Jon Oltsik

Senior Principal Analyst

  • Blogs
    Jul 12, 2013

    Goodbye NAC, Hello EVAS (Endpoint visibility, access, and security)

    New security and mobility requirements will make EVAS a network requirement.

  • NAC Solutions Evolve to EVAS: Endpoint Visibility, Access, and Security

    Network access control has been around for a decade, and the global recession and years of vendor consolidation certainly took a toll on NAC solutions. But NAC is not fading away. Instead, NAC has evolved into a new and stronger market segment called EVAS (Endpoint Visibility, Access, and Security).  CISOs should place NAC in their legacy file and begin to assess EVAS as part of their security strategies.

  • briefs
    Jul 9, 2013

    EnCase Analytics: Big Data Security Analytics Meets Endpoint Visibility

    Over the last few years, security professionals continue to fall farther and farther behind with security controls and incident detection.  Why?  Many organizations approach cybersecurity with an array of signature-based tools, perimeter gateways, disjointed processes, and limited security resources/skills. These legacy tactics can no longer keep up with increasingly dangerous threats.  CISOs can improve situational awareness with the right big data security analytics to help with controls adjustments, incident detection, problem isolation, and remediation.  EnCase Analytics, with all the requirements of a big data security analytics solution, will provide built-in algorithms, ad-hoc query capabilities, and security technology integration in order to help organizations accelerate, automate, and streamline overall cybersecurity operations. Additionally, by focusing on the often neglected area of endpoint artifacts, EnCase Analytics can help security-conscious organizations benefit from proactive assessment of the security risks and gain complete visibility into their security posture.

  • briefs
    Jul 9, 2013

    IBM: An Early Leader across the Big Data Security Analytics Continuum

    Many enterprise organizations claim that they already consider security data collection and analysis as “big data,” but they don’t have security analytics solutions capable of addressing their scalability, performance, or operational needs. ESG believes that tactical security analytics solutions and compliance-centric SIEM tools are no match for today’s big data security analytics needs. Leading vendors are addressing this gap with real-time and asymmetric big data security analytics systems built for scale and intelligence. IBM is one of few vendors offering an integrated approach that spans the entire continuum of enterprise security analytics needs.

  • Blogs
    Jul 8, 2013

    EMC Adds Aveksa to its Enterprise Security Portfolio

    Synergistic acquisition will complement existing RSA business and open new doors.

  • research briefs
    Jul 8, 2013

    Quantifying the Benefits of Testing Web Applications for Security

    Organizations may use static, dynamic, or other types of testing tools to validate the security of their web applications, but does all that testing really make a difference? According to ESG research, it does. This research brief looks at the relationship between the use of application security testing tools and the confidence levels that organizations report about the security of their web applications.

  • Blogs
    Jul 3, 2013

    The Big Data Security Analytics “Trifecta”

    Best solutions will collect, process, analyze, and correlate data in three key areas.

  • Blogs
    Jul 1, 2013

    Big Data Security Analytics: It Takes a Village

    Mainstream enterprises need algorithms, intelligence, automation, and collaboration to succeed.

  • Blogs
    Jun 26, 2013

    Cisco Unveils a New Security Architecture at CiscoLive

    Strong vision, but Cisco must back it up with competitive products, sales/marketing, and user education.

  • Blogs
    Jun 20, 2013

    CISOs Need More Control as CIOs Lose Control of IT

    Loss of IT control requires more security oversight, policy management, enforcement and analytics.

  • Blogs
    Jun 17, 2013

    The China Syndrome

    Pointing the cybersecurity finger at China won’t solve our problems.

  • Blogs
    Jun 11, 2013

    Why Aren’t We Questioning the Effectiveness of the NSA Program?

    Privacy aside, is this program really worthwhile?

  • research briefs
    Jun 6, 2013

    Imbalance Between Server and Network Security Controls

    The balance of security processes and skills is lopsided in most organizations. Network security trumps server security at most organizations in a number of ways, from IT experience to the common perception that networks simply require more expansive security efforts than servers. ESG investigated the state of network and server security at midmarket and enterprise organizations, and considered the ramifications for organizations that expend more security resources on their networks at the expense of their servers.

  • News
    Jun 6, 2013

    Demonstrating the Power of Big Data in Security - Channelnomics

  • Blogs
    Jun 4, 2013

    Why Blue Coat Acquired Solera Networks

    Combination offers benefits for risk management, incident detection, and improved security efficiency.

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. 

Full Biography