RESOURCES
White Papers
[{"id":4240,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-14_Best-Practices-for-Security-Data-Pipelines.pdf#new_tab","name":"best-practices-for-security-data-pipelines","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-14_Security-Data-Pipelines-White-Paper.png","alt":"query security data pipelines white paper"},"title":"Best Practices for Security Data Pipelines","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Aug 14, 2025","dateGMT":"2025-08-14 15:13:20","modifiedDate":"2025-08-15 03:51:25","modifiedDateGMT":"2025-08-15 07:51:25","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":10},"status":"publish","content":"Strategically move telemetry to cloud object storage in optimized formats. Learn how to design pipelines around downstream consumers, apply compression and partitioning for performance and"},{"id":2063,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/08\/Query_Measuring-and-Optimizing-Enterprise-Security-Search-Costs.pdf#new_tab","name":"measuring-and-optimizing-enterprise-security-search-costs-2","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/08\/QWP-03_security-cost-tmb.png","alt":"measuring and optimizing enterprise security costs white paper thumbnail"},"title":"Measuring and Optimizing Enterprise Security Search Costs","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Aug 22, 2023","dateGMT":"2023-08-22 15:42:45","modifiedDate":"2023-08-22 12:46:01","modifiedDateGMT":"2023-08-22 16:46:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish","content":"Learn how to measure and optimize your cybersecurity investigation costs by quantifying your analysts' searches per investigation (ASPI)."},{"id":1615,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/05\/QWP-002_Evaluating-Federated-Search-for-Security.pdf#new_tab","name":"evaluating-federated-search-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/05\/QWP-002_Evaluating-Open-Federated-Search-for-Security_open.png","alt":"Evaluating Federated Search for Security White Paper"},"title":"Evaluating Federated Search for Security","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"May 9, 2023","dateGMT":"2023-05-09 14:38:07","modifiedDate":"2023-06-28 09:09:31","modifiedDateGMT":"2023-06-28 13:09:31","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish","content":"Outlines the evolution of enterprise, distributed, and federated search, and provides a checklist to consider when evaluating federated search for security."},{"id":1485,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/04\/QWP-001_Federated-Search-for-Security-1.pdf#new_tab","name":"federated-search-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/04\/QWP-001_Federated-Search-for-Security_open-1.png","alt":"Federate Search for Security White Paper"},"title":"Federated Search for Security","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Apr 3, 2023","dateGMT":"2023-04-03 14:39:45","modifiedDate":"2023-06-28 09:10:35","modifiedDateGMT":"2023-06-28 13:10:35","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish","content":"Defines federated search for security, describes the different approaches (single-vendor, closed, and open federated search), and outlines its benefits."}]