applications from multiple perspectives to uncover vulnerabilities, and invest in training developers in security concepts and tools. This research brief details these best practices for all organizations that would like to produce more secure applications.

  • Blogs
    Jul 31, 2012

    New Requirements for Security Monitoring

    When it comes to information security monitoring, ESG Research indicates that enterprises have pressing needs for integration, intelligence, automation, and big data capabilities.

  • Blogs
    Jul 30, 2012

    Advanced Malware Protection: Network or Host?

    Frightened by the prospects of APTs, botnets, and Trojans, large organizations are investing in new advanced malware detection/prevention technologies to fortify defense-in-depth.  Should these new security technologies be applied to the network or to host systems?  Both.   

  • Blogs
    Jul 27, 2012

    Software Development: Still Lacking Strong Security

    Cybersecurity events like security breaches, APTs, and pending legislation are becoming mainstream as the public recongnizes that our society is inexorably tied together via servers and networks.  With all this attention, one fundamental security problem continues to fly "under the radar."  The fact is that a lot of the software we depend upon is insecure and extremely vulnerable to attack.  Unfortunately this issue isn't getting enough attention and ESG Research indicates that enterprise organizations aren't doing enough to address their own software security deficiencies. 

  • News
    Jul 26, 2012

    Olympics could strain enterprise networks - ComputerWorld

  • Blogs
    Jul 24, 2012

    Analyzing VMware's Acquisition of Nicira

    VMware has been ptiching network virtualization and next-generation data centers solely based upon virtualization software.  Great vision but in reality, VMware is still used mostly for server consolidation.  To take its virtual networking game to the next level, VMware just announced its plans to acquire SDN startup Nicira for an unbelievable $1 billion +.  This move shows that VMware is willing to make incredible investments to back its vision but there is a lot of work ahead. 

  • News
    Jul 24, 2012

    VMware snubs partner Cisco for network virtualization - NetworkWorld

More Results:

Phone:
508-381-5166

E-mail

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s Information Security and Networking services. With 25 years of technology industry experience, Jon is widely recognized as an expert in threat and security management as well as all aspects of network security. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government. Prior to joining ESG, Jon was the founder and principal of Hype-Free Consulting. He has also held senior management positions at GiantLoop Network, Forrester Research, Epoch Systems, and EMC Corporation.

Full Biography

NEWSLETTER

Enter your email address, and click subscribe