Security data
is everywhere.
Query is a security data mesh platform that lets you access, use, and get answers from security-relevant data, wherever it is stored.

(And we plug into Splunk.)
Put yours to work.

Query Demo Splunk App Demo Query Federated Search The Query platform — federated search, fast data source connectivity, automatic data enrichment, and data normalization. Query Federated Search for Splunk The Query for Splunk App — expand the reach of Splunk to data housed in Security and IT platforms, SaaS tools, lakes, and cloud storage — normalized to OCSF at the time of search — without increasing Splunk costs. query splunk dashboard

Query is the first security solution that allows security teams to: Control where and how to store data, reducing storage costs and eliminating expensive data engineering and data pipelining projects. Quickly access data from all sources with a single search, including non-security data sources and unstructured data in cloud storage. Supercharge your security investigations with a single view of OCSF-normalized and enriched search results from across your data sources.

Resources

		[{"id":4759,"link":"https:\/\/www.query.ai\/resources\/blogs\/product-release-detection-coverage\/","name":"product-release-detection-coverage","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/01\/Fed-Detections-32.png","alt":""},"title":"Product Release: Detection Coverage for Distributed Security Data","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Jan 28, 2026","dateGMT":"2026-01-28 18:56:34","modifiedDate":"2026-01-28 13:56:36","modifiedDateGMT":"2026-01-28 18:56:36","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":29},"status":"publish","excerpt":""},{"id":4756,"link":"https:\/\/www.einpresswire.com\/article\/887029930\/query-introduces-federated-detections-decoupling-detection-logic-from-data-ingestion#new_tab","name":"query-introduces-federated-detections","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/01\/federated-detections-scaled.png","alt":""},"title":"Query Introduces Federated Detections, Decoupling Detection Logic from Data Ingestion","postMeta":[],"author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Jan 28, 2026","dateGMT":"2026-01-28 16:28:30","modifiedDate":"2026-01-28 11:28:31","modifiedDateGMT":"2026-01-28 16:28:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/newsroom\/\" rel=\"category tag\">Newsroom<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/newsroom\/\" rel=\"category tag\">Newsroom<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","excerpt":""},{"id":4750,"link":"https:\/\/www.query.ai\/resources\/blogs\/siem-and-security-data-predictions-2026\/","name":"siem-and-security-data-predictions-2026","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/01\/Dhiraj-Predictions.png","alt":""},"title":"Five SIEM and Security Data Predictions for 2026","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Jan 26, 2026","dateGMT":"2026-01-26 22:03:31","modifiedDate":"2026-01-26 17:06:31","modifiedDateGMT":"2026-01-26 22:06:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":39},"status":"publish","excerpt":""},{"id":4734,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-is-distributed\/","name":"security-data-is-distributed","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/01\/Security-Data-is-Distributed-Blog-Header-Final.png","alt":""},"title":"Security Data Is Distributed. We Should Act Like It.","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Jan 14, 2026","dateGMT":"2026-01-15 01:03:23","modifiedDate":"2026-01-14 20:03:25","modifiedDateGMT":"2026-01-15 01:03:25","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":29},"status":"publish","excerpt":""},{"id":4732,"link":"https:\/\/www.query.ai\/resources\/blogs\/journey-from-federated-search-to-knowledge\/","name":"journey-from-federated-search-to-knowledge","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/01\/image-8.png","alt":""},"title":"Journey from Federated Search to Knowledge: Centralize the knowledge, not the data","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Jan 12, 2026","dateGMT":"2026-01-13 00:32:11","modifiedDate":"2026-01-12 19:32:12","modifiedDateGMT":"2026-01-13 00:32:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":56},"status":"publish","excerpt":""},{"id":4725,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-2025-year-in-review\/","name":"query-2025-year-in-review","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/12\/Query-Year-in-Review-BlogHeader.png","alt":""},"title":"Query 2025 Year in Review: Building the Security Data Mesh for Modern SecOps","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Dec 22, 2025","dateGMT":"2025-12-22 23:30:48","modifiedDate":"2025-12-22 18:41:13","modifiedDateGMT":"2025-12-22 23:41:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":54},"status":"publish","excerpt":""},{"id":4710,"link":"https:\/\/www.query.ai\/resources\/blogs\/customer-success-story-how-this-enterprise-used-splunk-to-investigate-microsoft-sources-leveraging-query\/","name":"customer-success-story-how-this-enterprise-used-splunk-to-investigate-microsoft-sources-leveraging-query","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/12\/SPLUNK-MSFT-QUERY-blog-header-final-scaled.png","alt":""},"title":"Customer Success Story: How this enterprise used Splunk to investigate Microsoft sources, leveraging Query","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Dec 17, 2025","dateGMT":"2025-12-18 03:05:53","modifiedDate":"2025-12-17 22:05:55","modifiedDateGMT":"2025-12-18 03:05:55","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":14,"sec":58},"status":"publish","excerpt":""},{"id":4694,"link":"https:\/\/www.query.ai\/resources\/blogs\/customer-success-story-investigating-using-archived-crowdstrike-telemetry-stored-in-amazon-s3\/","name":"customer-success-story-investigating-using-archived-crowdstrike-telemetry-stored-in-amazon-s3","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/12\/SP-CRWD-AWS-Blog-scaled.png","alt":"Investigating using archived CrowdStrike telemetry stored in Amazon S3"},"title":"Customer Success Story: Investigating using archived CrowdStrike telemetry stored in Amazon S3","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Dec 15, 2025","dateGMT":"2025-12-15 22:25:22","modifiedDate":"2025-12-17 22:15:16","modifiedDateGMT":"2025-12-18 03:15:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":12,"sec":0},"status":"publish","excerpt":""},{"id":4683,"link":"https:\/\/www.query.ai\/resources\/blogs\/splunk-to-amazon-security-lake-customer-story\/","name":"splunk-to-amazon-security-lake-customer-story","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/12\/2025-12-04_Splunk-SecLake-Transition.png","alt":"Splunk to Amazon Security Lake transition blog"},"title":"Customer Success Story: How This Enterprise Is Transitioning From Splunk to Amazon Security Lake Leveraging Query","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Dec 4, 2025","dateGMT":"2025-12-04 16:03:09","modifiedDate":"2025-12-04 11:03:11","modifiedDateGMT":"2025-12-04 16:03:11","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":16,"sec":15},"status":"publish","excerpt":""}]