Blogs
September 4, 2025 / September 4, 2025 by Dhiraj Sharan | Leave a Comment
Investigating vulnerabilities is painful yet absolutely essential work that the security team regularly does. Doing it manually quickly becomes overwhelming, so they typically integrate that as part of their SOC workflows. Lets walk through such a scenario with a customer of ours, how they solved the problem with the Query Security Data Mesh, while staying […]
Read more »
August 12, 2025 / August 15, 2025 by Dhiraj Sharan | Leave a Comment
A few days back, Microsoft made big news across the cybersecurity landscape: Sentinel now has a built-in Data Lake — a supposedly lower-cost, long-term storage tier designed to help security teams keep data longer. It’s Microsoft’s official entrance into the security data lake wars, joining a fast-moving space where Splunk, Cribl, Amazon Security Lake, Delta […]
July 2, 2025 / June 27, 2025 by Dhiraj Sharan | Leave a Comment
For modern security and risk management teams, compliance is no longer a quarterly checklist—it’s a continuous imperative. From HIPAA to PCI DSS, GDPR to SOX, security and compliance teams come under pressure to quickly produce evidence, prove controls are in place, and trace access or actions across their sprawling data. But here’s the dirty little […]
April 21, 2025 by Dhiraj Sharan | Leave a Comment
This is part III of a series exploring the concepts and potential of Federated Security. See more. Splunk has become the backbone of enterprise security operations, and for good reason. Its analytics, dashboards, and detection capabilities are among the most powerful in the industry. But there’s a fundamental architectural tradeoff that has become increasingly costly: […]
April 14, 2025 / June 17, 2025 by Dhiraj Sharan | Leave a Comment
The Query AI Origin Story Today, the Query platform is synonymous with Federated Search, but why and how did we get here? Being the founder, let me take you through my journey to Query. The early stage startup journey involves understanding market problems and delivering innovative, game-changing solutions. My cybersecurity career began in 2001 at […]
April 9, 2025 / April 9, 2025 by Dhiraj Sharan | Leave a Comment
Extend Splunk Detection Capabilities with Query Query is a patented Federated Search solution for security data that does NOT require additional centralization or transformation of the data. Query enables security teams to use data to get answers and make better decisions, faster. Acting as an API gateway, Query, enables searching data where it resides without […]
February 20, 2025 / February 20, 2025 by Dhiraj Sharan | Leave a Comment
Product innovation happens at a fast pace at Query. In October, we had announced Query Splunk App 2.4. Today, I am excited to announce the next version – Query Splunk App 2.5 – which is now available on Splunkbase. This new release introduces a very amazing new capability – Federated Detections. Additionally, it also introduces […]
October 2, 2024 / October 17, 2024 by Dhiraj Sharan | Leave a Comment
I am excited to announce that Query Splunk App 2.4 is now available on Splunkbase! With more and more user feedback, we have been making steady improvements to our Splunk App for federated search. This release makes the app more intuitive, easy-to-use, and powerful. What is the Query Splunk App? The Query Splunk App enables […]
April 2, 2024 / May 6, 2024 by Dhiraj Sharan | Leave a Comment
Background Shodan is an Open Source Intelligence (OSINT) tool used for tracking security flaws in networked hardware and software and any IOT device available via the Internet. At the beginner level, Shodan is a search engine for all sorts of services and vulnerabilities, including control systems, insecure baby monitors, security cameras, medical equipment, and whatnot. […]
February 7, 2024 / March 12, 2024 by Dhiraj Sharan
Introduction This case study delves into how a Query customer implemented a security data bridge-based solution, transforming their approach to data management and security analysis. The Organization’s Prevailing Challenges Limited visibility of traditional SIEM solutions This large enterprise was faced with challenges regarding data visibility. Analysts needed to use more and more new data sources […]