Jon Oltsik

Senior Principal Analyst

  • research briefs
    Nov 10, 2008

    ESG Research Brief: Midmarket IT Priorities and Skills Gaps Provide a Bright Spot for Security Vendors

    Analysis of ESG research on IT priorities among medium-size businesses provides some encouraging news for information security vendors. While IT budgets overall will be tight in 2009, information security and risk management initiatives remain high priorities. Technology and services companies that can help medium-size businesses accelerate technology benefits, secure business processes, lower security costs, and supplement high-value security staff and skills will have the greatest chance for success.
  • News
    Oct 23, 2008

    Secure IRM strategy

    The combination of these products allows Symantec to deliver a cohesive strategy to organisations looking to address the challenges of securing and managing their unstructured information, says Jon Oltsik, senior analyst, Enterprise Strategy Group. Click the link to read more.
  • News
    Oct 23, 2008

    Off-Cycle Microsoft Patch Targets Worm-Like Windows Bug ENT News

    Based on the number of Windows systems that are potentially exposed to a massive attack, it was in Microsoft's best interest to just go ahead and patch it, said Jon Oltsik, an analyst at Milford, Mass.-based IT research firm Enterprise Strategy Group. Click the link to read more.
  • Blogs
    Oct 22, 2008

    Why Did Symantec Buy MessageLabs?

  • briefs
    Oct 21, 2008

    Symantec Extends Cloud Service with MessageLabs

    Symantec just took a big step forward in its cloud-based enterprise services offering, adding secure messaging to its portfolio of cloud-based services following the acquisition of MessageLabs. The move provides two things: a broader SaaS foundation for storage and security service offerings; and a secure messaging position. This meets an important need for medium-size and enterprise customers looking to outsource their e-mail and Web security activities.
  • Blogs
    Oct 14, 2008

    The Onset of Virtual Micro Networks

  • News
    Oct 13, 2008

    A Wave of Storage Products Hits Dallas Byte and Switch

    The combination of encryption and key management provides the most secure way for companies to protect stored data across their entire organization as regulatory compliance and privacy requirement become more stringent, said Enterprise Strategy Group analyst Jon Oltsik in a statement. Click the link to read more.
  • briefs
    Oct 9, 2008

    Symantec's Endpoint DLP Includes Agent Management

    Symantec was among the first to establish itself in the data loss prevention (DLP) market through best-of-breed technology as part of its compliance strategy. Now, the company is launching a new DLP era with a next-generation DLP architecture providing network and endpoint DLP technology and controls and unified DLP policy management. Symantec's latest release of Vontu, powered by Altiris, also focuses on agent management integration-a move that will strike a chord with large enterprises looking for improved management of agent deployments.
  • News
    Oct 9, 2008

    Symantec melds DLP, archiving into information risk management

    You could say that this is just three different products they are packaging together, but companies are starting to buy in this way, said Jon Oltsik, senior analyst at Enterprise Strategy Group Inc. Click the link to read more.
  • briefs
    Oct 7, 2008

    Symantec's Information Risk Management: Great Positioning and Immense Potential

    For about two years now, Symantec has positioned several of its strongest products under a common umbrella dubbed Information Risk Management (IRM). This is proving to be a good move as large organizations are now looking for strategic IRM vendor partners rather than small fries with tactical point tools. As a result of this and other trends, Symantec is well positioned to meet the IRM product needs of large organizations. With a bit more work, Symantec can glue together its products, add services and partners, and create an IRM model and ecosystem that could become an IT staple.
  • briefs
    Oct 2, 2008

    McAfee Acquires Secure Computing

    McAfee stepped into one of the highly coveted secure messaging leadership positions overnight through its acquisition of Secure Computing. The company is continuing down its path of offering customers integrated suites, providing security at the endpoint and now, at the network.
  • Blogs
    Sep 25, 2008

    Sun and Virtualization?

  • briefs
    Sep 25, 2008

    Brocade's Encryption Play

    This week, Brocade supplemented its security portfolio with a new encryption switch, encrypting blades for DCX, and a slew of partnerships. ESG believes that these are good moves that enable Brocade to use encryption as a market advantage. To continue this trend, Brocade will need to continue to recruit technology and services partners while it figures out how to weave Fibre Channel encryption with its Data Center Fabric story and Foundry Networks acquisition.
  • News
    Sep 24, 2008

    Can Storage Fabrics Offer Security?

    Organizations need a broader deployment of encryption technologies across data centers in order to protect data confidentiality and privacy, said Enterprise Strategy Group senior analyst Jon Oltsik. Click the link to read more.
  • News
    Sep 22, 2008

    Filtering Viruses Through The Cloud Forbes

    Jon Oltsik, an analyst with Enterprise Strategy Group, points out that Trend Micro was the first to announce the technology, but balks at picking which company's approach is most effective. "From a technology perspective, they're all pretty close," he says. Click the link to read more.

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.

Full Biography


Enter your email address, and click subscribe