John Grady

John Grady

ESG Analyst John Grady covers network security at ESG. John leverages over 15 years of IT vendor and analyst experience to help clients identify and quantify key market trends to facilitate data-driven business decisions. Prior to ESG, John spent four years at Symantec, where he was responsible for developing market insights in support of product, go-to-market, and executive stakeholders. Previous to that, John worked as an analyst covering network, web, and email protection, leading initial research initiatives on then-emerging areas such as advanced threat prevention and DDoS. As an analyst, he has also focused on infrastructure channels, assessing and advising on the go-to-market strategies of IT vendors, especially from an indirect perspective. John has been quoted in Network World, CSO, eWeek, and Investor’s Business Daily, among other publications. He holds a B.A. in History from Providence College in Providence, Rhode Island.

Recent Posts by John Grady:

ESG Infographic: 2021 SASE Trends

Abstract:

Interest in secure access service edge (SASE) architectures has exploded as IT organizations struggle using traditional solutions to support distributed enterprise environments.

Topics: Cybersecurity

ESG Research Report: SASE Trends

Abstract:

The amount of interest in secure access service edge (SASE) architectures has exploded over the last 18 months. Organizations struggle using traditional, on-premises-based network and security solutions to support distributed, cloud-centric enterprise environments. While this has been an increasing challenge over the last few years, the pandemic and resulting spike in newly remote workers pushed many organizations to a tipping point. At the same time, the broad applicability of SASE leads to some confusion about where to begin and which technologies are required, exacerbated by legacy organizational dynamics.

Topics: Cybersecurity Networking

ESG Brief: Network Security Predictions for 2022

Abstract:

This brief looks at some the key trends and events that will shape network security technologies, suppliers, and customers in 2022.

Topics: Cybersecurity Networking

ESG Complete Survey Results: Network Security Trends in Hybrid Cloud Environments

Abstract:

ESG conducted a comprehensive online survey of cybersecurity and IT/information security professionals from private- and public-sector organizations in North America (United States and Canada) between June 2, 2021 and June 21, 2021. To qualify for this survey, respondents were required to be cybersecurity and IT/information security professionals familiar with their organization’s network security tools and processes and responsible for evaluating, purchasing, and/or operating corporate network security controls across public cloud infrastructure and on-premises data centers/private cloud.

This Complete Survey Results presentation focuses on network security tools and strategies used to protect both public cloud environments and on-premises data centers, as more organizations look to take a more hybrid approach to IT.

Topics: Cybersecurity Networking Cloud Services & Orchestration

ESG Brief: The Criticality of Encrypted Traffic Visibility

Abstract:

Attackers increasingly use encrypted traffic to mask their activity. While most agree that better visibility into this traffic would improve their organization’s security posture, many continue to forgo decryption for a variety of reasons. While tools that can detect threats in encrypted traffic remain fairly new, they represent an attractive approach to improve visibility into encrypted threats without sacrificing privacy or performance.

Topics: Cybersecurity

ESG Brief: Microsegmentation Is Critical to Zero Trust, But Adoption Lags

Abstract:

Microsegmentation offers a dynamic and scalable approach to segmenting IT networks that helps enable zero trust security. Despite its potential value, it isn’t widely used now. To gain broader adoption, microsegmentation tools must be easy to deploy in both cloud and on-premises environments and provide several key features, including a focus on segmentation at the application and workload level.

Topics: Cybersecurity

ESG Brief: Organizational Considerations Weigh Heavily on Zero Trust Success

Abstract:

The breadth of zero trust inherently requires a variety of teams to collaborate effectively for implementations to be successful. Given this, it is unsurprising that organizational issues are the most common reason cited for projects being paused or abandoned. Effective communications channels, clarity of roles and responsibilities, and alignment of goals and success metrics are all important aspects of a zero trust strategy.

Topics: Cybersecurity

ESG Master Survey Results: The State of Zero Trust Security Strategies

Abstract:

This Master Survey Results presentation focuses on understanding the factors influencing zero trust initiatives, how decision makers are prioritizing purchasing decisions, and which specific technologies and products are being deployed to support zero trust strategies.

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 8, 2020 and December 22, 2020. To qualify for this survey, respondents were required to be cybersecurity or IT/information security professionals responsible for evaluating, purchasing, and managing security technology products and services in support of zero trust security initiatives.

Topics: Cybersecurity

ESG Infographic: The State of Zero-trust Security Strategies

Abstract:

Zero-trust approaches are arguably more relevant than ever due to the increasingly distributed nature of the modern enterprise, which has only been accelerated by the shift to work-from-home models. Yet for many organizations, confusion remains as to exactly what a zero-trust initiative should entail, where to begin, and how best to overcome the organizational obstacles that result from such a cross-functional undertaking.

Topics: Cybersecurity

ESG Research Report: The State of Zero-trust Security Strategies

Abstract:

Zero-trust approaches are arguably more relevant than ever due to the increasingly distributed nature of the modern enterprise. Whether implementing least-privilege tenets for user access or securing the connections to and between the disparate aspects of today’s hybrid multi-cloud deployments, zero trust can provide a framework to secure even the most complex environments. The sudden shift to work-from-home models has only highlighted the importance of a zero-trust approach. Yet for many organizations, confusion remains as to exactly what a zero-trust initiative should entail, where to begin, and how best to overcome the organizational obstacles that result from such a cross-functional undertaking.

In order to gain insight into these trends, ESG surveyed 421 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for driving zero-trust security strategies and evaluating, purchasing, and managing security technology products and services in support of these initiatives.

Topics: Cybersecurity