Jon Oltsik

Senior Principal Analyst

  • Blogs
    Jul 24, 2012

    Analyzing VMware's Acquisition of Nicira

    VMware has been ptiching network virtualization and next-generation data centers solely based upon virtualization software.  Great vision but in reality, VMware is still used mostly for server consolidation.  To take its virtual networking game to the next level, VMware just announced its plans to acquire SDN startup Nicira for an unbelievable $1 billion +.  This move shows that VMware is willing to make incredible investments to back its vision but there is a lot of work ahead. 

  • News
    Jul 24, 2012

    VMware snubs partner Cisco for network virtualization - NetworkWorld

  • research reports
    Jul 23, 2012

    Security Management and Operations

    Changes on the Horizon

    In order to assess the state of information security management and operations in 2012 and beyond, ESG surveyed 315 security professionals working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were personally responsible for or familiar with their organizations’ 2011 information security strategies as well as their 2012 IT security budget and spending plans at either an organizational or business unit/division/branch level.

  • Blogs
    Jul 23, 2012

    Cybersecurity Legislation and APTs

    The Senate Homeland Security and Government Affairs (HSGAC) introduced a new cybersecurity bill last Thursday.  According to ESG Research around Advanced Persistent Threats (APTs), security professionals believe it's time to stop debating and pass legislation. 

  • video
    Jul 23, 2012

    Behind the Findings: Security Management and Operations

  • infographics
    Jul 23, 2012

    Security Management and Operations Infographic

    IT security management and operations is evolving rapidly to address new types of threats and support IT initiatives like BYOD, cloud computing, and infrastructure virtualization. A new ESG report examines how security challenges, successes, and strategies affect people, processes, and technologies. ESG used its survey data to categorize large organizations as security management "leaders," "followers," or "laggards." Only 19% of enterprises can be considered "leaders"—the vast majority are extremely unprepared and remain vulnerable to cyber attacks.

  • video
    Jul 23, 2012

    Overview Video: Security Management and Operations

  • Blogs
    Jul 20, 2012

    A Multitude of Mobile Security Issues

    Yes, there is plenty of hype surrounding BYOD and mobile device security but new ESG Research identifies a number of real problems facing enterprise organizations.  Mobile devices are introducing new risks that must be addressed in a comprehensive manner. 

  • Blogs
    Jul 12, 2012

    Big Data Security Is Inevitable

    I am usually pretty skeptical about industry rhetoric and emerging trends but new ESG Research data has me convinced that large organizations will soon require big data security analytics technologies. Why?  Risk management, continuous monitoring, and incident detection needs will drive big data security into the enterprise mainstream. 

  • Blogs
    Jul 10, 2012

    The Advanced Malware Detection/Prevention Market

    The Advanced Malware Detection/Prevention (AMD/P) market is focused on APTs and composed of a number of specialized vendors and products.  It will continue its explosive growth and remain an independent market segment over the next few years. 

  • Blogs
    Jun 27, 2012

    Security Services Continue to Grow -- In the Enterprise

    Security skills are in short supply and difficult to hire.  As a result, large organizations are turing to security services as an alternative.  Good news for security service providers but security product vendors and CISOs must think through the implications of this trend. 

  • Blogs
    Jun 21, 2012

    More On The Security Skills Shortage Issue

    Why aren't more people talking about the information security skills shortage?  ESG data indicates it is pervasive and seems to be getting worse. 

  • Blogs
    Jun 13, 2012

    CIOs Should Prepare for the London 2012 Olympics

    Beyond swimming, running, and jumping, the London Olymipics could present a few challenges for IT infrastructure and security. 

  • Blogs
    Jun 7, 2012

    The Information Security 80/20 Rule

    ESG research consistently reveals that the majority of enterprise organizations are not where they should be in terms of risk management, incident detection, and incident response. 

  • Blogs
    May 30, 2012

    BYOD Security Gotchas

    I've spent a fair amount of time lately on BYOD, mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. 

Full Biography