Jon Oltsik

Senior Principal Analyst

  • Blogs
    Jul 31, 2012

    New Requirements for Security Monitoring

    When it comes to information security monitoring, ESG Research indicates that enterprises have pressing needs for integration, intelligence, automation, and big data capabilities.

  • Blogs
    Jul 30, 2012

    Advanced Malware Protection: Network or Host?

    Frightened by the prospects of APTs, botnets, and Trojans, large organizations are investing in new advanced malware detection/prevention technologies to fortify defense-in-depth.  Should these new security technologies be applied to the network or to host systems?  Both.   

  • Blogs
    Jul 27, 2012

    Software Development: Still Lacking Strong Security

    Cybersecurity events like security breaches, APTs, and pending legislation are becoming mainstream as the public recongnizes that our society is inexorably tied together via servers and networks.  With all this attention, one fundamental security problem continues to fly "under the radar."  The fact is that a lot of the software we depend upon is insecure and extremely vulnerable to attack.  Unfortunately this issue isn't getting enough attention and ESG Research indicates that enterprise organizations aren't doing enough to address their own software security deficiencies. 

  • News
    Jul 26, 2012

    Olympics could strain enterprise networks - ComputerWorld

  • Blogs
    Jul 24, 2012

    Analyzing VMware's Acquisition of Nicira

    VMware has been ptiching network virtualization and next-generation data centers solely based upon virtualization software.  Great vision but in reality, VMware is still used mostly for server consolidation.  To take its virtual networking game to the next level, VMware just announced its plans to acquire SDN startup Nicira for an unbelievable $1 billion +.  This move shows that VMware is willing to make incredible investments to back its vision but there is a lot of work ahead. 

  • News
    Jul 24, 2012

    VMware snubs partner Cisco for network virtualization - NetworkWorld

  • research reports
    Jul 23, 2012

    Security Management and Operations

    Changes on the Horizon

    In order to assess the state of information security management and operations in 2012 and beyond, ESG surveyed 315 security professionals working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were personally responsible for or familiar with their organizations’ 2011 information security strategies as well as their 2012 IT security budget and spending plans at either an organizational or business unit/division/branch level.

  • Blogs
    Jul 23, 2012

    Cybersecurity Legislation and APTs

    The Senate Homeland Security and Government Affairs (HSGAC) introduced a new cybersecurity bill last Thursday.  According to ESG Research around Advanced Persistent Threats (APTs), security professionals believe it's time to stop debating and pass legislation. 

  • video
    Jul 23, 2012

    Behind the Findings: Security Management and Operations

  • infographics
    Jul 23, 2012

    Security Management and Operations Infographic

    IT security management and operations is evolving rapidly to address new types of threats and support IT initiatives like BYOD, cloud computing, and infrastructure virtualization. A new ESG report examines how security challenges, successes, and strategies affect people, processes, and technologies. ESG used its survey data to categorize large organizations as security management "leaders," "followers," or "laggards." Only 19% of enterprises can be considered "leaders"—the vast majority are extremely unprepared and remain vulnerable to cyber attacks.

  • video
    Jul 23, 2012

    Overview Video: Security Management and Operations

  • Blogs
    Jul 20, 2012

    A Multitude of Mobile Security Issues

    Yes, there is plenty of hype surrounding BYOD and mobile device security but new ESG Research identifies a number of real problems facing enterprise organizations.  Mobile devices are introducing new risks that must be addressed in a comprehensive manner. 

  • Blogs
    Jul 12, 2012

    Big Data Security Is Inevitable

    I am usually pretty skeptical about industry rhetoric and emerging trends but new ESG Research data has me convinced that large organizations will soon require big data security analytics technologies. Why?  Risk management, continuous monitoring, and incident detection needs will drive big data security into the enterprise mainstream. 

  • Blogs
    Jul 10, 2012

    The Advanced Malware Detection/Prevention Market

    The Advanced Malware Detection/Prevention (AMD/P) market is focused on APTs and composed of a number of specialized vendors and products.  It will continue its explosive growth and remain an independent market segment over the next few years. 

  • Blogs
    Jun 27, 2012

    Security Services Continue to Grow -- In the Enterprise

    Security skills are in short supply and difficult to hire.  As a result, large organizations are turing to security services as an alternative.  Good news for security service providers but security product vendors and CISOs must think through the implications of this trend. 

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.

Full Biography


Enter your email address, and click subscribe