Survive the Holiday SOC Nightmare with Automation

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

If you’re a CISO, your holiday season is probably defined by two things: family time and anxiety. Cybercriminals don’t celebrate the holidays. They know your SOC staff is running on fumes, paid-time-off accruals, and maybe checking 3am  Slack messages from a ski slope. They strike when you are weakest.

The numbers aren’t entirely surprising: 86% of ransomware victims were targeted on a holiday or weekend, exploiting the fact that most organizations cut SOC coverage by half — and some leave their operations unstaffed altogether.

Security models that rely on human speed, human availability, and human judgment for Tier-1 and Tier-2 triage are the biggest, most unmanaged risk on your books. This holiday season, stop compensating for the human element and start building a defense that runs autonomously.

Four Holiday “Gifts” Hackers Leave for Understaffed SOCs

If you rely on traditional SOAR or any other legacy solution, you are exposing your business to four critical failures the moment your senior staff goes on PTO.

1. The Suspicious Login Stocking Stuffer

Your analysts are drowning in noise. The few running the skeleton crew during the holidays now have to triage a spike in “suspicious activity” from employees logging in from exotic vacation spots — the VPN alert paradox. It’s not just a workload issue; it’s a trust issue. Can that analyst, stressed and alone, tell the difference between a legitimate login from an employee in Thailand and an attacker in the same time zone?

The Autonomous Fix: Torq Hyperautomation™ doesn’t care if an alert comes in at 10am on a Tuesday or 11pm on Christmas Eve. Agentic AI handles all Tier-1/Tier-2 triage, enrichment, and context correlation instantaneously, ensuring only validated, high-priority incidents wake the on-call analyst.

2. The Silent Night Breach

The cost of a breach is directly tied to the Mean Time to Contain (MTTC). Attackers move laterally in minutes; if your containment relies on a single, sleepy analyst on-call, your MTTC goes from hours to days. Relying on a human to wake up, log in, and manually coordinate remediation is a financial and compliance liability. Human-led containment is simply a vulnerability during peak-risk times.

The Autonomous Fix: The autonomous SOC guarantees machine-speed containment (e.g., firewall block, identity lock, endpoint quarantine) for common and known threats, regardless of who is in the chair.

3. The Broken Playbook Fruitcake

Your legacy SOAR workflows are brittle, coded flows that rely on institutional knowledge to run. The moment the senior analyst who wrote the custom Python glue code is on a beach, that playbook is effectively dead — and so is your defense. A dependency on custom code is a dependency on the individual. You can’t afford to have your security posture tied to a single person’s vacation schedule.

The Autonomous Fix: Our no-code, API-first approach and multi-agent system architecture ensure all automated workflows are visible, centrally governed, and runnable by anyone.

4. The Compliance Ghost of Christmas Past

Regulations like SOC2, DORA, and the SEC’s disclosure rules don’t pause in December. Missing a critical incident due to understaffing is still a compliance failure, carrying massive potential fines and career risk. You need an audit trail that can prove, without human intervention, that an incident was detected, investigated, and contained according to policy. 

The Autonomous Fix: Torq’s team of AI Agents automatically documents every detection, decision, and remediation step — creating a real-time audit trail you can present to auditors, not apologies to the board.

How Torq HyperSOC™ Saves the Holiday SOC

The CISO’s job isn’t to perfectly staff the SOC 24/7/365; it’s to build a defense that doesn’t require perfect staffing. You need to offload the reliability problem from your people to a platform designed for autonomy: Torq HyperSOC™.

Here’s how to stop staffing the gap and start automating the vulnerability, ensuring 24/7/365 coverage whether your team is full-stack or on skeleton crew.

Guaranteed Coverage with AI-Driven Response

Implement HyperSOC to handle all high-volume, low-fidelity incidents autonomously. Our agentic AI reasons, plans, and executes containment actions across your environment in milliseconds. The autonomous SOC guarantees the highest standard of defense when your analysts are away, ensuring only validated, high-severity incidents require human judgment.

No-Code Resilience for Any Team

Your defense shouldn’t depend on whoever wrote that Python script three holidays ago. Migrate all your fragile, code-based SOAR logic to our AI Workflow Builder. Our no-code architecture ensures all automated workflows are visible, centrally governed, and executable by anyone (or anything) — guaranteeing operational continuity. 

Automated Compliance and Audit Trails

Use agentic AI not just to respond, but to generate the auditable reasoning trail for every autonomous action. This ensures compliance, even when no human was involved. You can confidently report to the board that containment was machine-speed, policy-driven, and thoroughly documented.

Give Analysts the Gift of Time Back

Every minute you automate is a minute your analysts get back — for strategy, for innovation, or for an actual holiday. Torq customers routinely save hundreds of analyst hours per quarter while improving MTTR, coverage, and team morale.

This holiday, trade burnout for balance and let Torq keep watch while your team finally gets a silent night.

Sleep Peacefully This Holiday Season — We’ll Leave the Torq On

This holiday season, give your team the gift of a break — and give your board the gift of guaranteed security. The autonomous SOC is the only system that truly operates 24/7/365. Stop settling for a security posture that is only as strong as the one analyst pulling the graveyard shift.

Don’t wait until the New Year to fix last year’s biggest problem.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Panther + Torq: Closing the Loop on Detection & Response

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series.

For years, security teams have been trapped by legacy SIEM and SOAR solutions. They’re forced to make compromises — slashing data retention to 30 days to control costs, spending more time tuning brittle tools than hunting threats, and manually bridging the gap between a noisy alert and a meaningful response.

In the latest episode of Torq’s AMP’d Sessions, we sat down with Mike Olsen, Director of Partner Solutions Engineering at Panther, to discuss how customers are moving on from this broken model. They’re modernizing their SecOps data pipeline with Panther’s cloud-native data lake and Torq’s autonomous response.

Together, Torq and Panther deliver a closed-loop system that moves from detection to remediation at machine speed. Here’s how.

Panther’s Cloud-Native Data Lake: Built for the Modern SOC

The core problem with legacy SIEMs is their architecture. They weren’t built for the cloud era, forcing teams to choose between cost and visibility. Panther takes a different approach. 

The foundation to the Panther platform is leveraging a cloud-native, modern data lake architecture. This serverless approach provides four key benefits:

  1. Limitless scale: “We have a customer that’s ingesting 40 terabytes daily,” Olsen noted. Teams no longer have to make compromises on what security logs to keep.
  2. Long-term retention: Instead of 30 days, Panther customers can retain data for at least a year in hot storage, enabling threat hunting and long-tail investigations without requiring rehydration.
  3. Data ownership: Your data stays in your cloud. Panther supports a “bring your own data lake” model, avoiding the vendor lock-in of traditional SIEM.
  4. Separation of compute and storage: This allows teams to “query petabytes of data at peak performance” without bogging down the system.

On top of this data lake, Panther employs a “Detection-as-Code” model. This gives teams the flexibility to write, tune, and deploy detections using Python, a low-code builder, or even AI-assisted creation, all managed in a CI/CD pipeline.

How Torq Turns Detection into Autonomous Response

Panther provides the high-fidelity detection and AI-driven triage; Torq provides the autonomous action. When Panther generates a high-confidence alert, it doesn’t just send a raw log. It sends a rich, AI-triaged case summary. Torq HyperSOC™ ingests this data and hands it to Socrates, Torq’s AI SOC Analyst. This initiates an AI-to-AI communication that is fully explainable and auditable.

Socrates reasons through Panther’s findings, orchestrates the necessary response actions through Hyperautomated workflows, and documents every step — transforming Panther’s T1-to-T2 analyst elevation into a T3 strategic “analyst-as-validator” model.

“Panther identifies what is happening, and then Torq decides what to do about it next.”

– Bob Boyle, Product Marketing Manager, Torq

Inside the Demo: From Data Lake to Autonomous Remediation

The AMP’d session demo showcased this closed-loop system in action, remediating a sophisticated identity-based threat from start to finish.

1. The Detection (Panther)

A high-fidelity correlation rule fired in Panther, combining two separate events:

  • Event 1: An Okta login from a “watch list” country (France).
  • Event 2: An M365 enumeration activity (like Get Users or List Admins) from the same user within 30 minutes.

Individually, these might be noise. Together, they could be something more. Panther’s AI Triage autonomously analyzed the events, generated a summary: “This is an anomalous login. The user, Timothy, is based in the U.S., not France,” and exposed its thinking steps for human validation.

Panther and Torq integration powering autonomous SecOps
Panther identifies suspicious login activity from a watchlist country and correlates it with Azure AD enumeration to elevate signal fidelity.

2. The AI-to-AI Handoff (Torq)

Torq ingested the correlated alert and Panther’s AI triage summary.

  • AI-to-AI: A Torq AI Agent evaluated Panther’s findings: “Based on Panther’s analysis, is this showing signs of persistence?”
  • The verdict: The Torq Agent confirmed “Recurrence: True,” mapped the attack to the MITRE Initial Access tactic, and automatically escalated the new case in Torq’s Case Management platform to ‘Critical’ priority.
Panther and Torq integration powering autonomous SecOps
Torq ingests Panther’s enriched alert and uses AI analysis to validate recurrence, map MITRE tactics, and automatically escalate the case to Critical.

3. The Autonomous Response (Socrates)

The critical case was automatically assigned to Socrates, Torq’s AI SOC Analyst, which followed its autonomous remediation runbook:

  • Investigation: Socrates reached back into Panther, querying the data lake for more user activity logs to broaden the investigation.
  • User verification: Torq’s communication agent autonomously interviewed the user, Timothy, directly in Slack: “Hey, Timothy, did you log in from France recently?” Timothy’s reply: “No.”
  • Containment: Based on that “No,” Socrates immediately executed its containment plan: it disabled the user’s Okta account and added the malicious IP address to a company-wide blocklist.
  • Notification: For business continuity, Socrates identified Timothy’s manager and sent them a Slack message: “Hey, there’s an active SOC incident… Timothy’s account is locked, and he won’t be able to respond.”
Panther and Torq integration powering autonomous SecOps
Socrates, Torq’s AI SOC Analyst, autonomously investigates the case, verifies user intent via Slack, and executes containment actions like account disablement and IP blocking.

4. The Closed-Loop SecOps Pipeline

The entire cybersecurity lifecycle — from initial detection to full containment — happened in seconds. Every AI thought process, query, and action was logged in an immutable audit trail. The case was then escalated to a human analyst, not to work the alert, but to simply validate the autonomous actions already taken and close the case.

This partnership fundamentally changes the SecOps paradigm. It’s no longer a linear, manual handoff from a legacy SIEM to a brittle SOAR. It’s a single, intelligent, and closed-loop system, or what we like to call an autonomous SOC.

“What I’m most amped about is the combination of Panther’s AI-driven context from detection, and then combining that with Torq’s Hyperautomation for response. It’s really closing that loop and eliminating the manual gap between detection and action.”

Mike Olsen,  Director of Partner Solutions Engineering, Panther

Panther and Torq integration powering autonomous SecOps
Panther detections flow into Torq for autonomous triage and response, creating a closed-loop SecOps pipeline that remediates threats in seconds with full auditability.

Better Together: Torq + Panther

For security teams, the Torq and Panther partnership means:

  • Limitless scale: Ingest and retain all your security data in Panther’s data lake.
  • AI-triaged detections: Eliminate noise with Panther’s high-fidelity, AI-analyzed alerts.
  • AI-to-AI communication: Let Panther’s detection agents talk directly to Torq’s response agents for autonomous escalation.
  • Autonomous remediation: Go beyond simple automation to fully remediate threats — from investigation to containment and user verification — without human intervention.
  • End-to-end auditability: Maintain full, explainable audit logs of every AI decision and action, from detection to response.

Watch this workflow unfold in real time in the Torq + Panther AMP’d Session.


SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Kenvue Turns Security Operations into a Strategic + Data-Driven Function

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

The pace, complexity, and stakes of cybersecurity have changed — and most organizations are struggling to keep up. Every day, security operations centers (SOCs) are buried under thousands of security alerts from dozens of tools, each requiring validation, triage, and response. Meanwhile, attackers are using AI and automation to move faster and exploit every gap.

Most organizations struggle to keep up because their SOCs run on fragmented systems and manual processes. Too many tools, too little visibility, and not enough consistency to scale. What used to be a technical challenge has become a strategic business risk.

When every alert affects uptime, reputation, and compliance, SOC performance isn’t just an IT metric — it’s a business imperative. That’s why enterprises are embracing automated security workflows and security Hyperautomation — the foundation for modern, scalable security operations that defend at machine speed.

The Modern SOC Challenge

Across industries — from healthcare and retail to finance and tech — SOC teams face the same systemic challenges:

  • Inconsistent processes: Manual, siloed workflows lead to gaps in coverage and unpredictable results.
  • Limited visibility: Fragmented data across EDR, SIEM, IAM, and cloud tools makes it hard to see what’s actually happening.
  • Alert fatigue and burnout: Analysts spend most of their day validating false positives instead of investigating real threats.
  • Lack of measurable impact: Many SOCs can’t easily demonstrate performance, efficiency, or risk reduction to business stakeholders.

As a result, even well-staffed SOCs often operate reactively, always chasing incidents instead of improving resilience. To break this cycle, organizations need automated security workflows that standardize response, unify tools, and provide real-time visibility into performance and risk. That’s where Torq Hyperautomation™ comes in.

Hyperautomation: The Foundation for a Modern SOC

Hyperautomation transforms security operations from fragmented security workflows into a coordinated, self-improving system. It uses AI-driven security automation to connect every tool, process, and analyst decision, building the foundation for a continually improving SOC.

The benefits of implementing automated workflows extend far beyond speed:

  • Standardization: Every incident follows the same consistent, repeatable process.
  • Visibility: Unified context across tools ensures no critical alerts are missed.
  • Efficiency: AI-driven correlation eliminates manual triage and data entry.
  • Resilience: Automated responses scale effortlessly across hybrid and cloud environments.
  • Accountability: Built-in reporting and audit trails strengthen compliance and prove SOC value.

Inside Kenvue’s SOC Transformation with Torq

Global consumer health leader Kenvue — home to trusted brands like BAND-AID®, Listerine®, and Neutrogena® — faced these same challenges on an enterprise scale. Their outsourced “black box” SOC delivered coverage but not transparency. The team lacked visibility into how incidents were handled, and there was no consistent process to measure or improve performance.

When Kenvue brought operations in-house, they aimed to modernize security operations with automated security workflows that delivered consistency, visibility, and measurable value. 

Their objectives:

  • Replace black-box operations with transparency
  • Establish consistent, standardized workflows across global teams
  • Prove quantifiable business value through data and visibility

They chose Torq Hyperautomation as their foundation to automate tasks and transform the SOC’s operation.

“It’s clear Torq was built for security operations functions — and it’s head and shoulders above any other automation tool I’ve used before.”

Dustin Nowak, Cyber Threat Manager, Kenvue

How Kenvue Implemented Automated Security Workflows with Torq

Kenvue used Torq to implement automated security workflows that brought consistency, structure, and insight to every aspect of incident response.

Advanced Case Management Purpose-Built for SecOps

Torq provided Kenvue with mature case management, capturing observables, notes, and evidence in structured, repeatable formats. Every incident followed the same process, eliminating ambiguity and making investigations defensible and auditable by design.

“It wasn’t just about speed,” Dustin explained. “It was about consistency — and being able to prove we’re doing the right things the right way.”

Standardized Workflows for Consistency

Torq’s automated security workflows helped Kenvue normalize response procedures across dozens of incident types. Each case contained the same level of context, structured the same way, and followed the same escalation path.

This consistency built a foundation for speed and trust. Analysts no longer had to guess how to proceed, and leadership could see exactly what was happening, when, and why.

Unified Data for Actionable Insights

Before Torq, pulling meaningful metrics from scattered systems was difficult Now, with rich tagging and categorizations in Torq, Kenvue’s team can slice and dice data with depth and detail, creating a data-driven feedback loop that drives continuous improvement. 

Interactive forms even allow other business units to submit issues directly into Torq, ensuring smooth intake for compliance or third-party incidents without extra manual steps.

SOC Transformation: More Than Just Workflow Automation

By adopting Torq, Kenvue achieved transformative outcomes:

  • Hit their automation goal in six months; automating 89% of cases 
  • Reduced mean time to respond (MTTR) by 60%
  • Aligned their hybrid team around standardized, measurable processes
  • Built and adapted complex case workflows without sacrificing control

Even more critically, Torq enabled a deeper level of investigation. Analysts had more time to validate cases, detect anomalies, and trace threats that traditional tools and alert rules would have missed.

Today, Kenvue’s SOC is a measurable, strategic function that delivers real-time insights and value to the business. With Torq, they have the tools to show stakeholders:

  • Where risk exists and how it’s being addressed
  • How security posture is improving month over month
  • Why automated security workflows are the key to scaling without compromise

“We can now go to the business and say, ‘Here’s where the risk is, here’s how we brought that risk down, and we’re getting better at buying that risk down.’”

Dustin Nowak, Cyber Threat Manager, Kenvue

Transform Your SOC with AI and Hyperautomation

Every enterprise — from startups to global brands — faces the same truth: cyber threats evolve faster than manual teams can react. Automated security workflows are the only way to keep pace. By unifying fragmented security workflows, minimizing human error, and enabling scalability, automation empowers SOCs to instantly and consistently handle every alert — from vulnerability management and phishing detection to cloud incident response.

But true modernization requires more than isolated automation. Hyperautomation creates an intelligent, scalable framework of consistency, visibility, and continuous improvement that protects not just your infrastructure, but your entire business.

Torq Hyperautomation™ empowers security leaders to:

  • Streamline operations through automated security workflows and unified case management.
  • Strengthen resilience with real-time insights into risks, trends, and SOC performance.
  • Elevate security’s role as a strategic business enabler, not a back-office function.

See how you can achieve the same speed, visibility, and operational maturity as Kenvue. Read the full story of how Torq delivered measurable SOC impact through automated security workflows combined with a strategic focus.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

How Agoda Scaled Security and IT Operations with Hyperautomation

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

For global digital platforms, speed and trust go hand in hand. Millions of users expect seamless experiences — from instant logins and secure transactions to real-time updates across multiple devices and regions. Behind that simplicity sits a complex ecosystem of cloud services, APIs, and data integrations operating across time zones and compliance frameworks.

As digital ecosystems scale, so does operational complexity. Security and IT automation have become essential for maintaining performance, compliance, and user trust. Security teams must safeguard customer data while IT teams ensure uptime and availability — both responding instantly to incidents and supporting rapid development cycles.

Yet many enterprises still struggle with manual workflows, overlapping tools, and limited visibility into security alerts and service requests. Legacy orchestration platforms and old playbooks can’t keep up. Routine actions like enriching alerts, resetting credentials, or escalating tickets consume hours instead of seconds, slowing teams down and increasing operational risk.

Modern enterprises need unified, automated cybersecurity — a no-code, automation-first approach that connects tools, eliminates handoffs, and delivers real-time visibility across security and IT operations. Only then can organizations scale securely while maintaining the agility their customers expect.

3 SOC Challenges for Global Digital Platforms Solved by Security and IT Automation

For digital service providers, success depends on their ability to move quickly without compromising security. Hyperautomation makes that possible, bringing secure automation to every corner of the enterprise.

1. Alert Triage and Enrichment

With security automation, teams can automatically aggregate, enrich, and prioritize alerts from multiple cloud and endpoint systems, so that analysts focus only on high-fidelity, business-critical threats.

Workflow Steps:

  • Receive new alerts from SIEM or XDR tools.
  • Execute parallel enrichment tasks to pull context from EDR, IAM, and cloud telemetry sources.
  • Extract indicators such as IPs, hashes, and user IDs, correlating them with threat intelligence feeds.
  • Apply AI-driven risk scoring to classify alerts as benign, suspicious, or critical.
  • Automatically close low-risk alerts and create cases for confirmed threats.

2. Cloud Misconfiguration Detection and Remediation

Automate the detection and response to misconfigurations or vulnerabilities across multi-cloud environments — ensuring compliance and reducing exposure windows.

Workflow Steps:

  • Receive configuration or vulnerability findings from a CSPM tool.
  • Filter for issues marked ‘High’ or ‘Critical.’
  • Enrich findings with asset metadata (e.g., owner, environment, region).
  • Trigger auto-remediation workflows — such as adjusting IAM permissions, rotating exposed keys, or enforcing encryption.
  • Validate the fix and update the case or ticket automatically.

3. Phishing Email Analysis and Response

Eliminate manual review of user-reported phishing emails by automating end-to-end triage, analysis, and containment.

Workflow Steps:

  • Monitor a dedicated mailbox for user-reported phishing submissions.
  • Extract and analyze message headers, links, and attachments using multiple security analysis tools.
  • Cross-check against threat intelligence feeds for known indicators.
  • If malicious, quarantine the email across all mailboxes, notify affected users, and open a security case.
  • If benign, notify the user with a safe, templated response and close the case automatically.

Benefits of Security and IT Automation

Connecting tools across cloud, IT, and security operations, security Hyperautomation eliminates manual handoffs and accelerates triage, investigation, and remediation. This brings consistent execution, faster response, and happier teams.

Key benefits for digital platforms include:

  • End-to-end visibility: Unified data flow across SIEM, ITSM, and identity tools
  • Consistent workflows: Repeatable, auditable processes across time zones
  • Faster response: Automation handles repetitive triage and enrichment in seconds
  • Reduced burnout: Teams focus on analysis, not administration

This shift turned security operations at Agoda from a reactive cost center into a proactive value driver — enabling faster incident response, automated IT support, and improved cross-team collaboration.

How Agoda Transformed Its SOC with Torq Hyperautomation

Agoda, one of the world’s leading online travel platforms, faced a pivotal challenge: modernizing its security operations while operating with a small, globally distributed team. At the same time, the company was migrating from legacy on-prem infrastructure to a modern, cloud-first security stack.

Existing automation tools required extensive custom coding and manual connector maintenance — slowing progress and limiting scalability. Agoda needed a flexible, no-code platform to unify alerts, automate investigations, and streamline IT workflows across its hybrid environment.

In 2020, after a successful proof of concept, Agoda selected Torq Hyperautomation™ to power its next phase of growth. The immediate results showed how quickly security and IT automation could deliver measurable impact.

  • Rapid time to value: Thanks to Torq’s no-code/low-code interface and extensive integration library, Agoda’s first automations were live within weeks — not months. Even complex workflows connecting SaaS apps to on-prem systems could be built in minutes.
  • Full-stack integrations: Without manual coding, Agoda connected its core security and IT tools — including cloud providers, endpoint platforms, and communication apps. Even complex SaaS-to-on-prem connections were built in minutes using native integrations and webhooks.
  • Hands-on partnership: Torq engineers co-built critical early workflows alongside Agoda’s team from proof of concept to production. 

“Even Torq’s CTO jumped in to help us build during the early days — it was seamless.”

Karthick Gopalakrishnan, Senior Security Engineer, Agoda

What Agoda Hyperautomated

When Agoda implemented Torq’s Hyperautomation platform, its goal wasn’t just to automate tasks but to redefine how security and IT operations worked together. In a matter of weeks, the team replaced fragmented, manual processes with intelligent, AI-driven workflows that now operate 24/7 across the organization. From automated phishing response to instant IT service resolutions, Agoda’s automation framework has become the backbone of its global operations.

24/7 Automated Phishing Response

Every phishing report submitted through Outlook now flows directly into Torq. AI-driven enrichment and classification automatically determine whether a message is benign, suspicious, or malicious — and respond accordingly.

  • 30–40 daily submissions handled autonomously
  • 2-minute average response time to reporters
  • Zero analyst intervention required

Instant IT Service Resolutions

Agoda’s IT service desk now resolves 200–300 password resets per month automatically. App deployment requests that once took a full day are completed in under 10 minutes. This shift freed both IT and security teams from repetitive, low-value tasks and improved employee experience across global offices.

Faster, Smarter Incident Response

Torq now orchestrates Agoda’s incident response, enriching alerts, isolating compromised systems, and even automatically resetting credentials. Response actions that once required analysts to coordinate across multiple tools now run in parallel, with full audit logs and human-in-the-loop control for sensitive cases.

Expanded Impact Across Teams

What began as a SOC initiative has evolved into a company-wide automation initiative. IT, engineering, and security teams now build their own workflows for use cases like proxy whitelisting, onboarding, and even automated threat-model draft generation for developers.

Results that Scale Across Security and IT

With Torq, Agoda redefined what speed and scale mean in a global enterprise. The adoption of security and IT automation bridged once-disconnected teams, slashed manual workloads, and accelerated both detection and resolution. Every workflow — from phishing triage to password resets — now runs smarter, faster, and more consistently than ever before.

  • 89% of alert actions automated
  • Response times reduced by 60%
  • 50% of IT tickets resolved automatically

“Torq outshines in MTTR reduction. Even if we’re offline, we know the threat is isolated. That’s a huge stress reliever for the team.”

Laksh Gudipaty, Security Incident Response Manager, Agoda

Hyperautomation Enables Continuous Innovation

Agoda’s journey demonstrates the transformative power of security and IT automation. By embracing cybersecurity automation, their teams shifted from reactive to proactive, continuous improvement.

Hyperautomation gives modern businesses the same advantage Agoda achieved:

  • Continuous visibility across security and IT systems
  • Faster containment and reduced downtime
  • Proactive operations that scale with global demand

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Wizdom 2025: The Future of Cloud Security

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Chris Coburn is the Senior Director of Technology Alliances at Torq

Chris Coburn is the Senior Director of Technology Alliances at Torq, where he leads strategic partnerships that fuel innovation and growth. With experience scaling alliance programs at cybersecurity leaders like Recorded Future, he brings an execution-first mindset to ecosystem development. He’s the architect of Torq’s AMP program, redefining how partners integrate, collaborate, and win together.

This November, New York City and London became the epicenter of modern cloud defense as Wiz hosted its first-ever user conference, Wizdom, bringing together global leaders, builders, and innovators who are redefining how organizations secure the cloud.

Across three days of keynotes, workshops, and hands-on sessions, Wizdom 2025 explored the next frontier of cloud protection — where AI, automation, and human creativity converge to deliver resilience at machine speed. As a featured partner, Torq joined Wiz to showcase how AI-driven Hyperautomation and real-time orchestration empower security teams to move as fast as the environments they defend.

Together, Wiz and Torq shared what’s next: a unified model for autonomous cloud operations, built on visibility, context, and speed.

Key Takeaways from Wizdom 2025

At Wizdom 2025, one message stood out: AI isn’t just another shift in technology; it’s a complete redefinition of how cybersecurity, innovation, and leadership will operate in the next decade. The conversations on stage reflected a new reality for defenders: one where AI accelerates both sides of the battle, innovation demands constant reinvention, and success depends on how fast teams can adapt.

  • AI transformation: AI is moving faster than any technological revolution before it. Speakers at Wizdom 2025 warned that it’s creating an asymmetric landscape, where attackers rapidly exploit generative models, automation, and data scale — while defenders must evolve their own systems just as quickly. The organizations that thrive will be those that integrate AI into every layer of security, serving as a foundation for informed decision-making and effective response.
  • Innovation: The next generation of successful founders and leaders will be defined by their willingness to disrupt their own playbooks. Speakers called out the need for decentralized innovation, encouraging teams to run fast-moving “skunkworks” projects that challenge assumptions and test what’s possible. Great founders, they said, are the ones who see what’s next before the market does — and aren’t afraid to break their own models to get there.
  • The future of technology: AI will evolve through phases: augmenting humans and ultimately enabling autonomous agent-to-agent collaboration. That future introduces a new challenge: trust. As AI systems increasingly act independently, companies will need to collaborate across industries to establish standards, ensure transparency, and implement shared safeguards.
  • Leadership: The best leaders won’t control every move — they’ll set vision and build infrastructure that allows teams to experiment, fail safely, and learn fast. Empowering entrepreneurial thinking at every level is no longer optional; it’s how organizations will stay relevant when change happens at machine speed.

A Proven Partnership: Wiz + Torq in Action

The Wiz and Torq partnership has become a benchmark for how security operations should function in the cloud era, seamlessly connecting visibility with action, and detection with remediation.

Since becoming an inaugural Wiz Integration (WIN) launch partner, Torq HyperSOC™ has served as the automation and orchestration engine behind Wiz’s unified cloud visibility platform. Together, Wiz and Torq help organizations detect, prioritize, and resolve cloud threats in minutes.

When Wiz finds a misconfiguration, leaked credential, or active threat, Torq HyperSOC™ takes over instantly. Alerts flow directly into AI-driven workflows, where Socrates, Torq’s AI SOC Analyst, correlates findings, enriches telemetry, and automates containment. The result: zero silos, zero lag, and complete visibility across every cloud environment.

From AWS and Azure to GCP and Kubernetes, this integration bridges cloud security and SecOps, giving teams a continuous, autonomous loop between Wiz Defend detections and Torq’s Hyperautomated response.

Over the last few years, the partnership has gone from just an integration to a real SOC impact. Today, customers running Wiz + Torq report measurable results:

  • 90% reduction in manual case handling
  • 3–5x increase in SOC throughput
  • 95%+ of Tier-1 and Tier-2 alerts remediated autonomously
  • 10x faster MTTR, with visibility into zero-day threats within 24 hours

As one of Torq’s featured AMP’d partners, Wiz joined the AMP’d Sessions video series to show how visibility and automation combine to deliver cloud security at machine speed. This partnership is a shared vision for the future of security operations: unified visibility from Wiz, autonomous response from Torq, and a cloud SOC that never sleeps.

“The beauty about this partnership is that Torq was always there, side by side, as one of our design partners as we have evolved.”

Oron Noah, VP of Product, Wiz

See It Live: Wiz + Torq Live Demo

Join Wiz + Torq on November 12 to see how AI Agents detect, triage, and remediate threats in real time — without human lag, alert fatigue, or context switching. Watch how Wiz detections instantly trigger Torq HyperSOC™ workflows that autonomously investigate and contain risks across your entire cloud environment. See how to:

  • Auto-remediate cloud threats in seconds
  • Cut through noise with AI-powered triage 
  • Scale your SOC with no-code automation

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Torq Case Management: Built for Enterprise-Scale SOCs

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Most case management systems weren’t built for modern security operations. They were built for tickets. Legacy tools and add-on automations force analysts to swivel between dashboards, copy-paste IOCs, and manually escalate alerts that lack context. That model collapses fast in today’s SOC, where tens of thousands of alerts hit daily.

Torq built something different. Torq’s Enterprise Case Management is an AI-native system that unifies triage, investigation, enrichment, and response into a single, intelligent lifecycle. 

The Case Management Problem No One Talks About

Traditional case management platforms assume analysts will do the heavy lifting — gathering evidence, correlating alerts, updating tickets, and escalating manually. This is inconvenient at a small scale but unsustainable at an enterprise scale.

Large SOCs need a system that:

  • Keeps up with tens of thousands of alerts daily
  • Maintains accuracy and context across complex hybrid environments
  • Adapts dynamically as threats and priorities change

Torq HyperSOC™’s advanced case management is proven to do exactly that. 

How Torq Enterprise Case Management Works

Every case in Torq is a data object that represents the full lifecycle of an incident, from detection through remediation and closure. When an event is ingested — from a SIEM, XDR, or any of Torq’s 300+ integrations — the system determines if it is in fact an incident, and if so, automatically generates a case entity composed of five interlinked components:

  1. Metadata and taxonomy: Each case is assigned a structured schema (type, source, severity, MITRE ATT&CK mapping, SLA) derived from detection logic or workflow input. This ensures every case adheres to organizational taxonomies and compliance standards.
  2. Observables graph: Torq automatically parses and normalizes raw event data — IPs, hashes, usernames, domains, devices, and artifacts — into graph-linked observables. These relationships are stored natively, allowing queries like “show all cases with the same hash seen in the last 7 days” or “find devices accessed by this user post-compromise.”
  3. Dynamic enrichment pipeline: When a case is created, Torq launches parallel enrichment jobs using connected sources — EDR telemetry, threat intelligence feeds, IAM data, CMDBs, and more. Each enrichment step posts results directly into the case record, tagged and timestamped, creating a verifiable context chain.
  4. AI triage and prioritization: Socrates, Torq’s AI SOC Analyst, analyzes all observables and enrichment results to determine confidence, severity, and next steps. Using reinforcement learning from resolved cases, Socrates scores each case based on the likelihood of a true positive, business impact, and threat propagation risk. Low-confidence cases can be auto-closed or merged; high-confidence cases are escalated with full context attached.
  5. Execution: Torq connects directly to the organization’s security stack (EDR, IAM, firewall, CSPM, ITSM, and messaging). Analysts can trigger risk-gated actions directly from within the case without context switching or manual scripts. These actions are governed by deterministic rulesets (“approval gates”) and recorded immutably in the case timeline.

Example Case Lifecycle in Torq

Example Case Lifecycle in Torq

 A Hyperautomation workflow triggers Torq’s custom AI Agents to triage the event and enrich the data with third-party threat intelligence, blending deterministic event-driven workflows with agentic reasoning and execution.

Example Case Lifecycle in Torq

The Tier-1 Agent functions as a security analyst responsible for creating, formatting, and compiling a comprehensive security case — all while keeping the security team updated via Slack/Teams integrations.

Example Case Lifecycle in Torq

Torq HyperSOC uses agentic reasoning to prioritize the most critical cases and summarizes each case with relevant information.

Example Case Lifecycle in Torq

Based on the case classification, one-click quick action buttons are added that trigger Hyperautomation workflows for the most common containment and response actions. Higher-impact actions can optionally require human authorization, blending machine-speed response with human oversight.

In over 90% of cases, Socrates — the AI SOC Analyst — has the tools necessary to remediate the case autonomously, following the steps laid out in the appropriate remediation runbook. Every AI action is thoroughly documented, with immutable execution logs and transparent decision-making processes.

Example Case Lifecycle in Torq

Once the incident is contained and the risk is remediated, the case is closed, and an AI-generated resolution note is added. If necessary, the case will be assigned to a human analyst for any further action — such as following up with a user whose account was locked, or assigning additional security awareness training.

What Makes Torq Case Management Different

Architecture-Level Advantages

  • Event-driven: Built on an asynchronous, distributed event system that handles millions of concurrent actions with zero blocking.
  • Schema-agnostic: Accepts unstructured JSON payloads and normalizes them into a consistent internal data model for cross-tool correlation.
  • API-first design: Every case, enrichment, and action is addressable via REST and GraphQL APIs for seamless integration with custom tooling.
  • Immutable state engine: Every field modification is versioned; every state change is logged — ensuring compliance, auditability, and forensic traceability.
  • Elastic scalability: Dynamic worker scaling enables horizontal growth across clusters without downtime, supporting multi-region, multi-tenant SOCs.

AI + Deterministic Reliability

Torq blends agentic AI with deterministic control, ensuring automation remains explainable and compliant.

  • LLM-based reasoning for analysis and enrichment
  • Deterministic “approval gates” for containment or deletion actions
  • Immutable logs of every AI recommendation, human correction, and execution
  • Continuous learning from resolved cases to refine triage logic

This combination delivers both speed and trust, balancing AI autonomy with human oversight — a key reason enterprises choose Torq over less mature “workflow emulators.”

Hyperautomation

Torq unifies detection, enrichment, workflow, and audit into a single case lifecycle. Unlike platforms that bolt ticketing onto automations, Torq’s cases are the automation — dynamically updating with every new event, IOC, and workflow execution.

  • Auto-populates with threat, asset, and user context
  • Logs every enrichment, containment, and analyst action
  • Enables one-click actions (isolate, revoke, block) from within the case
  • Generates immutable audit trails and timeline visualizations

Real-Time Collaboration

Torq’s enterprise case management syncs context, chat, and action in one workspace — automatically updating as workflows execute.

  • Live “war rooms” that connect SOC, IT, and compliance teams
  • Real-time updates on findings, analyst notes, and playbook actions
  • Integrations with Slack, Teams, and ServiceNow for seamless handoffs
  • Cross-functional collaboration for HR, Help Desk, or BI teams — without requiring platform logins

Built for MSSPs and Global Enterprises

Torq’s multi-tenant case management enables managed security service providers and large organizations to scale horizontally, managing hundreds of customers or internal business units through a unified platform.

  • Templates and reusable workflows accelerate onboarding
  • Shared automations across tenants while keeping data fully isolated
  • Unified analyst queue that spans customers, with precise access controls
  • Faster SLAs, consistent reporting, and stronger margins for MSSPs

Case Management for the SOC of Tomorrow

Case management is no longer about tracking what happened but orchestrating what happens next. Torq HyperSOC™ transforms every case into a living, automated workflow that connects people, processes, and AI in real time.

And industry validation backs it up: The 2025 GigaOm SecOps Automation Radar Report named Torq a Leader and Fast Mover for execution-based automation, giving Torq Enterprise Case Management a top score in this area.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

How Cyera and Torq Automate Data Protection

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series.

In today’s enterprise, data is both the most valuable asset and the greatest risk. Security operations are only as strong as their understanding of data — yet for most SOCs, data exposure remains a blind spot, sprawling across cloud, SaaS, and AI-driven environments faster than analysts can track.

Torq’s recent episode of the AMP’d Sessions spotlighted Cyera, the leader in data security and AI protection, to explore how its platform pairs with Torq HyperSOC™ to create an autonomous feedback loop between detection and response. This powerful partnership will also be on display at Cyera’s 2025 DataSecAI conference

Together, Torq and Cyera give SOC teams real-time visibility into data risk — and the power to remediate it instantly. Here’s how.

Inside the Torq + Cyera Integration

Every SOC stack looks different and that’s exactly why Torq HyperSOC™ was built to integrate with anything. From SIEM and EDR to DSPM, IAM, and XDR tools, Torq connects every signal, system, and workflow through a no-code, API-first architecture. That means every detection — no matter where it originates — can trigger an immediate, intelligent response.

 Torq + Cyera Integration
Torq HyperSOC™ automatically generates a case from a Cyera data exposure alert, enriching context and assigning ownership for immediate triage.

The integration between Torq and Cyera exemplifies that vision. Cyera delivers deep visibility into data exposure risks across cloud and SaaS environments. When Cyera detects a sensitive data incident — like an exposed file containing personal or financial information — it sends rich, contextual telemetry directly into Torq.

Torq then automatically:

  • Creates a case pre-populated with Cyera’s alert data, observables, and recommendations
  • Correlates the event across security systems to validate and enrich context
  • Orchestrates the next best action, from isolation to user verification, through agentic AI and security Hyperautomation

Cyera’s Data Detection Engine

Torq + Cyera Integration
Cyera detects and classifies sensitive data exposure in Microsoft 365, pinpointing affected files, identities, and risk level for the SOC.

Cyera gives security teams the superpower they’ve always needed: complete visibility into what data exists, where it lives, and how it’s exposed. Its Data Security Posture Management (DSPM) platform continuously scans every corner of an organization’s environment — from AWS buckets to OneDrive files — to identify sensitive data at risk.

Within minutes of deployment, Cyera classifies and contextualizes data across structured and unstructured sources. It goes far beyond standard identifiers like names or Social Security numbers — uncovering context-rich categories such as patient data, financial records, or proprietary business IP.

When exposure occurs, Cyera’s AI-driven analytics determine whether it’s accidental (like an overly permissive sharing link) or malicious. Each alert includes detailed metadata about the affected files, identities, and access patterns, giving the SOC immediate insight into what’s at stake. This level of visibility turns blind data into actionable intelligence. SOC analysts no longer have to guess which exposures matter — Cyera shows, explains, and prioritizes them.

With Cyera pinpointing every exposure across the data landscape, the next step is turning knowledge into action. That’s where Torq HyperSOC™ takes over — closing the loop between detection and response at machine speed.

How Torq Turns Data Detection Into Instant Action

Once Cyera flags a data exposure, Torq HyperSOC™ springs into action — automatically ingesting the alert, enriching it with context, and launching an autonomous response. The alert is passed to Socrates, Torq’s AI SOC Analyst, which correlates the finding across systems to understand its scope and impact and then autonomously initiates the right response.

In the AMP’d demo, Cyera detected a Microsoft 365 file publicly shared outside the organization containing patient insurance records and personal identifiers. Within seconds, the two platforms worked together to remediate the risk from start to finish.

 Torq + Cyera Integration
Within seconds, Torq executes the remediation runbook — restricting access, collecting audit evidence, notifying stakeholders, and closing the loop autonomously.

Here’s how it unfolded:

  1. Containment: Socrates immediately revoked public access to the OneDrive file, removing all anonymous sharing links.
  2. Evidence collection: Torq automatically pulled audit logs from Microsoft 365, confirming when permissions changed and whether the file had been accessed.
  3. User verification: Torq’s AI agent messaged the employee directly in Slack to confirm intent:
    1. “Hey, the sharing link for sensitive files from your OneDrive was set to Public Access, which violates policy. Did you mean to share this?” 
    2. “No, that was a mistake,” replied the user.
  4. Manager notification: Socrates notified the user’s manager and documented the entire exchange in the case record.
  5. Awareness and closure: The employee was automatically assigned a short data security awareness course. With no evidence of external access, the case was closed.

The entire process — from Cyera’s detection to Torq’s full remediation — took less than five minutes. Every action happens in real time, without waiting for a human to step in. SOC teams maintain oversight, but Torq handles the heavy lifting, creating a continuous feedback loop between Cyera’s detection and Torq’s autonomous response. 

“When Cyera flags a sensitive risk, Torq’s Hyperautomated workflows instantly take the next step — eliminating the gap between detection and response.”

Jeremy Goldsmith, Cyera

The Reflexive SOC: From Reactive to Autonomous

For years, SOCs were reactive, flooded with data but slow to respond. The partnership between Cyera and Torq creates a reflexive SOC — one that doesn’t just see risk, but acts on it instantly.

“When you combine Cyera’s data intelligence with Torq’s orchestration, you get a new level of granularity and precision in how data risks are detected and resolved.”

Ash Hunt, Cyera

Together, Cyera and Torq are transforming security operations into a closed, intelligent system where data protection becomes continuous, adaptive, and autonomous.

Better Together: Torq + Cyera

Every enterprise has unique SOC tools, data landscapes, and compliance demands. Torq and Cyera meet SOC teams where they are — integrating seamlessly via APIs to unify detection, investigation, and response across the entire data lifecycle.

For security teams, this partnership means:

  • Real-time data exposure detection and containment
  • End-to-end visibility and auditability across data flows
  • Autonomous workflows that eliminate manual triage
  • Faster MTTR and measurable customer value

Watch this workflow unfold in real time in Torq + Cyera’s AMP’d Session, where Britt, Bob, Ash, and Jeremy walk through how Torq HyperSOC™ autonomously remediates Cyera-detected data exposures.

Join Torq at DataSecAI 2025 to explore the future of autonomous data and AI security.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Inside the Zero Trust SOC: How Zscaler and Torq Automate Defense

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series.

Today’s SOCs face never-ending alerts, hybrid environments, and fast-moving threats that exploit even momentary blind spots. Zscaler has long led the charge on Zero Trust, enforcing least privilege, secure access, and inspection across every user and workload. But even with strong prevention, threats inevitably slip through, hidden in user traffic, cloud workloads, or endpoint activity.

That’s where detection and response become critical — and where traditional SOC tools fall short. Manual triage, delayed investigation, and fragmented tooling leave SOCs reactive and overworked.

The solution is an autonomous, Zero Trust SOC — powered by real-time detection from Zscaler and automated, context-aware remediation from Torq HyperSOC™. Together, they create a closed feedback loop in which detection and response happen at machine speed without sacrificing human oversight or control.

“What excites me is the opportunity for security outcomes that one tool can’t do alone.”

 – Jeff Spencer, Senior Sales Engineer, Zscaler

Inside the Torq + Zscaler Integration

This integration brings together two pillars of modern security operations:

  • Zscaler’s Zero Trust Exchange provides continuous inspection, policy enforcement, and high-fidelity detections across every user, device, and application.
  • Torq HyperSOC™, which applies AI-driven automation, agentic AI, and case management to orchestrate instant, context-aware incident response.

Together, they form the foundation of a Zero Trust SOC — a system where every alert is verified, every workflow is automated, and every response is precise.

Step 1: Zscaler Deception: Proactive Zero Trust Detection

Zscaler’s Zero Trust Exchange is the industry standard for secure access — continuously verifying users, devices, and applications. With Zscaler Deception, that protection extends beyond prevention into active defense.

Zscaler deploys SaaS-based decoys across endpoints, networks, and applications, convincing high-value assets designed to lure attackers and expose lateral movement early in the kill chain. When a decoy is touched, accessed, or queried, Zscaler instantly flags it as a true positive event because legitimate users never interact with decoys.

These decoys reveal “patient zero” moments — detecting staged or dormant threats before execution — and provide defenders with the earliest possible warning to act.

Zscaler Deception reveals lateral movement through decoys — identifying real attacker behavior before impact.

Step 2: Torq HyperSOC: Autonomous Correlation and Response

Once Zscaler Deception raises an alert, Torq HyperSOC™ automatically springs into action. Torq’s AI SOC Analyst, Socrates, instantly correlates Zscaler telemetry with data from SIEM, EDR, IAM, and cloud systems to understand the full scope of the incident. From there, Socrates executes an agentic runbook — autonomously investigating, validating, and containing the threat.

The workflow looks like this:

  1. Case Creation: Torq auto-generates a case populated with all Zscaler observables, file hashes, and context.
  2. User Verification: Torq contacts the endpoint owner via Slack or Teams to confirm activity. If verified, a multi-factor authentication (MFA) check in Okta confirms legitimacy.
  3. AI Reasoning: If suspicious, Socrates escalates and begins machine-speed containment, isolating the device, blocking the user, and updating Zscaler policies.
  4. Remediation: Torq coordinates across EDR and IAM to revoke sessions, rotate credentials, and update blocklists.
  5. Documentation: The entire process — from detection to containment — is logged automatically and complete with AI-generated summaries for compliance and audit.

Together, Zscaler and Torq create a closed feedback loop between detection and response in which:

  • Zscaler traps attackers with decoys and identifies threats with surgical precision.
  • Torq responds instantly, isolating endpoints, blocking IPs, and disabling compromised accounts before attackers can pivot.

This integration extends Zscaler’s zero-trust principles into the SOC itself, ensuring continuous verification and the least privilege at access throughout the entire response lifecycle.

Zscaler and Torq
Torq HyperSOC™ transforms the Zscaler alert into an automated, AI-driven case — isolating the endpoint instantly.

The Zero Trust SOC Advantage

Zscaler + Torq deliver a SOC experience that’s both faster and smarter, with:

  • Near 100% detection fidelity from Zscaler Deception
  • Sub-minute containment triggered by Torq HyperSOC™
  • Full auditability with automatic case creation, evidence tracking, and AI summaries
  • Built-in human oversight, so analysts validate and learn from autonomous decisions

For SOCs, that means fewer false positives, faster containment, and measurable improvement. Zscaler and Torq close the loop between visibility and action, transforming zero-rust detection into instant containment.

Torq AMP Sessions Ad

Better Together: Torq + Zscaler

Every enterprise has a unique security stack: a mix of legacy systems, modern SaaS tools, and homegrown integrations. Zscaler and Torq meet customers where they are. The integration is API-first, customizable, and built to respect each organization’s ecosystem, delivering precise outcomes without forcing architectural changes.

The Zscaler + Torq partnership represents a new model for modern SOCs — one where AI agents and automation reinforce zero-rust principles across detection, investigation, and response.

See how Torq and Zscaler provide a foundation for the Zero Trust SOC. Watch AMP’d Sessions Episode 3 to see Torq + Zscaler in action.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

The Shift in SOC Escalation: From Manual to AI-Powered 

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Torq Field CISO Patrick "PO" Orzechowski, SOC leader and expert

Patrick Orzechowski (also known as “PO”) is Torq’s former Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world.

Every SOC has an escalation process — but not every SOC has one that is truly effective.

Most still run on an outdated, human-only escalation matrix built for simpler times. A world where analysts could manually sift through a few hundred alerts a day and escalate what “felt” risky. 

Now, we’re dealing with tens of thousands of alerts daily, hybrid environments, and adversaries who use AI to move faster than humanly possible. The escalation matrix, once designed to bring order, now struggles under the weight of automation gaps, alert overload, and static processes.

With Torq HyperSOC™, threat escalation moves beyond manual handoffs and playbooks. Teams gain dynamic, automated escalation workflows that adapt in real time, reduce response times, and ensure the right people act the moment an incident occurs.

What Is an Escalation Matrix and Why It Matters

An escalation matrix is a structured framework that defines how incidents, alerts, or service disruptions are escalated to higher authority levels when they aren’t resolved within specific timeframes or exceed impact thresholds.

In traditional SOCs, escalation follows a severity-based model: Critical, High, Medium, Low, and Informational. But modern SOCs are replacing this with context-driven escalation, where business risk, asset criticality, and data sensitivity guide prioritization.

An automated threat escalation matrix enables:

  • Faster and more accurate incident routing
  • Clear accountability across escalation levels
  • Consistent communication and response times across teams outside the SOC
  • Reduced noise, false positives, and human fatigue

For security teams, the automated threat escalation matrix dynamically adjusts based on contextual signals — asset importance, user behavior, and ongoing attack patterns.

Manual SOC Threat Escalation: The Old Model

Here’s how escalation still looks in many SOCs:

  1. Tier-1 analysts triage thousands of alerts by hand.
  2. Anything that looks “real” gets escalated to Tier 2 for deeper analysis.
  3. Confirmed incidents go to Tier 3 or the incident response team.

Sounds structured, right? In reality, it’s chaos disguised as process. Alerts bounce from person to person, critical signals get buried under false positives, and by the time something reaches Tier 3, the attacker’s already moved on.

I’ve seen SOCs where 70% of an analyst’s day is spent reclassifying alerts that should’ve been auto-dismissed. It’s not an efficiency problem — it’s a design problem. A lot of vendors do not allow for fundamental reclassification of alert severities.

AI-Powered Threat Escalation for SOCs

Torq HyperSOC brings the Autonomous Threat Escalation Matrix to life — an AI-powered framework that redefines how alerts flow, how context is applied, and how response happens. Instead of human triage being the first filter, AI takes that role — automatically scoring, enriching, and routing alerts based on real business impact.

How it works:

  • AI filters out 99% of alert noise and enriches the remaining 1% with full context and risk scores.
  • Analysts only see cases — not alerts — prioritized by business impact.
  • Human analysts validate AI-generated insights and approve or refine the automated responses (e.g., isolate a host, revoke credentials).

A few examples:

  • A malware alert on a retired test server is logged and archived automatically.
  • A suspicious login to the CFO’s laptop from two countries apart is escalated immediately with risk context attached.
  • A confirmed beacon from a domain controller is triggered with AI for containment before humans even wake up.

How the Autonomous Threat Escalation Matrix Works

Think of the Autonomous Threat Escalation Matrix as an intelligent, risk-based hierarchy — not built on severity labels, but on context. Each alert is scored dynamically using signals like:

  • Asset criticality: Is this production or a test?
  • User behavior: Does this deviate from baseline patterns?
  • Threat intelligence: Is this IOC part of an active campaign?
  • Historical context: Has this alert been a false positive before?

The result is a living, automated escalation matrix that determines: what gets handled automatically, what needs a quick human validation, and what demands immediate escalation. 

The Autonomous Threat Escalation Matrix operates on a dynamic, context-driven hierarchy that replaces rigid severity scoring with real business risk. Instead of static labels like Critical or Low, each alert is automatically analyzed and scored based on asset importance, user behavior, threat intelligence, and historical reliability. Routine telemetry and low-impact alerts are logged and enriched for trend analysis without human intervention. 

Moderate-risk activity — such as suspicious logins or unusual SaaS behavior — triggers automated containment and creates a case for analyst validation. High- and critical-risk incidents, like privileged account compromise or ransomware in production, prompt immediate containment actions and human escalation to senior SOC leadership. This flexible design allows organizations to calibrate AI autonomy to their risk tolerance — fully automated, human-in-the-loop, or hybrid.

This model gives organizations flexibility — tune AI autonomy up or down depending on your risk appetite. Some CISOs want near-total automation; others prefer AI assistance with human checkpoints. Torq HyperSOC™ supports both.

From Framework to Action

In the old SOC model, escalation was linear — an alert passed from Tier 1 to Tier 2 to Tier 3, bleeding time and risking loss of context at every handoff. In the new world, escalation is dynamic — AI does 80% of the heavy lifting, humans focus on the 20% that actually matters. 

Here’s what that looks like in a phishing or malicious payload workflow: 

Scenario: A user reports a suspicious email with an attachment.

Automated Workflow:

  1. The email is flagged via user report or spam detection.
  2. A phishing classifier analyzes the message structure, links, and language patterns.
  3. Torq runs a user impact analysis, checking who received and clicked the email.
  4. If the message is determined risky, the system performs auto-quarantine across all affected mailboxes.
  5. If a VIP or finance team user is impacted, the case is escalated automatically to the incident response team for immediate validation.

Behind the scenes, AI agents handle the enrichment and scoring, while human analysts step in only when risk or ambiguity demands it.

The impact is tangible:

It’s not about replacing analysts. It’s about giving them time to think, hunt, and innovate — not just click “escalate.”

Why Risk Beats Severity Every Time

Severity-based models like CVSS are still essential, but they tell only part of the story. Two alerts might share a Critical score — yet a compromised test VM and a compromised production database have vastly different business impacts.

AI-powered escalation models fix that by injecting real-world context into every decision. They understand that Critical doesn’t always mean “important” — and that Medium sometimes means “urgent.”

That shift — from static severity to dynamic risk — is what separates modern SOCs from legacy ones. 

It’s time to rethink SOC triage. See how the Autonomous Threat Escalation Matrix works.

FAQs

How does a threat escalation matrix work?

A threat escalation matrix is a structured, hierarchical framework that defines how security threats progress through different response levels based on their severity, impact, and urgency. It outlines clear roles, responsibilities, communication channels, and response timelines to handle every threat with the right priority and accountability.

In practice, a Level 1 threat might be handled by a SOC analyst for initial triage and validation. If the incident shows indicators of compromise or potential data exposure, it escalates to Level 2, where specialized security engineers or threat hunters perform deeper analysis. Level 3 may involve executive or crisis-level coordination when the threat poses a critical risk to operations or compliance.

With Torq Hyperautomation™, organizations can automate their threat escalation matrix, linking detection, triage, and response workflows across platforms like SIEMs, PagerDuty, Slack, and Jira. This ensures that threat alerts escalate automatically, eliminating manual bottlenecks and guaranteeing that the right team addresses every security incident at the right time, with complete visibility and auditability.

What are the levels of escalation?

Torq’s threat escalation matrix includes four levels of escalation, each representing a different response tier. Level 1 handles initial detection and triage by analysts, Level 2 escalates to security engineers for deeper investigation, Level 3 involves management or cross-functional coordination, and Level 4 activates executive or crisis response. Automating these escalation levels through Torq ensures that incidents move seamlessly through the hierarchy with full traceability and faster resolution.

Why is an escalation matrix important in security operations?

An escalation matrix is critical in security operations because it prevents delays, confusion, and missed alerts during high-pressure incidents. It defines exactly who acts, when, and how communication flows during an active security threat or incident escalation. By automating the matrix through Torq’s Hyperautomation platform, SOC teams can enforce consistent, real-time escalation workflows that reduce mean time to respond (MTTR) and strengthen their overall security posture.

What is the difference between functional and hierarchical escalation?

In a threat escalation matrix, functional escalation occurs when a threat is passed to someone with the required technical expertise — for example, escalating a network anomaly to a forensics specialist. On the other hand, hierarchical escalation moves the incident up the management chain when additional authority or resources are required. Torq Hyperautomation™ supports both models by automatically routing incidents to specialists or leadership based on the escalation criteria defined in your workflow.

How can automation improve the threat escalation process?

Automation enhances the threat escalation by removing manual handoffs and ensuring rapid, reliable response coordination. Using Torq, organizations can automatically trigger escalations when predefined conditions are met, such as time thresholds, severity scores, or detection from integrated tools like PagerDuty or CrowdStrike. This ensures the threat escalation matrix remains consistent, measurable, and scalable — even in complex enterprise environments — while giving SOCs complete visibility into every step of the response chain.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Build Smarter Security Operations Workflows with AI-Driven Automation

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Every second counts in today’s cybersecurity landscape. Threats move fast, attack surfaces evolve daily, and manual processes aren’t cutting it. That’s why modern Security Operations Centers (SOCs) are rethinking how they operate — and turning to security operations workflows that automate the detection, triage, and response process from start to finish.

A security operations workflow is an essential part to an effective SOC. It defines how incidents are detected, analyzed, escalated, contained, and reported. Done right, these workflows cut response times, strengthen security posture, and reduce analyst fatigue. Done manually, they slow everything down.

With Hyperautomation and Torq’s AI-powered security workflow builder, teams are empowered to build intelligent, adaptive workflows that evolve as quickly as the threats they defend against.

The Importance of Hyperautomation in Security Operations

As threats become more complex — spanning endpoints, identities, and cloud workloads — automation must evolve, too. Hyperautomation takes security orchestration to the next level. It integrates AI reasoning, no-code automation, and agentic decision-making to help SOC teams move at machine speed. Instead of managing dozens of tools and playbooks, analysts can let automation handle repetitive triage and enrichment while they focus on investigation and strategy.

Modern SOCs are adopting Hyperautomation because:

Components of a Security Operations Workflow

Building an effective security workflow requires a balance of structure, flexibility, and intelligence. Here are the core components every team needs:

  1. Incident detection: Data from SIEM, EDR, CSPM, and other tools flows into the SOC. The goal is to identify genuine threats, not noise.
  2. Analysis and enrichment: AI and automation gather context — who’s affected, what systems are at risk, whether the IP or file hash is known to be malicious — to reduce false positives.
  3. Triage and escalation: Incidents are prioritized based on severity, impact, and business risk. Hyperautomation can even apply risk-based escalation rules automatically.
  4. Response and containment: Automated playbooks isolate hosts, block domains, or reset credentials in seconds — minimizing damage before humans intervene.
  5. Reporting and continuous improvement: Every workflow should automatically document actions, enabling metrics tracking, audit readiness, and ongoing optimization.

Evolving from Templates to AI-Powered Workflows

Historically, teams built automation from scratch or relied on static templates. Templates were a major improvement — they made it easier to deploy pre-built use cases like phishing response or endpoint isolation. But they were limited. Each template still required customization and maintenance.

Torq’s AI Workflow Builder is a true leap forward for security workflow builders. Using natural language, you simply describe what you want to automate, and the system creates a complete workflow in seconds.

Powered by 4,000+ actions and 300+ native integrations, Torq’s AI Workflow Builder understands your intent and connects your security stack instantly — from vulnerability management and SIEM to identity, ticketing, and chat platforms. It understands the context of your SOC, automatically aligning logic, tools, and policies.

That means your workflows operate within the greater context of your security operations platform — pulling in threat intelligence, correlating events, enriching alerts, and even routing cases to the right analyst or team.

And because Torq’s AI is agentic, it doesn’t just follow static instructions. It builds reasoning through workflows — suggesting optimizations, identifying missing steps, and aligning automations with your organization’s security posture. It learns how your team works, then helps them work smarter.

With Torq’s AI Workflow Builder, simply:

  • Describe it: Tell Torq what you need in plain English.
  • Get it: AI builds your workflow in seconds.
  • Refine it: Review, adjust, and run.

The result: 

  • Complex workflows that once took hours to design now take minutes.
  • Junior analysts can automate advanced use cases without coding.
  • Security teams can scale automation consistently across departments.

Best Practices for Designing Effective AI Security Operation Workflows in Torq

Here’s how to design AI security workflows in Torq that scale with your organization and strengthen your overall security posture.

1. Start with What You Want to Accomplish

In Torq, building starts with plain English, not code. Just describe your goal — for example: “When a phishing email is reported in Outlook, analyze it with VirusTotal, remove it from all inboxes, and notify the user in Slack.”

The AI Workflow Builder instantly generates a working automation that connects all relevant tools. You don’t have to map APIs, configure triggers, or guess which actions to use — Torq’s AI does that for you. Within seconds, you’re previewing a workflow that would’ve taken hours to build in a legacy SOAR platform.

2. Customize with Ease

Once Torq builds your workflow, it’s easy to tweak it. Every step is editable in an intuitive drag-and-drop canvas. Want to add another integration? Just type or search for it — Torq automatically configures it. Need to adjust conditions, risk levels, or timeouts? You can do it directly from the workflow builder without touching a line of code.

Because Torq integrates with 4,000+ out-of-the-box actions and 300+ tools, every new system you connect — from Wiz and Okta to CrowdStrike, Jira, and Slack — becomes part of a living automation ecosystem. You can reuse steps, clone workflows, and scale them globally with a few clicks.

3. Use AI to Design Smarter, Not Harder

Torq’s agentic AI  thinks through workflows with you. As you describe what you want, it:

  • Suggests missing logic or best-practice security steps
  • Auto-selects the right tools based on your integrations
  • Maps data across systems automatically (no more manual field matching)
  • Writes descriptions, case summaries, and contextual notifications for you

This means junior analysts can create advanced SOC workflows that follow expert logic — safely, consistently, and with built-in guardrails.

4. Keep Collaboration Seamless

Workflows in Torq are naturally collaborative. You can embed ChatOps steps directly into automations — sending alerts to the right Slack or Teams channels, tagging relevant users, or requiring quick approvals before executing sensitive actions.

These built-in collaboration loops ensure that even highly automated SOCs maintain human oversight for key decisions like access control, multi-factor authentication resets, or encryption changes.

5. Build Once, Reuse Everywhere

One of the biggest advantages of Torq is reusability. Every workflow can be turned into a reusable “building block” for other automations. For example, if you’ve already built a malicious IP detection flow, you can drop that same step into new phishing or cloud exposure workflows instantly.

Torq also supports environment-level organization — letting global teams (SOC, IT, or DevSecOps) share templates, enforce naming standards, and manage compliance documentation.

6. Measure, Iterate, and Scale

Torq’s built-in analytics and reporting make it easy to see what’s working — tracking metrics like MTTR, alert reduction, and automation success rate. You can clone successful workflows, experiment safely, and continuously improve without slowing down operations.

Hyperautomation isn’t just about speed; it’s about evolution. Torq’s AI learns from your actions and continuously helps refine workflows for efficiency and precision, improving your security posture over time.

AI Builder in Action: Instant IP Threat Detection

Let’s see it in action. Suppose your SOC wants to check whether an IP address is malicious using VirusTotal — and automatically create a case if flagged.

Just type this prompt into the AI Workflow Builder:

Check IP address 8.8.8.8 with VirusTotal. If it’s flagged as malicious more than three times:

  • Create a Torq case with High severity. 
  • Send a Slack alert to #alerts.
AI Builder in Action: Instant IP Threat Detection
Torq’s AI Workflow Builder turns a plain-English IP check request into a ready-to-run security workflow.

Seconds later, Torq’s AI Workflow Builder generates a fully functioning workflow ready for review. You can tweak anything — from setting custom thresholds to fine-tuning case details and personalizing Slack alerts. 

Build the SOC of Tomorrow with Torq’s AI Workflow Builder

The SOC of the future won’t be defined by how many alerts it handles — but by how intelligently it evolves. With AI-powered security operations workflows, teams can finally break free from manual triage, fragmented tools, and burnout.

Torq’s AI Workflow Builder transforms everyday response into continuous innovation — connecting people, processes, and platforms through Hyperautomation that learns and adapts at machine speed.

Start building the SOC of tomorrow — today. The Google Cloud + Torq playbook shows you how to spot SOC bottlenecks early, automate what drags you down, and rebuild for long-term resilience.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO