• Use Cases
    • Threat Hunting

      Threat Hunting

      Automate threat hunting for EDR, XDR, and SIEM with workflows.

    • Cloud Posture Management

      Cloud Security Posture Management

      Automate continuous CSPM and response workflows.

    • Security Alerts Remediation

      Security Alert Remediation

      Automatically remediate security alerts (Cloud/SaaS/On-Prem).

    • Email Phishing

      Email Phishing Response

      Automate email phishing incident response.

    • Suspicious User Activity Response

      Suspicious User Activity Response

      Automatically investigate and respond to suspicious behavior.

    • Application Security

      Application Security

      Streamline application security across the entire development lifecycle.

    • Security Bots Automation

      Security Bots Automation

      Turn automated workflows into interactive security bots.

    • Identity Lifecycle Management

      Identity Lifecycle Management

      Automatically update device, network and other access policies.

    • Secure Access to Sensitive Data

      Secure Access to Sensitive Data

      Automate secure and controlled access to sensitive data.

    See all use cases
  • Company
    • Events & Webinars

      Events & Webinars

      Details on all the conferences and virtual events that Torq attends.

    • Partners

      Our partners make Torq stronger for security teams.

    • Careers

      Careers

      Our teams in the United States and Israel are growing fast.

    • Torq

      Our Story

      The "why" behind Torq's lightweight automation solution.

    Events & Webinars

    Swing by our (virtual or IRL) booth and get to know the Torq Team and our uncomplicated approach to powerful security automation.

    Torq Events
  • Resources
    • Blog

      Blog

      Read security automation thought leadership and how to's.

    • Documentation

      Documentation

      Get access to all Torq product documentation.

    • Downloads

      Downloads

      Get eBooks, white papers, and more.

    • Torq

      Get Started

      Get started with a trial or demo of Torq.

    The Ultimate Guide to Cloud Security Automation

    Keeping cloud environments secure is an ever-evolving challenge for security practitioners. Get practical tips for effective cloud security automation in this eBook.

    The Ultimate Guide to Cloud Security Automation
Login Get Started
  • Use Cases
    • Threat Hunting

      Threat Hunting

      Automate threat hunting for EDR, XDR, and SIEM with workflows.

    • Cloud Posture Management

      Cloud Security Posture Management

      Automate continuous CSPM and response workflows.

    • Security Alerts Remediation

      Security Alert Remediation

      Automatically remediate security alerts (Cloud/SaaS/On-Prem).

    • Email Phishing

      Email Phishing Response

      Automate email phishing incident response.

    • Suspicious User Activity Response

      Suspicious User Activity Response

      Automatically investigate and respond to suspicious behavior.

    • Application Security

      Application Security

      Streamline application security across the entire development lifecycle.

    • Security Bots Automation

      Security Bots Automation

      Turn automated workflows into interactive security bots.

    • Identity Lifecycle Management

      Identity Lifecycle Management

      Automatically update device, network and other access policies.

    • Secure Access to Sensitive Data

      Secure Access to Sensitive Data

      Automate secure and controlled access to sensitive data.

    See all use cases
  • Company
    • Events & Webinars

      Events & Webinars

      Details on all the conferences and virtual events that Torq attends.

    • Partners

      Our partners make Torq stronger for security teams.

    • Careers

      Careers

      Our teams in the United States and Israel are growing fast.

    • Torq

      Our Story

      The "why" behind Torq's lightweight automation solution.

    Events & Webinars

    Swing by our (virtual or IRL) booth and get to know the Torq Team and our uncomplicated approach to powerful security automation.

    Torq Events
  • Resources
    • Blog

      Blog

      Read security automation thought leadership and how to's.

    • Documentation

      Documentation

      Get access to all Torq product documentation.

    • Downloads

      Downloads

      Get eBooks, white papers, and more.

    • Torq

      Get Started

      Get started with a trial or demo of Torq.

    The Ultimate Guide to Cloud Security Automation

    Keeping cloud environments secure is an ever-evolving challenge for security practitioners. Get practical tips for effective cloud security automation in this eBook.

    The Ultimate Guide to Cloud Security Automation
Get Started Login

How-to's

How to Encrypt S3 Buckets Automatically with Torq

Read More

Perspectives & POVs

What Is CSPM? A Closer Look at Cloud Security Posture Management

Read More

Perspectives & POVs

SOARs vs. No-Code Security Automation: The Case for Both

Read More

How-to's

Automated Just-In-Time Permissions Using JumpCloud+Torq

Read More

FILTER BY:

All Categories Engineering How-to's Life at Torq Perspectives & POVs Tips & Tricks Torq Product Use Cases

How-to's

Automatically Update URL Blocklists in Zscaler Using Torq

How-to's

How to Automatically Suspend Inactive Accounts Using Torq

Life at Torq

Team Spotlight: Christopher Coccagna

Torq Product

Torq Product Updates for June 2022: Transformation is the Key

Torq Product

Automated Developer-First Security: Our Partnership with Snyk

Perspectives & POVs

4 Database Access-Control Methods to Automate

1 2 3 … 10

Stay Connected

By submitting this form, you accept the terms in our privacy policy.

  • Company
    • Blog
    • Events
    • Security and Compliance
    • Careers
    • Contact Us
    • Log in
    • Partners
  • Use Cases
    • Threat Hunting
    • Cloud Security Posture Management
    • Security Alert Remediation
    • Email Phishing Response
    • Suspicious User Activity Response
    • Application Security
    • Security Bots
    • Identity Lifecycle Management
    • Secure Access to Sensitive Data
    • Threat Intelligence
Privacy Policy

Copyright 2022, Torq. All Rights Reserved.

We use cookies to improve the functionality of this website and your experience on it. These cookies, and any data collected is used in accordance with our privacy policy. Accept CookiesRefuse CookiesPrivacy Policy