Jon Oltsik

Senior Principal Analyst

  • briefs
    Aug 9, 2010

    Accelerating Cloud Performance with WAN Optimization

    Is cloud computing real? Yes. When you sort through the hype and evaluate collective industry R&D efforts, cloud computing options may arrive sooner than most believe. In fact, smart CIOs are already assessing their workloads against business needs and analyzing where each workload should run-locally or in the public cloud. As they do, they will realize that cloud-centric WAN optimization is a critical enabling technology for high performance and central control. Furthermore, it will help maximize cloud computing options and benefits sooner rather than later.

  • Blogs
    Aug 6, 2010

    Blackberry, Windows still own the enterprise but . . .

  • Blogs
    Aug 4, 2010

    Enterprises Are Embracing Mobile Devices

  • Blogs
    Aug 3, 2010

    Juniper's Mobile Device Security Gamble

  • briefs
    Aug 3, 2010

    Juniper Networks Bets on Mobile Device Security-and Beyond

    On July 27, Juniper Networks announced plans to acquire SMobile Systems, a leader in mobile device security, for $70 million. This seemingly small acquisition could be extremely strategic as it has the potential to vault Juniper into the emerging mobile device market, build its client software business around SMobile and JUNOS Pulse, and offer its wireless carrier partners a foundation for new mobile device security services. Good ideas, but Juniper has some unprecedented execution hurdles to overcome before it can achieve its goals.

  • Blogs
    Aug 2, 2010

    Check Point Application Control and Beyond

  • Blogs
    Jul 30, 2010

    Dell's Security Opportunity

  • Blogs
    Jul 27, 2010

    Peer-to-Peer Security

  • Blogs
    Jul 22, 2010

    Dell Warns of Malicious Code on Server Motherboards

  • Blogs
    Jul 21, 2010

    Consider the Consensus Audit Guidelines (CAG)

  • Blogs
    Jul 19, 2010

    United Nations Making Slow Progress on Cybersecurity

  • briefs
    Jul 19, 2010

    Top of Rack Business Value

    As the enterprise data center has grown in size and importance, the minimum unit of deployment has moved from the individual server to the blade frame-and now to a whole rack. To support this move to rack-level deployment, pre-provisioned racks and scale-out networking architectures have become imperative. Top of rack network designs deliver a standard, flexible, and low cost way to incrementally scale out capacity and automate provisioning and change management. BLADE Network Technologies is leading this transition to on-demand networking for meeting near-term deployment of public, and private, clouds.

  • briefs
    Jun 30, 2010

    Avoiding the Hazards of IT Consolidation

    ESG Research indicates widespread IT spending on data center transformation, IT consolidation, and server virtualization. This will help reduce costs and streamline operations, right? Yes, in theory, but many IT consolidation projects suffer through planning and implementation issues that ultimately impact application performance and user productivity-especially for remote and mobile users connecting over public networks or the corporate WAN. What's needed? Processes and tools providing rich contextual and application visibility from end-to-end across the enterprise and WAN optimization technology to accelerate high-priority traffic. With that in mind, Riverbed's Cascade and Steelhead appliances combine to be one of the best solutions for both IT consolidation and WAN optimization.

  • Blogs
    Jun 30, 2010

    Log Management, The Next Generation

  • briefs
    Jun 28, 2010

    Large Organizations are Way Behind on IT Risk Management

    Government and industry regulations were supposed to improve information security, yet many holes remain. Why? Many organizations adopted a regulatory "check box" mentality which helped them pass audits, but didn't address dangerous threats or existing vulnerabilities. ESG believes IT risk management can help and many large organizations concur, but new data from Evalueserve indicates that there is still a lot of work to do. Without rapid IT risk management progress, many organizations remain sitting ducks for cybercrime, industrial espionage, or catastrophic denial of service attacks.

More Results:

Phone:
508-381-5166

E-mail

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.

Full Biography

NEWSLETTER

Enter your email address, and click subscribe