• Use Cases
    • Threat Hunting

      Threat Hunting

      Automate threat hunting for EDR, XDR, and SIEM with workflows.

    • Cloud Posture Management

      Cloud Security Posture Management

      Automate continuous CSPM and response workflows.

    • Security Alerts Remediation

      Security Alert Remediation

      Automatically remediate security alerts (Cloud/SaaS/On-Prem).

    • Email Phishing

      Email Phishing Response

      Automate email phishing incident response.

    • Suspicious User Activity Response

      Suspicious User Activity Response

      Automatically investigate and respond to suspicious behavior.

    • Application Security

      Application Security

      Streamline application security across the entire development lifecycle.

    • Security Bots Automation

      Security Bots Automation

      Turn automated workflows into interactive security bots.

    • Identity Lifecycle Management

      Identity Lifecycle Management

      Automatically update device, network and other access policies.

    • Secure Access to Sensitive Data

      Secure Access to Sensitive Data

      Automate secure and controlled access to sensitive data.

    See all use cases
  • Company
    • Events & Webinars

      Events & Webinars

      Details on all the conferences and virtual events that Torq attends.

    • Partners

      Our partners make Torq stronger for security teams.

    • Careers

      Careers

      Our teams in the United States and Israel are growing fast.

    • Torq

      Our Story

      The "why" behind Torq's lightweight automation solution.

    Events & Webinars

    Swing by our (virtual or IRL) booth and get to know the Torq Team and our uncomplicated approach to powerful security automation.

    Torq Events
  • Resources
    • Blog

      Blog

      Read security automation thought leadership and how to's.

    • Documentation

      Documentation

      Get access to all Torq product documentation.

    • Downloads

      Downloads

      Get eBooks, white papers, and more.

    • Torq

      Get Started

      Get started with a trial or demo of Torq.

    The Ultimate Guide to Cloud Security Automation

    Keeping cloud environments secure is an ever-evolving challenge for security practitioners. Get practical tips for effective cloud security automation in this eBook.

    The Ultimate Guide to Cloud Security Automation
Login Get Started
  • Use Cases
    • Threat Hunting

      Threat Hunting

      Automate threat hunting for EDR, XDR, and SIEM with workflows.

    • Cloud Posture Management

      Cloud Security Posture Management

      Automate continuous CSPM and response workflows.

    • Security Alerts Remediation

      Security Alert Remediation

      Automatically remediate security alerts (Cloud/SaaS/On-Prem).

    • Email Phishing

      Email Phishing Response

      Automate email phishing incident response.

    • Suspicious User Activity Response

      Suspicious User Activity Response

      Automatically investigate and respond to suspicious behavior.

    • Application Security

      Application Security

      Streamline application security across the entire development lifecycle.

    • Security Bots Automation

      Security Bots Automation

      Turn automated workflows into interactive security bots.

    • Identity Lifecycle Management

      Identity Lifecycle Management

      Automatically update device, network and other access policies.

    • Secure Access to Sensitive Data

      Secure Access to Sensitive Data

      Automate secure and controlled access to sensitive data.

    See all use cases
  • Company
    • Events & Webinars

      Events & Webinars

      Details on all the conferences and virtual events that Torq attends.

    • Partners

      Our partners make Torq stronger for security teams.

    • Careers

      Careers

      Our teams in the United States and Israel are growing fast.

    • Torq

      Our Story

      The "why" behind Torq's lightweight automation solution.

    Events & Webinars

    Swing by our (virtual or IRL) booth and get to know the Torq Team and our uncomplicated approach to powerful security automation.

    Torq Events
  • Resources
    • Blog

      Blog

      Read security automation thought leadership and how to's.

    • Documentation

      Documentation

      Get access to all Torq product documentation.

    • Downloads

      Downloads

      Get eBooks, white papers, and more.

    • Torq

      Get Started

      Get started with a trial or demo of Torq.

    The Ultimate Guide to Cloud Security Automation

    Keeping cloud environments secure is an ever-evolving challenge for security practitioners. Get practical tips for effective cloud security automation in this eBook.

    The Ultimate Guide to Cloud Security Automation
Get Started Login

How-to's

How to Encrypt S3 Buckets Automatically with Torq

Read More

Perspectives & POVs

What Is CSPM? A Closer Look at Cloud Security Posture Management

Read More

Perspectives & POVs

SOARs vs. No-Code Security Automation: The Case for Both

Read More

How-to's

Automated Just-In-Time Permissions Using JumpCloud+Torq

Read More

FILTER BY:

All Categories Engineering How-to's Life at Torq Perspectives & POVs Tips & Tricks Torq Product Use Cases

Life at Torq

Team Spotlight: Ori Seri

Life at Torq

Team Spotlight: Hagai Shapira

Life at Torq

Team Spotlight: Kostya Ostrovsky

1 2

Stay Connected

By submitting this form, you accept the terms in our privacy policy.

  • Company
    • Blog
    • Events
    • Security and Compliance
    • Careers
    • Contact Us
    • Log in
    • Partners
  • Use Cases
    • Threat Hunting
    • Cloud Security Posture Management
    • Security Alert Remediation
    • Email Phishing Response
    • Suspicious User Activity Response
    • Application Security
    • Security Bots
    • Identity Lifecycle Management
    • Secure Access to Sensitive Data
    • Threat Intelligence
Privacy Policy

Copyright 2022, Torq. All Rights Reserved.