John Grady

ESG Analyst John Grady covers network security at ESG. John leverages over 15 years of IT vendor and analyst experience to help clients identify and quantify key market trends to facilitate data-driven business decisions. Prior to ESG, John spent four years at Symantec, where he was responsible for developing market insights in support of product, go-to-market, and executive stakeholders. Previous to that, John worked as an analyst covering network, web, and email protection, leading initial research initiatives on then-emerging areas such as advanced threat prevention and DDoS. As an analyst, he has also focused on infrastructure channels, assessing and advising on the go-to-market strategies of IT vendors, especially from an indirect perspective. John has been quoted in Network World, CSO, eWeek, and Investor’s Business Daily, among other publications. He holds a B.A. in History from Providence College in Providence, Rhode Island.

Recent Posts by John Grady:

If I Were the CEO of Broadcom

My colleague Jon Oltsik has a running blog series entitled “If I Were the Next CEO of Symantec” that he’s updated every few years when new leadership is introduced. With the recent announcement of Broadcom’s intention to purchase Symantec’s enterprise business unit for $10.7 billion, I thought I would beat him to the punch and create a new blog series, “If I Were the CEO of Broadcom.”

Topics: Cybersecurity

Elastic Cloud Gateways and Other Thoughts Before Black Hat 2019

As Black Hat 2019 quickly approaches, I couldn’t help but think back to the tail-end of my previous life attending industry conferences as an analyst covering network security. By 2014, you couldn’t get a conversation with a user on the show floor if you were a firewall vendor that didn’t offer robust application control. Palo Alto Networks had successfully shifted the industry focus to application layer inspection and next-generation firewalls had all but been accepted as the default standard for network protection. This transition addressed the fundamental shift in internet usage affecting the way we live and work. Traditional Layer 3 and 4 scanning could not provide the visibility and control over Layer 7 traffic required to protect the modern enterprise. Of course, at the time it was the need for control over applications like Facebook, Twitter, and YouTube driving the change. But it clearly foreshadowed the upcoming transition to cloud application usage.

Topics: Cybersecurity