5 Posts

Bart Lenaerts

IBM Product Marketing

    Bart started his career as a network systems analyst working for a large financial organization in Belgium. In 1999 he moved to the US and occupied between 2000 and 2018 several roles in product management at 3Com Tippingpoint, RSA, Symantec, Trustwave and McAfee. During his career, Bart frequently visited Security Operations Centers around the world and participated in several security analytics research initiatives.

    Written By Bart Lenaerts

    Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

    By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

    Why You Need to Mature Your User Behavior Analytics Deployment

    User behavior analytics (UBA) can help security teams uncover ignorant, negligent and malicious activity with advanced machine learning algorithms — but Rome wasn't built in a day.

    How to Avoid the Trap of Fragmented Security Analytics

    To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data.

    Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment

    Security ecosystems and threat hunting techniques have evolved since the introduction of SIEM more than 15 years ago. Is your security intelligence strategy up to date?

    3 Key Areas of Security Operations to Benchmark and Evaluate

    SOC leaders should benchmark against speed, intelligence and accuracy to effectively measure and, ultimately, improve their security operations workflow.

    Co-Written By Bart Lenaerts

    Advancing Security Operations Through the Power of a SIEM Platform

    Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats.