Jon Oltsik

Senior Principal Analyst

  • briefs
    Oct 21, 2008

    Symantec Extends Cloud Service with MessageLabs

    Symantec just took a big step forward in its cloud-based enterprise services offering, adding secure messaging to its portfolio of cloud-based services following the acquisition of MessageLabs. The move provides two things: a broader SaaS foundation for storage and security service offerings; and a secure messaging position. This meets an important need for medium-size and enterprise customers looking to outsource their e-mail and Web security activities.
  • Blogs
    Oct 14, 2008

    The Onset of Virtual Micro Networks

  • News
    Oct 13, 2008

    A Wave of Storage Products Hits Dallas Byte and Switch

    The combination of encryption and key management provides the most secure way for companies to protect stored data across their entire organization as regulatory compliance and privacy requirement become more stringent, said Enterprise Strategy Group analyst Jon Oltsik in a statement. Click the link to read more.
  • briefs
    Oct 9, 2008

    Symantec's Endpoint DLP Includes Agent Management

    Symantec was among the first to establish itself in the data loss prevention (DLP) market through best-of-breed technology as part of its compliance strategy. Now, the company is launching a new DLP era with a next-generation DLP architecture providing network and endpoint DLP technology and controls and unified DLP policy management. Symantec's latest release of Vontu, powered by Altiris, also focuses on agent management integration-a move that will strike a chord with large enterprises looking for improved management of agent deployments.
  • News
    Oct 9, 2008

    Symantec melds DLP, archiving into information risk management

    You could say that this is just three different products they are packaging together, but companies are starting to buy in this way, said Jon Oltsik, senior analyst at Enterprise Strategy Group Inc. Click the link to read more.
  • briefs
    Oct 7, 2008

    Symantec's Information Risk Management: Great Positioning and Immense Potential

    For about two years now, Symantec has positioned several of its strongest products under a common umbrella dubbed Information Risk Management (IRM). This is proving to be a good move as large organizations are now looking for strategic IRM vendor partners rather than small fries with tactical point tools. As a result of this and other trends, Symantec is well positioned to meet the IRM product needs of large organizations. With a bit more work, Symantec can glue together its products, add services and partners, and create an IRM model and ecosystem that could become an IT staple.
  • briefs
    Oct 2, 2008

    McAfee Acquires Secure Computing

    McAfee stepped into one of the highly coveted secure messaging leadership positions overnight through its acquisition of Secure Computing. The company is continuing down its path of offering customers integrated suites, providing security at the endpoint and now, at the network.
  • Blogs
    Sep 25, 2008

    Sun and Virtualization?

  • briefs
    Sep 25, 2008

    Brocade's Encryption Play

    This week, Brocade supplemented its security portfolio with a new encryption switch, encrypting blades for DCX, and a slew of partnerships. ESG believes that these are good moves that enable Brocade to use encryption as a market advantage. To continue this trend, Brocade will need to continue to recruit technology and services partners while it figures out how to weave Fibre Channel encryption with its Data Center Fabric story and Foundry Networks acquisition.
  • News
    Sep 24, 2008

    Can Storage Fabrics Offer Security?

    Organizations need a broader deployment of encryption technologies across data centers in order to protect data confidentiality and privacy, said Enterprise Strategy Group senior analyst Jon Oltsik. Click the link to read more.
  • News
    Sep 22, 2008

    Filtering Viruses Through The Cloud Forbes

    Jon Oltsik, an analyst with Enterprise Strategy Group, points out that Trend Micro was the first to announce the technology, but balks at picking which company's approach is most effective. "From a technology perspective, they're all pretty close," he says. Click the link to read more.
  • Blogs
    Sep 18, 2008

    Why Won't Apple Play Nice In The Enterprise?

  • briefs
    Sep 16, 2008

    Microsoft Takes its Security Development Lifecycle to the Rest of the World

    When security issues challenged Microsoft earlier this decade, the company responded with a commitment to Trustworthy Computing and a set of new processes for software development that became the Security Development Lifecycle (SDL). Since SDL became a standard in 2004, all Internet-facing software produced by Microsoft has gone through the process. The results? More secure code and lower maintenance costs. This week, Microsoft took SDL to another level with new products and services that bring the goodness of SDL to the world. This is a great start. To continue this momentum, Microsoft should push it through more and more channels, while convincing enterprise CIOs to demand SDL (or similar models) from all software providers.
  • Blogs
    Sep 9, 2008

    Enterprise DNS Woes

  • briefs
    Sep 5, 2008

    PGP Expands Its Confidential Data Security Coverage

    PGP's recent product enhancement announcements give the company a product portfolio that may be the best fit for the enterprise. The problem? The market remains naïve and immature. PGP has the opportunity to drive revenue and establish market share leadership with a few technical moves, educational and professional services, and a little help from its friends.

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.

Full Biography


Enter your email address, and click subscribe