Jon Oltsik

Senior Principal Analyst

  • video
    Jul 23, 2012

    Overview Video: Security Management and Operations

  • Blogs
    Jul 20, 2012

    A Multitude of Mobile Security Issues

    Yes, there is plenty of hype surrounding BYOD and mobile device security but new ESG Research identifies a number of real problems facing enterprise organizations.  Mobile devices are introducing new risks that must be addressed in a comprehensive manner. 

  • Blogs
    Jul 12, 2012

    Big Data Security Is Inevitable

    I am usually pretty skeptical about industry rhetoric and emerging trends but new ESG Research data has me convinced that large organizations will soon require big data security analytics technologies. Why?  Risk management, continuous monitoring, and incident detection needs will drive big data security into the enterprise mainstream. 

  • Blogs
    Jul 10, 2012

    The Advanced Malware Detection/Prevention Market

    The Advanced Malware Detection/Prevention (AMD/P) market is focused on APTs and composed of a number of specialized vendors and products.  It will continue its explosive growth and remain an independent market segment over the next few years. 

  • Blogs
    Jun 27, 2012

    Security Services Continue to Grow -- In the Enterprise

    Security skills are in short supply and difficult to hire.  As a result, large organizations are turing to security services as an alternative.  Good news for security service providers but security product vendors and CISOs must think through the implications of this trend. 

  • Blogs
    Jun 21, 2012

    More On The Security Skills Shortage Issue

    Why aren't more people talking about the information security skills shortage?  ESG data indicates it is pervasive and seems to be getting worse. 

  • Blogs
    Jun 13, 2012

    CIOs Should Prepare for the London 2012 Olympics

    Beyond swimming, running, and jumping, the London Olymipics could present a few challenges for IT infrastructure and security. 

  • Blogs
    Jun 7, 2012

    The Information Security 80/20 Rule

    ESG research consistently reveals that the majority of enterprise organizations are not where they should be in terms of risk management, incident detection, and incident response. 

  • Blogs
    May 30, 2012

    BYOD Security Gotchas

    I've spent a fair amount of time lately on BYOD, mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

  • News
    May 23, 2012

    Software-defined networks - The next networking trend -- Techworld

  • Blogs
    May 16, 2012

    Tibco and LogLogic: An Interesting and Revealing Acquisition

    Over the past few years, a number of independent Security Information and Event Management (SIEM) vendors were acquired by bigger players. In late 2010, HP scooped up market leader ArcSight for $1.5 billion. Last year, McAfee purchased Nitro Security while IBM acquired Q1 Labs.

  • Blogs
    May 15, 2012

    Final Thoughts About Interop 2012

    Well I've been out of Las Vegas for several days now so I've had time to adjust back to normal society and reflect a bit more on Interop2012. My colleague Bob "LAN" Laliberte met with nearly everyone in the industry and while I don't remember every encounter, here are a few final thoughts:

  • Blogs
    May 10, 2012

    Fear and Networking in Las Vegas (Interop Thoughts Part 1)

    I’m here in Las Vegas wrapping up Interop 2012. I now understand why Hunter S. Thompson binged on alcohol and narcotics when visiting this town — you need these substances to create the illusion that this town is the least bit palatable.

    Aside from the Sin City aspect, Interop was eventful and the industry seems to be in good shape. A few thoughts:

  • Blogs
    May 7, 2012

    On to Interop 2012

  • Blogs
    May 1, 2012


More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. 

Full Biography