[{"id":2063,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/08\/Query_Measuring-and-Optimizing-Enterprise-Security-Search-Costs.pdf#new_tab","name":"measuring-and-optimizing-enterprise-security-search-costs-2","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/08\/QWP-03_security-cost-tmb.png","alt":"measuring and optimizing enterprise security costs white paper thumbnail"},"title":"Measuring and Optimizing Enterprise Security Search Costs","excerpt":"Learn how to measure and optimize your cybersecurity investigation costs by quantifying your analysts' searches per investigation (ASPI)...","content":"Learn how to measure and optimize your cybersecurity investigation costs by quantifying your analysts' searches per investigation (ASPI).","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Aug 22, 2023","dateGMT":"2023-08-22 15:42:45","modifiedDate":"2023-08-22 12:46:01","modifiedDateGMT":"2023-08-22 16:46:01","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish"},{"id":1615,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/05\/QWP-002_Evaluating-Federated-Search-for-Security.pdf#new_tab","name":"evaluating-federated-search-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/05\/QWP-002_Evaluating-Open-Federated-Search-for-Security_open.png","alt":"Evaluating Federated Search for Security White Paper"},"title":"Evaluating Federated Search for Security","excerpt":"Outlines the evolution of enterprise, distributed, and federated search, and provides a checklist to consider when evaluating federated search for security.","content":"Outlines the evolution of enterprise, distributed, and federated search, and provides a checklist to consider when evaluating federated search for security.","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"May 9, 2023","dateGMT":"2023-05-09 14:38:07","modifiedDate":"2023-06-28 09:09:31","modifiedDateGMT":"2023-06-28 13:09:31","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish"},{"id":1485,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/04\/QWP-001_Federated-Search-for-Security-1.pdf#new_tab","name":"federated-search-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2023\/04\/QWP-001_Federated-Search-for-Security_open-1.png","alt":"Federate Search for Security White Paper"},"title":"Federated Search for Security","excerpt":"Defines federated search for security, describes the different approaches (single-vendor, closed, and open federated search), and outlines its benefits.","content":"Defines federated search for security, describes the different approaches (single-vendor, closed, and open federated search), and outlines its benefits.","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Apr 3, 2023","dateGMT":"2023-04-03 14:39:45","modifiedDate":"2023-06-28 09:10:35","modifiedDateGMT":"2023-06-28 13:10:35","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":6},"status":"publish"}]