Cybersecurity is in a constant state of flux, and organizations are more invested than ever before in their security people, processes, and technology. The ESG Cybersecurity team works closely with vendors and end-users alike to stay up to date on what organizations are doing, what end-users would like to see, and how the market is changing or adapting to the latest trends. The cybersecurity segment at ESG covers every aspect of an organization's security needs and lifecycle—network, endpoint, cloud, data, services, and much more. Find out how the ESG Cybersecurity team can help arm your organization to succeed in a highly dynamic and saturated marketplace.
Trends to watch in 2019 include data breaches, threats to critical infrastructure, malware based on artificial intelligence, securing the modern application stack, cloud-scale security analytics, and many more.
The increasingly prevalent positioning of the cybersecurity solution as a platform by many vendors begs for a definition of and set of requirements for cybersecurity platforms. In this video, Doug Cahill and Jon Oltsik share recently completed research from our second annual enterprise-class cybersecurity vendor and platform study.
Understand SOAPA, its future, and the benefits to cybersecurity professionals.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners.
Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.
Cybersecurity: cloud infrastructure, cloud applications, endpoint, data
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at cloud and endpoint security firms where he launched market leading products and established strategic partnerships. Over the course of his career Doug has served in product management, marketing, and business development roles for storage management, networking, and database vendors, and started his career in IT as a business analyst.
Doug has written for Dark Reading and The Cipher Brief and has been quoted in CyberTrend, The Wall Street Journal, CRN, Network World and other publications.
Enterprise Mobility, Identity, Mobile Security
Mark Bowker is a senior analyst responsible for the enterprise mobility, identity, and mobile security coverage at ESG. Leveraging 20+ years of IT industry experience, Mark researches what it takes to support today’s workforce as seen through both IT and end user lenses.
Fascinated by the transformation in workforce behavior brought about by mobility, and how businesses are embracing mobility-enabled workflows and processes, Mark’s research spans alternative desktop, application, and data delivery strategies to enterprise mobility management technology, mobility’s impact on IT and business, and the broader IT vendor marketplace.
Jack Poller is a senior validation analyst in the cybersecurity practice at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of storage, networking, and cloud-based products and markets.
Prior to joining ESG, Jack held marketing and marketing consulting positions at storage and networking startups. Jack’s formative years in the industry were spent as a software and hardware engineer, developing 3D graphics, storage, and networking systems. He holds bachelor degrees in Applied Math and Computer Science from Carnegie Mellon University, and an MBA from the Leavy School of Business at Santa Clara University.