Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Query.AI Launches With Security Investigations Platform, $4.6 Million Seed Funding

Query.AI officially launched on Thursday with a security investigations platform and $4.6 million in seed funding.

The funding came from ClearSky Security, DNX Ventures, and South Dakota Equity Partners, and Query.AI says it will be used to accelerate adoption of its product.

Query.AI officially launched on Thursday with a security investigations platform and $4.6 million in seed funding.

The funding came from ClearSky Security, DNX Ventures, and South Dakota Equity Partners, and Query.AI says it will be used to accelerate adoption of its product.

Query.AI has developed what it describes as a security investigations control plane designed to help security teams investigate and respond to incidents by giving them real-time access and centralized insights to data from a wide range of existing cloud and on-premises applications, but without the need to actually transfer or duplicate that data.

Query.AI’s platform can be integrated with tens of third-party SIEM and log management, endpoint security, threat intelligence, cloud infrastructure and security, network, vulnerability management, identity and HR, security instrumentation, email and communications, business analytics, and ticketing and CRM products.

The platform uses a browser-based architecture and the company says it supports natural language processing to make it easier to use by analysts who are not experts in the individual systems.

The South Dakota-based company was founded by Dhiraj Sharan and Andrew Maloney, former engineering and product leaders from Niara and JASK.

Related: DoControl Emerges From Stealth With SaaS Security Platform

Advertisement. Scroll to continue reading.

Related: Online Infrastructure Security Firm Cyberpion Emerges From Stealth

Related: Security Operations and Management Startup StrikeReady Emerges From Stealth

Related: Vulcan Cyber Emerges From Stealth With $4 Million Seed Round

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.