Integrate Anything.
Automate Everything.
Integrate, Instantly.
You Build It
Elevate non-technical users with developer like powers with no-code tools while providing full-code support for power users.
We Build It
Create integrations in record time by partnering with Torq’s experienced customer success team.
Always Up-To-Date Integrations
Stay connected even if your third-party API or data format changes with real-time API monitoring and updates for uninterrupted automation.
Top Categories
Abnormal Security
Orchestrate and automate response to email security events, analyzing emails and their attachments and automatically performing remediation actions.
Adaptive Shield
Automatically drive SaaS Security findings and alerts to resolution, while accessing security checks, audit logs and user data.
AlientVault OTX
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions.
Anomali ThreatStream
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions. Manage sandbox analysis pipeline for suspicious files.
Anvilogic
Integrating Torq and Anvilogic gives security operations teams a new way to detect threats across data platforms like Splunk, Snowflake, and Azure Sentinel- and then quickly handle those detections with interactive remediation workflows.
Apiiro
Orchestrate resolution of Software Supply Chain findings and alerts in fully automated or human-in-the-loop fashion.
Aqua
Manage CSPM alerts, scans, cloud accounts, audit logs, and tests.
Armis
Turn asset management and attack surface findings into actionable remediation while enriching with context on users and devices.
Asana
Execute automated workflows for Project Management tasks and update results / enrich information in the project plan.
Atlassian Jira
Attach automation workflows to activities in Jira / ServiceDesk tickets, enriching the tickets with information and driving to resolution.
Atlassian
Orchestrate and automate incident response workflows by leveraging paging and user interaction, driving incidents to resolution.
Atmosec
Automatically drive SaaS Security findings and alerts to resolution, while accessing security checks, audit logs and user data.
AWS
Automate just-in-time access, resolve security issues performing enrichment / containment / remediation actions on your infrastructure.
AWS Security Lake
Query and update information stored in the data lake for Detection Engineering, Threat Hunting and other security processes.
Axonius
Turn asset management and attack surface findings into actionable remediation while enriching with context on users and devices.
BambooHR
Orchestrate employee lifecycle based on HRIS events, automate employee and contractor on-boarding and off-boarding.
BigID
Orchestrate and automate Data Security, Privacy, Compliance and Governance operations with automated workflows performing fully automated or human-in-the-loop enforcement and remediation.
Box
Orchestrate and automate documents sharing lifecycle, introduce human-in-the-loop approvals for external sharing and automatically review document access activity.
Britive
Automate Zero Trust workflows for Privileged Access to your cloud infrastructure.
Check Point
Automate Network Security policy management lifecycle, as well as remediation of Network / Cloud Security findings.
Cisco
Automate SASE operations, including block/allow-lists management, just-in-time access and service provisioning.
CloudFlare
Automate SASE operations, including block/allow-lists management, just-in-time access and service provisioning.
Coralogix
Query historical logs, enriching security signals with important context information.
CrowdStrike
Orchestrate EDR / XDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Cybereason
Orchestrate EDR / XDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Cybersixgill
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions. Orchestrate lifecycle of actionable threat information.
CyCognito
Automate external attack surface management findings, driving them to resolution while enriching with asset context.
Datadog
Orchestrate resolution of security and observability alerts, enriching each event with dynamically queried historical data. Automate detection engineering and Threat Hunting processes.
Devo
Orchestrate SIEM / UEBA operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Discord
Create interactive chatbots, democratizing security events lifecycle with human-in-the-loop capabilities and provide delightful self-service experiences to information employees.
DomainTools
Enrich security events with up-to-date information, submit specific domains for review and more.
Drata
Automate lifecycle of evidence collection for compliance controls, ensuring consistent and accurate assets for the audit cycle.
DropBox
Orchestrate and automate documents sharing lifecycle, introduce human-in-the-loop approvals for external sharing and automatically review document access activity.
Elastic Security
Automate Threat Detection, Investigation and Response following actionable alerts on Elastic data and leveraging flexible data retrieval capabilities. Automate detection engineering and Threat Hunting processes.
Eureka
This integration will trigger Torq workflows following a monitor triggered by Eureka Security, leading to a more efficient, automated, and comprehensive security posture for organizations.
Flashpoint
Combine data, insights, and automation to identify risks and stop threats.
Fortinet
Automate Network Security policy management lifecycle, as well as remediation of Network / Cloud Security findings.
Gem
Together, Gem and Torq give customers the tools they need to better automate cloud detection and response, enabling seamless workflows to stop threats faster.
Google Chat
Create interactive chatbots, democratizing security events lifecycle with human-in-the-loop capabilities and provide delightful self-service experiences to information employees.
Google Cloud
Generate a token to authenticate Google apps and to run Gcloud CLI commands.
Google Workspace Mail (Gmail)
Orchestrate email security lifecycle, analyzing emails and attachments, as well as introducing quarantine and other remediation measures.
GreyNoise
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions.
Grip
Leverage Torq building blocks to easily offboard SaaS users, triggering Grip workflows to revoke access to targeted SaaS, users, or both.
HashiCorp
Strengthen your automated workflows with short-lived or just-in-time-accessed entitlements and credentials managed by HashiCorp Vault; automate Terraform lifecycle.
Hibob
Orchestrate employee lifecycle based on HRIS events, automate employee and contractor on-boarding and off-boarding.
Hunters
Orchestrate and automate resolution of SOC alerts, enriching with data from 3rd parties and involving human-in-the-loop decisions.
IBM qRadar
Orchestrate SIEM operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Intezer
Use the Intezer Analyze integration for Torq to analyze files, URLs, get analysis results, result summaries, upload files as party of your automated security workflow.
Ionix
Align remediation tasks with the way that security operations actually work so customers can spend less time on routing tickets manually and further reduce their MTTM (Mean Time To Mitigate) exposure across their attack surface.
Ironscales
Orchestrate email security issues resolution in a fully-automated or human-in-the-loop fashion.
Jamf
Automate device management lifecycle, including user/group policies, device onboarding and offboarding, OS/application upgrades and security events.
Joe Security
When you encounter a suspicious file or URL, Torq leverages Joe Security’s sandboxing capabilities, automatically submitting the file or URL to Joe Sandbox for analysis, streamlining the process and reducing manual intervention.
JumpCloud
Automate user and device management lifecycle, from on-boarding to off-boarding, including compliance, just-in-time and privileged access policies.
JupiterOne
Turn asset management and attack surface findings into actionable remediation while enriching with context on users and devices.
Kandji
Automate device management lifecycle, including user/group policies, device onboarding and offboarding, OS/application upgrades and security events.
Lacework
Automate CNAPP issues remediation lifecycle, in either a fully-automated or human-in-the-loop fashion, involving Security, DevOps and Engineering role-players.
Legit Security
Orchestrate resolution of Software Supply Chain findings and alerts in fully automated or human-in-the-loop fashion.
LimaCharlie
Automate remediation of LimaCharle XDR alerts, enriching with information from 3rd-party systems and drive to resolution.
Logz.io
Use the Logz.io integration for Torq to run a search, utilize observability metrics, as part of automated security workflows.
Microsoft 365
Orchestrate email security lifecycle, access and update data in Word, Excel, PowerPoint documents.
Microsoft Active Directory
Automate managing user and device lifecycle, from on-boarding to off-boarding, implement just-in-time access procedures and orchestrate response to security events.
Microsoft Azure
Automate just-in-time access, resolve security issues performing enrichment / containment / remediation actions on your infrastructure.
Microsoft Azure Cognitive Services
Extend automated workflows with conversational experience and Generative AI for data analytics, decision support and more, enabling AI-driven autonomous security operations.
Microsoft Defender
Orchestrate EDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Microsoft Entra
Automate managing user and device lifecycle, from on-boarding to off-boarding, implement just-in-time access procedures and orchestrate response to security events.
Microsoft Power BI
Retrieve and update information, allowing in-depth analytics on up-to-date rich information about security events.
Microsoft Sentinel
Orchestrate SIEM / XDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Microsoft Teams
Create interactive chatbots, democratizing security events lifecycle with human-in-the-loop capabilities and provide delightful self-service experiences to information employees.
Mimecast
Automate security actions based on email security events detected by Mimecast, leading to a more efficient and responsive security posture.
Mitiga
Automate and orchestrate response to threats across your Cloud and SaaS footprint. Enrich existing TDIR workflows with unique data and insights from Mitiga’s datalake.
monday.com
Execute automated workflows for Project Management tasks and update results / enrich information in the project plan.
NetSkope
Use the Netskope integration for Torq to get client, events, and report data as part of your automated security workflows.
NextDLP
Orchestrate and automate Data Loss Prevention and Insider Risk Management operations by attaching rich workflows to handle security events in fully-automated or human-in-the-loop fashion.
Notion
Automate knowledge management and data security operations, accessing and responding to events, as well as querying and updating information stored in Notion pages and tables.
Okta
Automate managing user and device lifecycle, from on-boarding to off-boarding, implement just-in-time access procedures and orchestrate response to security events.
OneLogin
Automate managing user lifecycle, from on-boarding to off-boarding, implement just-in-time access procedures and orchestrate response to security events.
OpenAI
Extend automated workflows with conversational experience and Generative AI for data analytics, decision support and more, enabling AI-driven autonomous security operations.
Orca Security
Automate and orchestrate response to Cloud Security findings and alerts, enriching the data from multiple sources and driving issues to resolution.
OX Security
Orchestrate resolution of Software Supply Chain findings and alerts in fully automated or human-in-the-loop fashion.
PagerDuty
Orchestrate and automate incident response workflows by leveraging paging and user interaction, driving incidents to resolution.
Palo Alto Networks
Automate Network Security policy management lifecycle, as well as remediation of Network / Cloud Security findings.
Palo Alto Networks Cortex XDR
Automate Network Security policy management lifecycle, as well as remediation of Network / Cloud Security findings.
Panther
Orchestrate and automate resolution of SOC alerts, enriching with data from 3rd parties and involving human-in-the-loop decisions.
PingIdentity
Automate managing user lifecycle, from on-boarding to off-boarding, implement just-in-time access procedures and orchestrate response to security events.
Prisma Cloud
Automate and orchestrate response to Cloud Security findings and alerts, enriching the data from multiple sources and driving issues to resolution.
Proofpoint
Orchestrate and automate response to email security events, analyzing emails and their attachments and automatically performing remediation actions.
Qualys
Orchestrate and automate Continuous Vulnerability Management, Application Security and Cloud Security pipelines in fully-automated, as well as human-in-the-loop fashion.
Rapid7 VM
Orchestrate and automate Continuous Vulnerability Management and Application Security pipelines in fully-automated, as well as human-in-the-loop fashion.
Reco
Integrating Torq and Anvilogic gives security operations teams a new way to detect threats across data platforms like Splunk, Snowflake, and Azure Sentinel- and then quickly handle those detections with interactive remediation workflows.
Recorded Future
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions. Orchestrate lifecycle of actionable threat information.
SafeBreach
Orchestrate Breach and Attack Simulation drill follow-up, dynamically provision entitlements based on drill results and handle interactive communications.
SentinelOne
Orchestrate EDR / XDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Sentra
Sentra provides security data to Torq, allowing Torq to include security assessments directly within its automated workflows.
ServiceNow
Attach automation workflows with flexible business rules to SeviceNow ITSM / SOAR tickets, enriching them with information and driving to resolution.
Shodan
Enrich security events orchestration with rich information about internet-connected services using flexible queries.
Slack
Create interactive chatbots, democratizing security events lifecycle with human-in-the-loop capabilities and provide delightful self-service experiences to information employees.
Snowflake
Query and update information stored in the data lake for Detection Engineering, Threat Hunting and other security processes.
Snyk
Orchestrate resolution of Cloud Native and Application Security findings via fully-automated or human-in-the-loop workflows.
Sophos
Orchestrate Endpoint Security and EDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Splunk
Orchestrate SIEM operations, attaching automated enrichment, containment and response workflows to identified threats and additional events. Automate detection engineering and Threat Hunting processes.
Splunk On Call
Orchestrate and automate incident response workflows by leveraging paging and user interaction, driving incidents to resolution.
SumoLogic
Orchestrate SIEM operations, attaching automated enrichment, containment and response workflows to identified threats and additional events. Automate detection engineering and Threat Hunting processes.
Tanium
Orchestrate XEM operations, automating device lifecycle and enriching data with up-to-date endpoint information to drive open issues to resolution.
Tenable Cloud Security
Orchestrate and automate remediation of security findings of AWS, Microsoft Azure and Google Cloud.
Tenable Vulnerability Management
Orchestrate and automate Continuous Vulnerability Management and Application Security pipelines in fully-automated, as well as human-in-the-loop fashion.
Threat Connect
This integration will enable enhanced threat response and improved threat intelligence sharing.
ThreatQ
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions. Orchestrate lifecycle of actionable threat information.
Twilio
Store your credentials and use them in steps that communicate with Twilio without storing sensitive information in the workflow.
Uptycs
Automate and orchestrate response to CNAPP and XDR findings and alerts, enriching the data from multiple sources and driving issues to resolution.
urlScan
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions.
VirusTotal
Automatically enrich security alerts and findings with accurate Threat Intelligence data, driving to risk-score-driven decisions.
VMware Carbon Black
Orchestrate EDR / XDR operations, attaching automated enrichment, containment and response workflows to identified threats and additional events.
Wiz
Automate and orchestrate response to Cloud Security findings and alerts, enriching the data from multiple sources and driving issues to resolution.
ZeroFox
With Torq and ZeroFox automate threat response actions, improve threat intelligence sharing, and enhance security orchestration.
Zoom
Create interactive chatbots, democratizing security events lifecycle with human-in-the-loop capabilities and provide delightful self-service experiences to information employees.
Zscaler
Automate SASE operations, including block/allow-lists management, just-in-time access and service provisioning.
Always Up-to-Date Integrations.
Dedicated engineers and tools monitor for third-party API changes in real-time to ensure maximum connectivity and compatibility.
Security automations to run continuously and uninterrupted around the clock.
Third-party security vendors are added frequently for the most seamless out-of-the-box integrations.
Event-Driven, Real-Time Updates.
Trigger automated workflows or actions based on specific events for timely and precise responses.
Webhooks facilitate instant connectivity for real-time notifications, enhancing responsiveness for the most pressing issues.
Facilitate efficient communications between disparate systems or services, promoting cohesion across security tooling and infrastructure.
Connect to Any Command Line Interface.
Go beyond APIs, supporting any CLI, platform, and programming or scripting language for maximum integration flexibility.
Extends capabilities beyond what APIs and webhooks can offer, especially in environments with complex or non-standard configurations.
Connect older systems that do not support modern API or webhook integrations.
Request a Demo
Ditch legacy SOAR and switch to enterprise-grade, AI-driven hyperautomation.
See it in action.