Jon Oltsik

Senior Principal Analyst

  • Blogs
    Jul 1, 2015

    Enterprise Threat Intelligence Programs Are Immature

    It seems like everyone is talking about threat intelligence these days: the feds are promoting public/private threat intelligence sharing across the executive and legislative branches, and the industry is buzzing about threat intelligence feeds, sharing platforms, and advanced analytics.

  • News
    Jun 30, 2015

    Spikes Debuts Isolation Tech for Browser-borne Malware - Infosecurity Magazine

  • research reports
    Jun 25, 2015

    Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

    In order to assess how enterprise organizations are collecting, processing, analyzing, and operationalizing their threat intelligence programs, ESG surveyed 304 IT and information security professionals representing enterprise-class (1,000 employees or more) organizations in North America. All respondents were involved in the planning, implementation, and/or daily operations of their organization’s threat intelligence program, processes, or technologies.

  • Blogs
    Jun 25, 2015

    Enterprises Need Advanced Incident Prevention

    Given the booming state of the cybersecurity market, industry rhetoric is at an all-time high. One of the more nonsensical infosec banalities goes something like this: Cybersecurity has always been anchored by incident prevention technologies like AV software, firewalls, and IDS/IPS systems, but sophisticated cyber-adversaries have become extremely adept at circumventing status quo security controls. Therefore, organizations should give up on prevention and focus all their attention on incident detection and response.

  • briefs
    Jun 22, 2015

    Group-based Policy

    The Group-based Policy (GBP) project is an evolving open source project that is beginning to influence commercial products. Inspired by concepts from Cisco’s Application Centric Infrastructure, the project was designed for OpenStack and OpenDaylight to provide infrastructure policy and has emerged as a platform that can become a foundation for commercial products for policy-based networking, as well as other areas, such as service chaining. GBP’s generalized approach shows that it is not tied to any particular vendor and stands alone as an independent project with industry influence. GBP needs to continue accepting contributions from a variety of vendors and extending its reach.

  • Blogs
    Jun 22, 2015

    Malware? Cyber-crime? Call the ICOPs!

    To fully understand the state of cybersecurity at enterprise organizations, it’s worthwhile to review a bit of history. In the early days of Internet connectivity, information security was viewed as a necessary evil, so enterprise security budgets tended to be pretty stingy. CEOs didn’t want good security, they wanted “good enough” security, so they were only willing to provide minimal funding.

  • Blogs
    Jun 18, 2015

    Endpoint Security Technology Nirvana

    For years, endpoint security was defined by antivirus software and a few leading vendors like Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro. This perception has changed over the past few years. CISOs are now demanding endpoint profiling, advanced threat detection, and forensic capabilities, opening the door for other vendors like Bit9/Carbon Black, Cisco, Confer, FireEye, ForeScout, Great Bay Software, Guidance Software, Invincea, Palo Alto, RSA, SentinelOne, Tanium, etc.

  • video
    Jun 17, 2015

    ESG On Location Video: Insights from Cisco Live 2015

    In this ESG On Location Video, ESG's Dan Conde, Jon Oltsik, and Brian Garrett report from Cisco Live 2015 in San Diego CA.

  • Blogs
    Jun 16, 2015

    Cybersecurity Industry Blame Game at RSA Conference

    I’ve been meaning to write this blog since returning from San Francisco in April and I’ve finally gotten around to it. With the dangerous threat landscape and seemingly endless string of data breaches, there was quite a bit of industry bashing at this year’s RSA conference. Discussions featured numerous sound bites accusing the cybersecurity industry of "being stuck in the dark ages," and claiming that the industry "has failed its customers." Pretty strong stuff.

  • lab reports
    Jun 15, 2015

    ESG Lab Review: Integrated Security with Video Surveillance on VCE Vblock System and EMC Isilon

    This ESG Lab review documents hands-on testing of the ability of the VCE Vblock System and VCE Technology Extension for EMC Isilon storage to drive value from video surveillance as part of an overall security strategy. Testing focused on the functionality, security, simplicity, and performance of the converged VCE solution, which is designed to provide a scalable, flexible, end-to-end platform for video surveillance deployments.

  • Blogs
    Jun 12, 2015

    Grading Cisco Cybersecurity after CiscoLive

    In anticipation of CiscoLive in San Diego, I posted a blog last week describing my thoughts on Cisco’s cybersecurity portfolio. After attending the event this week, I’m ready to further elaborate on these opinions by grading Cisco Cybersecurity in a number of areas...

  • Blogs
    Jun 5, 2015

    Cisco Cybersecurity Renaissance and Opportunity

    A few short years ago, Cisco was deep in the cybersecurity doldrums. In spite of years of market leadership with products like Cisco PIX firewalls, IronPort (e-mail security), and IDS/IPS blades on Catalyst switches, the company seemed to have squandered its enviable market position. Alas, Cisco had swung and missed on security management (MARS) and endpoint (Okena) and had fallen behind companies like Fortinet, Juniper, and Palo Alto in its own network security backyard.

  • Blogs
    Jun 2, 2015

    Cybersecurity Views from a National Intelligence Officer

    I participated in the Cyber Exchange Forum earlier today, an event sponsored by the Advanced Cyber Security Center (ACSC). The featured speaker was Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence. In this role, Sean directs the production of national intelligence estimates (for cyber-threats), leads the intelligence community (IC) in cyber analysis, and writes personal assessments about strategic developments in cyberspace.

  • Blogs
    May 29, 2015

    The Highs and Lows of Cybersecurity Integration

    Based upon anecdotal evidence, I estimate that the average large enterprise organization uses more than 70 different security tools from an assortment of vendors. As they say in Texas, “that dog don’t hunt.” In other words, it’s nearly impossible to maintain strong security hygiene or establish best practices when the security organization is chasing cybersecurity optimization on a tool-by-tool basis.

  • News
    May 29, 2015

    ESG: New security approaches wanted to accelerate buisness - Channelnomics

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. 

Full Biography