JSON for Beginners: Building Blocks for Workflow Automation

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, multi-step processes, allowing people to focus on higher-value tasks. On top of that, automation workflows can provide valuable insights through the metrics that they gather – including the number of requests, the date and time they were requested, the time it took to complete each request, who made the request, and much more.

At first, automated workflows functioned much like a basic assembly line, where workers only know how to perform one step in the whole process. Now, modern automation solutions like Torq’s no-code platform are able to use the data passed into a certain step, together with the data generated in that step to make decisions about retries, failures, and next steps in the process.

In the beginning, these workflows functioned much like a basic assembly line, where workers only knew how to perform one step in the whole process. Now, modern automation solutions can use the data that’s being passed into a certain step, together with the data that’s generated in that step to make decisions about retries, failures, and where to send the request next.

This is especially important when it comes to security and auditing. While gathering more context to achieve a more complete record of what is happening, that context can also be used to decide what a requester can send or receive at each step. For example, while someone in the payroll department can access salary data that someone on the help desk cannot, both can see who the employee’s manager is.

JSON Basics: The Building Blocks for Workflow Automation

Since modern intelligent automation workflows are built around their data, that data needs to have a consistent format across all steps in the workflow. The format that Torq uses to contain that data is JavaScript Object Notation, better known as JSON.

Because JSON is a text-based, self-describing format, it is easy to work with and very flexible. Compared to older and more formally structured formats like XML (eXtensible Markup Language), it requires less overhead to process and less storage space to archive. It is also easier to extend on the fly without needing to refactor multiple schemas to ensure backwards compatibility.

JSON Basic Structure

JSON is also human-readable, since it is based on the concept of key:value pairs and follows basic formatting rules. In this case, the only purpose of white space is to make it easier for humans to read. You must use a valid format, which normally means beginning and ending with curly brackets (i.e. { }), although square brackets (i.e. [ ]) are used in some cases. In addition, every element except the last one needs to be followed by a comma so that everyone knows there are more values to follow.

In the following JSON key:value example, the keys are shapes and the value of each key is the number of corners that the shape has.

{    “triangle”: 3,

    “square”: 4,

    “octagon”: 8

}

Basic JSON key:value Example

Data Types

When it comes to values, there are really only three data types. However, the values can be stored in arrays or objects, as defined below:

TypeDescriptionExample
StringAlphanumeric sequence (written in double quotes).“day”: “Saturday”“time”: “2021-03-11”
NumberAn integer (not in double quotes).“guestsNumber”: 25
BooleanValue can be true/false (not in double quotes).“surpriseParty”: false

Note: Numbers and Boolean values don’t need to be contained in quotes. However, string values and key names must be contained in quotes.

What Is a JSON Object?

JSON objects are items defined with multiple unique key:value pairs below them. Objects are contained within curly brackets, which is why most JSON data that is handled within these workflows will start and end with curly brackets. In fact, all of the data used within a workflow is one single object containing multiple sub-objects.

If we extend our previous example to include the number of sides as well as corners, we’ll end up with a unique object for each shape:

{    “triangle”: { “sides”: 3, “corners”: 3 },

    “square”: { “sides”: 4, “corners”: 4 },

    “octagon”: { “sides”: 8, “corners”: 8 }

}

JSON Object Example

JSON Arrays

Now you know how to create simple key:value pairs and unique objects. Sometimes, however, you need to record things as data using a common format, but the data itself is unique for each item. In such cases, you would define an array using square brackets ( [ ] ) around the set of key value pairs that need to be stored in the data.

For example, you can make a single object called “shapes” that contains an array for the data: 

{    “shapes”: [

        { “type”: “triangle”, “sides”: 3, “corners”: 3 },

        { “type”: “square”, “sides”: 4, “corners”: 4 },

        { “type”: “octagon”, “sides”: 8, “corners”: 8 }

    ]

}

JSON Array Example

How to Use JSON to Reference Data

Now that you know what the structure of JSON looks like and how easy it is to follow, we’ll explain how to address specific places inside the JSON data. To do so, you can either target the retrieval of the current state or grab an entire array.

How to Reference JSON Objects / Arrays

Let’s start with the basics of accessing data from an object. JSONpath is built using dot notation, which is a common type of syntax used in many programming languages to access the properties of an object. The basic JSONpath for accessing an entire object is “$.” These two characters will be at the beginning of every JSONpath in Torq.

For instance, to access the value of “triangle” in the first example (a simple JSON with a few key value pairs), you’d begin the path with the root “$.” and add the name of the key that you want to retrieve. So, in our example, “$.triangle” would return the value of 3.

Let’s say you wanted to access something that’s multiple levels down in the object. Using the JSON in the second example, you’d build on the base of “$.triangle” and add “.sides.” So, in this case, “$.triangle.sides” would return the value of 3.

Referencing JSON Arrays

Arrays are handled slightly differently, since they consist of multiple instances of data in a single object. To access data in an array, you can use square brackets and specify the desired record number. Or, if you leave the square brackets off, you’ll get the entire object back.

For instance, using the JSON in the third example, you’d start with the base and ask for all of the records in shapes with the “$.shapes” JSONpath. You would use “$.shapes[0]” if you only wanted the first record. (In JSON, record numbers start at zero, not one.)

You can also pull back the number of sides in every record without pulling the rest of the data. The syntax is similar, except that you replace the index number with a colon to access all records. So, “$.shapes[:].sides” would return “{ 3,4,8 }” as the result.

Once you’ve mastered the art of navigating JSON, you can start to do more advanced filtering within JSONpath. Using the third, “$.shapes[?(@.sides>5)]” would return a record of every shape in the array that has more than 5 sides.

There are many online tools that you can use to validate that these examples really work (like JSONpath.com).

JSON-Based Workflows

Now that you know what the data structure looks like in JSON, as well as how to reference specific values in that data with JSONpath, you have the option to build highly customized workflows to bring sanity and a sense of control to the most challenging manual work within your organization… Not that you’d need it, since Torq offers data-driven, zero-code security automation.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

How to Automate Intune Reports for Device Compliance with Torq

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Whether for managing remote teams, supporting ‘bring your own device’ (BYOD) policies, or simply another layer in a data protection strategy, services like Microsoft Intune offer greater control over the devices on your network. But using the data from these services often requires tedious prep work, and this process is likely repeated multiple times a week, if not daily. 

Tedious, repetitive, structured: these are all signs that a process can and should be automated. Torq offers dozens of pre-built templates to help security teams add efficiency to processes like these. Here we’ll show a workflow that automatically generates a daily report on device compliance from Intune, and delivers it to Slack. 

How Torq can Automate Device Compliance Reports  

The default trigger for this workflow is set to run once a day, but you can customize the duration based on your needs. Similarly, the default chat application is Slack, but changing to Microsoft Teams or other apps takes just a few clicks. 

Here’s how it works:

  1. Torq will generate an access token and pull the list of devices from Intune, then filter for the ones that are tagged as non-compliant. 
  2. It will loop through each of those devices to look for a registered user, then split the list based on whether or not a user is found.
  3. Next it generates the actual report, which is built from a set of pre-defined messages that you can customize.
  4. Finally, the last step is to send everything to a designated Slack channel. 
A segment of the workflow template available in Torq

This is a good example of how a relatively simple, pre-built template can make a big impact on recurring security activities. With just a few minutes of setup, you can eliminate hours of tedious work and improve your compliance efforts. 

Get the Workflow Template

Already a Torq customer? You can find this workflow, and many more in the template library. Just add it to your Torq account, provide your Microsoft credentials, specify the report frequency, and enjoy.

Get Started Today

Not using Torq yet? Get in touch for a trial and see how our no-code automation platform can add efficiency to your operations and improve overall security posture.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Torq Signed the CISA Secure by Design Pledge

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

At Torq, our commitment to security has always been at the forefront of our mission to empower businesses through our SaaS platform.

Today, we’re proud to announce a significant step forward in our security journey: Torq has signed the CISA Secure by Design Pledge.

This pledge underscores our dedication to ensuring that our customers can trust our platform to uphold the highest security standards, enabling customers to focus on their goals without concerns about their security posture.

Advancing Security by Design

The CISA Secure by Design Pledge perfectly aligns with our approach to security. This initiative emphasizes the importance of building security into the foundation of all products and services.

For Torq, this means integrating robust security measures throughout our development lifecycle, from initial concept to deployment and beyond.

By signing this pledge, we are reinforcing our commitment to:

  • Proactive security measures: Embedding security into every layer of our platform, ensuring our customers’ data is protected at all times.
  • Transparency: Providing clear, actionable information about managing and securing data, empowering our customers to make informed decisions.
  • Continuous improvement: Regularly evaluate and enhance our security practices to stay ahead of evolving threats.

What This Means for Our Customers

When you choose Torq, you’re not just selecting a SaaS solution but partnering with a company that prioritizes your security. Our adherence to Secure by Design principles means:

  • Minimal configuration risks: Our platform is designed to work securely out of the box, reducing the burden on your team to configure complex security settings.
  • Enhanced resilience: With built-in safeguards and automated protections, your organization’s security posture remains robust despite emerging threats.
  • Ongoing support: We’re committed to providing tools, resources, and guidance to help you confidently navigate security challenges.

This blog post outlines our commitment, investments, and transparency in those Secure by Design principles and our plans for the upcoming security year 2025.

Multi-factor authentication (MFA)

“Within one year of signing the pledge, demonstrate actions taken to measurably increase the use of multi-factor authentication across the manufacturer’s products.”

Torq’s customer’s default application authentication is SSO-based via federation through external identity providers, ensuring uncompromised authentication standards for our customers.

This approach ensures consistent MFA configuration and enforcement with their identity provider’s MFA settings.

Torq supports SAML 2.0 and OpenID Connect with code flow and implicit grant type. It’s compatible with many enterprise IDPs, including:

  • Google
  • Microsoft Entra ID
  • Okta
  • OneLogin

Supported SSO Methods and Protocols

  • Open ID connect
  • SAML 2.0

Default passwords

“Within one year of signing the pledge, demonstrate measurable progress towards reducing default passwords across the manufacturers’ products.”

Torq’s customers are invited to their new workspace by an invite email directly sent to their corporate mailbox.

The invite email contains a unique invite link, and clicking it invokes the authentication process.

When a customer’s admin user logs in to their Torq account using the invite link, they use their email and self-generated password; hence, no default passwords are involved.

Per policy, customers are informed that 2FA is necessary to continue.

The user must scan the QR code presented or enter the activation code into a recognized authenticator application on their cellular device.

Upon completion, the customer can set up the organization’s SSO, which neglects password usage thereafter.

Torq’s application password policy enforces the following criteria:

  • Between 8 to 20 characters
  • At least one capital letter
  • At least one lowercase letter
  • At least one number
  • At least one special character

Reducing entire classes of vulnerability

“Within one year of signing the pledge, demonstrate actions taken towards enabling a significant measurable reduction in the prevalence of one or more vulnerability classes across the manufacturer’s products.”

Torq adopts a “security by design” approach to effectively minimize attack surfaces that are vulnerable to potential threats.

That said, to effectively deal with zero-day attacks and reduce vulnerabilities, Torq has a few key components aiming at that goal, such as:

  • Penetration testing
  • Scanning Torq’s supply-chain pipeline, including code dependencies (open source), containers (dockerfiles), code (SAST), Secrets, and IaC as part of SDLC and CICD
  • Utilizing the world’s best-of-breed CNAPP
  • Utilizing Distroless cloud workloads
  • Utilizing an EDR vulnerability scanning module on Torq’s laptop devices fleet and addressing findings through automation

Looking ahead:

Over the course of the following year, we intend to focus on improving runtime visibility, gaining better and higher vulnerability verdict.

Security patches

“Within one year of signing the pledge, demonstrate actions taken to measurably increase the installation of security patches by customers.”

As a SaaS offering, Torq’s application is updated continuously through a process where Torq manages the deployment of new features, bug fixes, and security patches. Customers benefit from automatic updates without needing to install new versions manually. Torq’s Continuous integration and deployment (CI/CD) pipelines enable rapid, frequent updates, allowing it to deliver improvements and patches quickly while ensuring stability and performance.

No action is necessary on the customer’s part to have these patches automatically applied to their workspaces.

Customers are notified through Torq’s “what’s new” segment and through https://kb.torq.io/en/

Vulnerability disclosure policy

“Within one year of signing the pledge, publish a vulnerability disclosure policy (VDP).”

In addition to Trust Center, where customers can obtain up-to-date reports, policies, and the status of Torq’s security posture, Torq also maintains a Security and Compliance public page within its torq.io commercial website – https://torq.io/security-compliance/

At the bottom of this page, visitors are introduced to Torq’s privacy and security mail accounts for any security-related matter, including vulnerability disclosure.

Torq addresses and responds to any approach made.

https://torq.io/security-compliance/

As a continuous improvement, the process could be enhanced by having a dedicated online form for a better vulnerability disclosure experience within Torq’s security-compliance page.

CVEs

“Within one year of signing the pledge, demonstrate transparency in vulnerability reporting.”

At Torq, we take security seriously and continuously monitor our platform for vulnerabilities. Unlike traditional software that requires customers to manage their own patches, SaaS platforms like ours are centrally managed, allowing us to rapidly mitigate security issues without requiring customer intervention.

CVE (Common Vulnerabilities and Exposures) program focuses on publicly disclosed security vulnerabilities in software products, hardware, and firmware.

Torq is a SaaS offering that, by its operational fashion, is non-distributable and installed on its customers’ end. Hence, it does not directly fit and is obligated to issue CVEs disclosure.

We believe in transparency and proactive security measures.

Our approach to vulnerability management includes:

Continuous monitoring and rapid patching – We detect and remediate security issues before they impact customers.

Customer notification – We will notify impacted customers if a vulnerability affects data security or compliance.

Third-party component reporting – If an issue involves open-source or third-party software, we may issue a CVE when appropriate.

Security bulletins – We publish important security updates via our Trust Center.

Regulatory compliance – We align with industry standards (e.g., SOC 2, ISO 27001, FedRAMP) to ensure best-in-class security.

Evidence of intrusions

“Within one year of signing the pledge, demonstrate a measurable increase in the ability for customers to gather evidence of cybersecurity intrusions affecting the manufacturer’s products.”

Torq generates audit logs. These logs provide a comprehensive record of events within a workspace, capturing various actions and changes. They record events such as user activities, workflow changes, and resource modifications. Typically, log entries are created immediately after an action is taken. The audit logs include the event occurrence, timestamp, the user or service that initiated the action, and the affected entity.

To enhance the security and oversight of your workspace, audit logs could be streamlined to a SIEM or bucket using Torq workflows, steps, or API.

Looking Ahead

As cyber threats evolve, Torq’s security journey doesn’t stop here. Signing the CISA Secure by Design Pledge is just one of many steps we’re taking to ensure our platform remains a trusted partner for businesses worldwide. Our team will continue to innovate, collaborate, and advocate for security practices that benefit not only our customers but the broader digital ecosystem.

We’re excited about this new chapter and its meaning for our customers. By seamlessly integrating security into our solutions, we’re not just mitigating risks — we’re enabling your success.

Stay tuned for more updates on how we’re driving security excellence at Torq, and feel free to reach out if you have any questions about our Secure by Design journey.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Cloud Security Automation with Torq + Sweet Security

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

For security teams, resolving a cloud incident takes an average of 10 days — time attackers can exploit to cause further damage. The problem? SOCs often lack the context and cloud security automation they need to respond faster. That’s where the partnership between Torq and Sweet Security changes the game.

Why SOCs Need Torq and Sweet Security

Sweet Security delivers the real-time, cloud visibility SOCs need to identify threats quickly and accurately. Torq takes it further by automating the response process, bridging the gap between detection and action. Together, they empower SOC teams to neutralize threats in minutes — not days — reclaiming control over their cloud environments and staying ahead of attackers.

Sweet Security: Raising the Bar for Cloud Detection and Response

Sweet Security approaches cloud protection with precision and expertise that stands apart. Their platform combines unified cloud visibility across the cloud infrastructure, workloads, and applications with deep runtime context, enabling SOCs to detect and neutralize real-time threats as they unfold. By integrating cutting-edge, cloud-native technologies, Sweet equips security teams to handle even the most sophisticated attacks with confidence and resilience. 

Sweet’s Detection & Response capabilities reduce MTTR by enriching incident insights with detailed information on human and non-human identities, including roles, users, and service accounts. By correlating siloed cloud events into a comprehensive attack story and leveraging an advanced threshold mechanism to minimize false positives, Sweet ensures deeper context and alerts only on high-probability malicious incidents. Seamless orchestration with Torq further amplifies these capabilities.

Torq Hyperautomation: Transforming SOC Operations

Torq has redefined what’s possible for SOCs by enabling Hyperautomation across workflows. With Torq, SOC teams can design, deploy, and scale automated incident responses — reducing manual work and freeing analysts to focus on critical decision-making. Whether it’s accelerating the triage process, auto-remediating threats, or optimizing collaboration between tools and teams, Torq’s platform brings unmatched speed and precision to security operations.

Together, Torq and Sweet Security’s integration achieves what was once thought impossible: full-spectrum cloud protection, automated at scale.

What the Integration Delivers to SOC Teams

Torq and Sweet’s integration creates a seamless threat detection and resolution pipeline. Here’s how:

  1. Unified cloud visibility meets real-time automation: Sweet Security provides SOCs unparalleled insight into cloud environments, while Torq transforms these insights into automated actions. When Sweet’s platform identifies an anomaly, Torq can immediately trigger a workflow to respond to the threat.
  2. Proactive incident response: Cloud attacks often unfold in seconds, leaving SOC teams little time to react. With this integration, Sweet’s real-time detection feeds directly into Torq’s cloud security automation workflows, enabling SOCs to mitigate threats faster. For example, Sweet’s advanced capabilities allow for the detection of the human identity responsible for an incident and the ability to directly question the user about their activity — without requiring SOC intervention.
  3. Customizable workflows for every cloud environment: No two organizations operate the same cloud stack. Torq’s no-code platform allows security teams to tailor response workflows that align perfectly with their unique cloud setups, ensuring that Sweet Security’s detections are met with tailored, effective responses.
  4. Enhanced SOC efficiency and morale: Automation doesn’t just eliminate repetitive tasks — it empowers SOC teams to operate at their best. By integrating Sweet’s intelligence with Torq’s workflows, analysts are no longer bogged down by manual processes, allowing them to focus on strategic initiatives that strengthen overall security posture.

A Use Case: From Detection to Mitigation in Minutes

Imagine this scenario: Sweet Security identifies unusual activity in a cloud environment, flagging a misconfigured container with potential malware. The alert triggers a prebuilt Torq workflow that:

  • Enhances alerts with additional context from threat intelligence sources, as well as data from cloud provider APIs and log services, such as AWS CloudTrail and CloudWatch.
  • Automatically reaches out to asset owners through Slack or Microsoft Teams, enabling them to remediate minor issues without involving the SOC.
  • Isolates the container while verifying the presence of malware.
  • Deploys a remediation script to correct the misconfiguration.
  • Directly engages the suspected user to verify their activity — eliminating the need for SOC intervention.

All of this occurs in minutes — not hours or days — significantly reducing the attack’s impact.

Example cloud security automation workflow with Torq and Sweet Security.

Looking Ahead: Strengthening the Future of Cloud Security

The Torq and Sweet Security partnership isn’t just about solving today’s cloud security challenges — it’s about preparing SOCs for the future. With the increasing sophistication of cloud-native attacks, the ability to integrate real-time detection with scalable automation will be a non-negotiable for every security team.

At its core, this collaboration underscores a simple but powerful truth: when detection meets automation, SOCs can achieve extraordinary outcomes. By combining Sweet Security’s advanced cloud-native detection with Torq’s Hyperautomation platform, security teams are no longer playing catch-up. They’re setting the pace.

Ready to See Cloud Security Automation in Action?

For a detailed walk-through on integrating Torq and Sweet, check out the Knowledge Base article

To learn more about how Torq and Sweet Security are transforming cloud security, schedule a demo today and experience the future of SOC operations firsthand. 

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Torq Announces 300% Revenue Growth and Opens EMEA HQ in London

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Last year was an absolutely amazing year for Torq. The stats are just mind-blowing: 300% revenue growth and 200% employee growth. We also closed our $70M Series C round, bringing our total funding to $192M.

In 2024, we officially closed the door behind us on SOAR and blew open the door ahead for Torq Agentic AI security solutions, which are now used by some of the biggest names in cybersecurity, consumer packaged goods, industrial automation, retail, and telecommunications. We’re talking about companies you know and love, like Abnormal Security, Check Point Security, Chipotle Mexican Grill, Deepwatch, Inditex (you may know them better by their brands Zara, Bershka, and Pull & Bear), Informatica, PepsiCo, Procter & Gamble, Siemens, Telefonica, and Wiz. And our unique security operations approach was validated by Gartner, IDC, Forrester, and GigaOm

EMEA Expansion and New London HQ

Well, guess what? We’re just getting started. In 2024, Torq achieved incredible market penetration across North and South America, and APAC, where Torq HyperSOC and Torq Hyperautomation products are now firmly established as the premiere Agentic AI and autonomous SOC solutions of choice for global enterprises. And now, I’m so pleased to let you know we’ve dramatically expanded operations across EMEA. 

We’ve got brand new EMEA headquarters in London, and we’ve appointed Usman Gulfaraz as our new VP of EMEA Sales. Usman is a high-octane, phenomenal leader, who was most recently responsible for global revenue at Speechmatics. Previously, he ran EMEA for Tessian, which he helped lead to acquisition by Proofpoint. And prior to that, he ran EMEA for Shape Security which he helped lead to acquisition by F5.  We’ve also just appointed Jaicee Matthews as our Head of EMEA Marketing. Jaicee previously led marketing teams for GTT, Edgio, and Lumen Technologies. Both of them are based in London.

I asked Usman for his thoughts and here’s what he told me: “I’m absolutely elated to join this world-class team of cybersecurity professionals making such a huge difference for enterprises around the world. Every day, I’m increasingly hearing from EMEA customers and prospects about their excitement about Torq HyperSOC featuring our Agentic AI Multi-Agent Framework. Demand is so high for Torq, I barely have time to write this quote for you, Don. The sky’s the limit for Torq and the fact that my email and phone are constantly blowing up says it all.”

Accelerating EMEA Partner Momentum

Our EMEA partner base is also increasing by leaps and bounds. It already includes AdvanceSec, Bytes Software Services, Check Point, GlobalDots, Nubera, Nueva Group, Softcat, Tata Group, Wiz, and WWT, with dozens more about to sign. 

Here’s what Adam McCaig, Head of Security Strategy and Services at Bytes Software Services, had to say: “We’re thrilled to partner with Torq and continue to deliver innovation that matters to our customers. Demand for Torq’s game-changing Hyperautomation Platform and Torq HyperSOC continues expanding exponentially. Together, Torq and Bytes Software Services are making enterprise SecOps teams across EMEA more productive and focused with their AI-driven SecOps and autonomous SOC solutions, ensuring organizations can mitigate existential security issues before they have a chance of creating adverse impacts.”

Focus on Autonomous SOC

In 2025, you can expect even more generational, transformational shifts from Torq as we take our AI-driven, autonomous SOC focus to the next level. You’re going to witness some of the most innovative product and capability unveilings in the history of modern cybersecurity. We’re going to deliver on the promise of true autonomy and introduce SecOps efficiencies and productivity boosters the likes of which you’ve never seen before.

We can’t wait to show you what’s coming up!

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Maximizing AI Autonomy: Achieving Reliable AI Execution Through Structure and Guardrails

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

Gal Peretz, Head of AI & Data at Torq

Gal Peretz is the former Head of AI & Data at Torq. Gal accelerates Torq’s AI and data initiatives, applying his deep learning and natural language processing expertise to advance AI-powered security automation. He also co-hosts the LangTalks podcast, which discusses the latest AI and LLM technologies.

Our previous blog post explored how planning with AI systems can set the stage for smooth collaboration between humans and machines. However, a solid plan alone isn’t enough. The next step is orchestrating the execution — ensuring that the AI system can carry out tasks autonomously while maintaining guardrails that prevent errors, hallucinations, or false actions.

The Challenge of Direct Execution: LLMs Alone Aren’t Enough

Moving from a free-text runbook to execution without a structured schema is where most AI implementations fail. While large language models (LLMs) are powerful, they continue to struggle with AI autonomy due to:

  • Hallucinations: Making incorrect assumptions or executing invalid steps.
  • Ambiguity: Choosing the wrong tools or extracting incorrect arguments from the execution context to pass to the next step.
  • Lack of Determinism: Struggling to execute tasks consistently without a clear structure, often leading to indeterministic execution where the AI agent may jump between steps out of order or skip them altogether.

Simply put, letting the LLM orchestrate execution without structure and guardrails lacks the precision needed for a reliable execution process.

Streamlining the Execution of a Clear and Reliable Plan

To address this, Torq implements a concrete structured execution scheme that ensures Torq’s AI system performs tasks deterministically and without ambiguity. Once the high-level plan is developed, the AI extracts each step as an atomic unit — clear, precise, and sequential. 

This structured approach eliminates the risks of indeterministic execution, where the AI agent might skip steps, go out of order, select incorrect tools, or misinterpret arguments due to vague instructions. 

Think of it like following a recipe step by step: after deciding to ‘make dinner,’ you break your activities into clear, sequential micro-tasks like ‘bring water to a boil’, then ‘add pasta to the water.’ 

Similarly, Torq built our AI to execute a detailed plan one micro task at a time, in the right order. This allows Torq’s AI system to analyze and break down instructions and examples for each step, ensuring the AI completes the overarching task accurately. By eliminating ambiguity, the structured execution guides the AI to select the right tools and arguments at every stage, delivering consistent and reliable results.

AI Guardrails: Balancing AI Autonomy and Control

While we aim to maximize AI autonomy, balancing it with guardrails is critical to ensuring its safe and reliable execution. These guardrails act as safety nets that prevent the AI from taking false or unintended actions, ensuring human oversight remains available when necessary.

The key is for the AI to be able to break down the execution process into atomic steps that it can handle precisely. The system then focuses on clear micro-tasks for each step, reducing ambiguity and enabling the AI to perform confidently. 

However, when the AI encounters uncertainty — such as ambiguous context, missing tools, or incomplete arguments — it pauses execution and escalates the decision to a human operator. This human-in-the-loop mechanism mitigates the risks of hallucinations or incorrect tool usage, providing a safety checkpoint before the AI proceeds.

By combining structured execution with these dynamic guardrails, we can push the boundaries of AI autonomy. This allows the AI to operate efficiently and autonomously in most cases, saving significant time and resources while ensuring that safety and accuracy are never compromised.

Screenshot showing an example of an AI system seamlessly delegating control to a human when it lacks permission to execute a critical task, demonstrating how AI autonomy and human oversight work together seamlessly.
Figure 1: Example of an AI system seamlessly delegating control to a human when it lacks permission to execute a critical task, demonstrating how AI autonomy and human oversight work together seamlessly.

Reliable AI-Powered Execution at Scale

Orchestrated execution unlocks AI’s full potential by combining precision, autonomy, and control. By leveraging a step-by-step structure, AI can focus on atomic tasks, ensuring consistency and reliability at every stage. This approach streamlines workflows requiring constant human intervention, enabling AI to act efficiently while remaining grounded in a structured plan.

For Security Operations Center (SOC) teams, this translates to faster and more reliable execution of security runbooks at scale. This reduces the need to micromanage AI-powered SOC processes or perfect the prompts to control the AI, giving SOC teams more time for higher-value tasks while ensuring confidence in the AI’s structured execution.

The Future of AI Autonomy in the SOC

Choosing solutions that orchestrate AI execution with appropriate guardrails is critical for building trust, efficiency, and precision in today’s SOC operations. AI that structures execution as a series of deterministic micro steps and balances AI autonomy with human oversight allows SOC teams to confidently rely on AI systems to streamline their workflows.

This collaborative approach enables SOC analysts, engineers, and managers to:

  • Maintain control over automated processes
  • Trust in AI’s reliability for step-by-step execution
  • Focus on higher-value work while reducing uncertainty

The result is a stronger, more efficient autonomous SOC environment where human expertise and AI capabilities work seamlessly together. Schedule a demo today.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

No-Code Security Automation vs. SOAR Tools

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

SOC teams have been on the hunt for ages for a way to automate manual, repetitive tasks and workflows. SOAR was intended to streamline security workflows — however, legacy SOAR tools have long since been called “obsolete” by Gartner due to their reliance on excessive customization and scripting. 

That’s why SecOps teams are abandoning legacy SOAR in favor of no-code security automation solutions, particularly the new gold standard for today’s modern SOC operations: AI-driven Hyperautomation and the autonomous SOC. 

Let’s break down how these security automation software solutions compare.

What are SOAR Tools?

However, SOAR tools suffer from limitations such as rigid architecture and a heavy reliance on custom scripting and coding, hindering their ability to integrate with the modern security stack and adapt to evolving security needs.

Learn why SOAR is dead >

What is No-Code Security Automation?

By using a codeless approach to security (think drag-and-drop visual interfaces and pre-built templates), no-code security automation tools enable SOC teams to manage risks without depending on specialized, expensive scripting skillsets. This approach empowers security analysts to move quickly: they can launch automated workflows and enforce policy at scale with simple toggles and low-code overrides for edge cases.

SOAR Tools vs. No-Code Security Automation

SOAR tools and no-code security automation platforms overlap in many of their objectives, including:

  • Automation: Both solutions enable automated risk identification and management.
  • Efficiency: SOAR and no-code security tools are designed to help organizations manage risks more effectively.
  • Going beyond threat detection: Unlike SIEMs, SOARs and no-code security frameworks don’t just detect risks and send alerts, they can also be used to manage risk response.
  • Threat intelligence: Both categories of tools draw on threat intelligence data to help identify and assess the newest types of security risks.

But the similarities stop there. In general, no-code security automation delivers additional features and benefits that SOAR tools lack, including:

  • Accessibility: No-code security automation frameworks are easy enough for anyone to use, regardless of coding experience. They allow all stakeholders, not just cybersecurity experts, to define and enforce security requirements within the systems they manage.
  • Automated response: In addition to making it easy to configure security rules, no-code security automation frameworks can automate incident response based on those rules. Traditional SOARs provide some automated response features, but they focus more on orchestrating threat response actions by cybersecurity professionals than on actually remediating the threat themselves.
  • Configuration security posture management: Traditional SOAR tools usually identify active risks within environments, rather than assessing configurations to find flaws that could enable a breach. No-code security automation tools do both, which means they can address domains like cloud security posture management (CSPM) in addition to runtime security — and these automation workflows span both prevention and response.
  • Simple integrations: While deploying a SOAR in various environments and with many types of systems is possible, doing so usually requires extensive configuration and customizations. In contrast, no-code security automation platforms are designed to start working out of the box, across any mainstream environment, with minimal configuration tweaks.

What Sets No-Code Security Automation Apart

No-code security automation allows anyone — regardless of coding skill — to build, deploy, and manage automated security workflows. Using drag-and-drop visual editors, pre-built templates, and plug-and-play integrations, these platforms make it possible to:

  • Detect and respond to threats automatically
  • Enforce security policies across the environment
  • Remediate incidents in real time
  • Manage risk without relying on hard-to-hire scripting experts

Compared to SOAR and even low-code automation, no-code security automation is:

  • Faster to deploy: No months-long setup or custom scripting backlog.
  • More accessible: Usable by security analysts, IT admins, and even DevOps teams.
  • Broader in scope: Covers threat detection, configuration hardening, and policy enforcement.
  • Easier to integrate: Connects to your existing stack with minimal configuration.
  • End-to-end: Designed for true, end-to-end automation across detection, response, and recovery.

Traditional SOAR still delivers value in orchestration, but no-code platforms remove the barriers that made SOAR slow, rigid, and costly.

How Torq’s AI-Powered Hyperautomation Replaces Legacy SOAR

Building upon the accessibility and flexibility of no-code automation, the modern SOC now demands a more intelligent and scalable approach: AI-driven Hyperautomation. Torq’s autonomous SecOps platform represents a fundamental leap in the evolution of security automation for modern SOC capabilities.

With security Hyperautomation, SOCs can:

  • Eliminate alert fatigue with autonomous triage and Tier-1 auto-remediation
  • Enrich alerts in real time with threat intelligence, asset context, and business impact scoring
  • Automate investigation and containment across EDR, SIEM, email, identity, and cloud tools
  • Scale without friction using agentless architecture and 300+ pre-built integrations
  • Empower every skill level with no-code, low-code, and full-code workflow building

Security Hyperautomation delivers significant advancements over SOAR and basic no-code automation. In addition to limitless integrations and cloud-based scalability, Torq Hyperautomation™ offers powerful case management capabilities that eliminate alert fatigue by automating Tier-1 threat remediation and intelligently prioritizing complex cases. And now, Torq’s agentic AI and Multi-Agent System is revolutionizing SOC efficiency through autonomous triage, investigation, and response. 

Thanks to no-code, low-code, and AI-generated workflow building, Torq empowers your SOC team to build and manage automations without extensive coding knowledge — while also offering full-code capabilities for those on your team who want granular control.

By automating complex workflows in minutes and leveraging intelligent decision-making, the AI-powered SOC can help organizations move beyond reactive security to become more efficient and resilient in the face of talent shortages and ever-evolving threats.

Choosing the Right Path: What Today’s SOCs Prefer

Market momentum is clear:

  • Gartner, IDC, and buyers alike have signaled the decline of SOAR in favor of flexible, cloud-native security automation platforms.
  • SOC leaders prefer lower cost, faster onboarding, and the ability to scale automation without adding headcount.
  • Modern platforms like Torq let security, IT, and DevOps work from a single automation layer, removing silos and speeding MTTR.

Legacy SOAR simply can’t match the speed, scalability, and adaptability required for today’s high-volume, multi-tool security environments.

Don't die. Get Torq.

See Torq in Action

The SOC has changed — your automation should too. Torq Hyperautomation combines no-code accessibility, low-code flexibility, and AI-powered autonomy to modernize security operations from the ground up. 

Whether you’re replacing SOAR, extending your existing stack, or building an autonomous SOC, Torq delivers:

  • Autonomous triage, enrichment, and remediation driven by automated decisioning
  • Seamless integrations with your current tools and pre-built connectors
  • Faster MTTR and higher productivity for your security analysts, powered by automated workflows

See how Torq Hyperautomation stacks up.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Streamline Recorded Future Integrations with Torq for Enhanced Threat Intelligence

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We combine forces with leading security vendors to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture.  

Torq Hyperautomation integrates seamlessly with Recorded Future to take your threat intelligence workflows from manual and reactive to fully automated and autonomous. 

Whether you’re enriching IOCs, sandboxing suspicious files, detecting phishing, or spotting impossible logins, Torq makes it easy to turn Recorded Future threat intel into real-time security action — without writing a single line of code.

Why Integrate Recorded Future with Torq?

Recorded Future is one of the most powerful threat intelligence platforms available, collecting, analyzing, and delivering high-fidelity data on threat actors, tactics (TTPs), and indicators of compromise (IOCs). But using it effectively still requires:

  • Manual triage of alerts and indicators
  • Context switching between tools
  • Analyst time to trigger remediation

By connecting Recorded Future’s API to Torq’s no-code, AI-driven Hyperautomation platform, you can:

  • Automate IOC enrichment and validation
  • Trigger real-time auto-remediation workflows across your stack
  • Share intelligence instantly across SecOps, IT, and cloud teams
  • Reduce MTTR by moving from “intel to action” in seconds

Top Torq + Recorded Future Automations

Here are four high-impact automations that combine the power of Torq’s orchestration with Recorded Future’s threat data.

1. Analyze URLs and Files in Recorded Future Sandbox

Eliminate the manual back-and-forth of investigating suspicious URLs and files by letting Torq handle ingestion, validation, and sandbox submission.

Workflow example:

  1. Torq receives a list of potentially malicious links or file download URLs from any source — SIEM, email, chat, or manual input.
  2. URLs in the urls_list are sent for Recorded Future website analysis; file links in the files_url_list are downloaded and submitted for file analysis.
  3. Invalid or malformed URLs are automatically filtered out to avoid false positives and wasted cycles.
  4. Recorded Future’s sandbox verdicts (malicious, suspicious, clean) are returned in real time and pushed to the requesting team via Slack, email, or ticketing systems.

SOC teams get actionable verdicts in seconds with zero analyst touch time, drastically reducing triage delays.

2. Enrich Hashes, CVEs, and IP Addresses via Slack

Make threat intelligence instantly available where analysts collaborate, removing the need to pivot between multiple tools.

Workflow example:

  1. A user drops a SHA256 hash, CVE ID, or suspicious IP into a Slack message or SOC request channel.
  2. Torq automatically extracts IOCs, confirms the input with the requester, and queries Recorded Future for enrichment.
  3. Threat context, severity scores, and related intelligence are instantly posted back into the same Slack thread for transparency.

Analysts never leave Slack to check an IOC, reducing investigation times from minutes to seconds and minimizing workflow disruptions.

3. Monitor Outlook Mailboxes for Phishing

Automatically process and classify suspected phishing emails without analyst intervention.

Workflow example:

  1. Torq watches a specific Outlook folder (e.g., “Not-Scanned”) for new submissions from users.
  2. Torq extracts URLs, attachments, and IPs from the email body and headers.
  3. The platform runs those IOCs through Recorded Future’s intelligence platform and sandbox.
  4. It applies labels like Investigated, Suspicious, Malicious, or Phishing directly to the mailbox and notifies the reporter of the findings.

End-to-end phishing triage — from user submission to final verdict — happens in minutes, not hours, with zero manual file or URL lookups

4. Detect Impossible Travels in Okta Logins

Identify impossible travel anomalies and respond to compromised accounts in real time using behavioral and geolocation analysis.

Workflow example:

  1. Torq ingests successful login events from Okta.
  2. It then compares the login’s IP geolocation to the last known login location for the same user.
  3. The platform flags logins that occur in physically impossible timeframes (“impossible travel”) for review.
  4. It queries Recorded Future for IP reputation to confirm risk.
  5. If suspicious, automatically resets the user’s password, logs them out of active sessions, and sends an alert to both the user and the SOC.

Immediately contain account takeover attempts before malicious actors can escalate privileges or exfiltrate data.

Enrich Your Threat Intel Workflow with Hyperautomation

Recorded Future gives security teams deep, contextual intelligence on the threats that matter most — but intelligence alone doesn’t stop attacks. Without the right orchestration layer, valuable data can sit idle in an inbox, SIEM queue, or analyst’s to-do list.

Torq Hyperautomation ensures that every IOC, every alert, and every piece of context moves seamlessly from insight to action — at scale and without manual intervention.

With Recorded Future’s API feeding into Torq workflows, you can:

  • Automate IOC processing: Eliminate manual copy-paste and data re-entry by automatically ingesting hashes, IPs, domains, and CVEs from any source — chat, email, SIEM, or threat feed — and routing them directly into Recorded Future for analysis.
  • Enrich data at scale: Combine Recorded Future’s rich threat context with data from internal CMDBs, cloud logs, EDR telemetry, and other intel feeds to build a 360° profile of each IOC, enabling faster and more confident decisions.
  • Trigger precise, policy-driven responses: Automatically execute targeted playbooks, such as quarantining an infected endpoint, blocking a malicious domain at the firewall, or disabling a compromised account, all within seconds of detection.
  • Eliminate silos across the SOC: Push enriched intel and recommended actions into every relevant system, ensuring all teams have the same, real-time picture of the threat.

Threat data is instantly operationalized by combining Recorded Future’s intelligence with Torq’s Hyperautomated workflows. The result is faster MTTR, fewer missed threats, and a security team that can scale without adding headcount.

From Intelligence to Action — Automatically

Pairing Recorded Future integrations with Torq turns threat intelligence into outcomes: you collect data from technical sources via API, enrich IOCs with TTPs, and orchestrate precise actions across endpoints — all surfaced in shared dashboards. This approach facilitates faster triage and lowers MTTR by moving what’s collected into real decisions and responses in seconds, not hours. 

Whether you’re piloting or pushing to GA, Torq operationalizes your intel pipeline end-to-end — so your analysts spend time resolving threats, not copy-pasting between tools.

Don’t let valuable threat data sit idle. Read our Don’t Die, Get Torq manifesto to see how your SOC can eliminate Tier-1 grind and focus on what matters most.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Automate Non-Human Identity Security and Risk Remediation with Torq and Astrix

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

As organizations embrace zero trust and strengthen identity protections for human users with multi-factor authentication (MFA), privileged access management, and strict authentication controls, a major blind spot remains: non-human identities (NHIs). 

These include API keys, service accounts, OAuth apps, and machine-to-machine credentials, often holding powerful privileged access yet lacking visibility, rotation, or governance. Attackers have taken notice, increasingly exploiting these unmanaged digital identities to breach environments and escalate attacks. 

That’s why Torq and Astrix have partnered to deliver a fully automated, intelligent solution for securing NHIs. The solution combines Astrix’s real-time behavioral detection with Torq’s no-code remediation workflows to continuously protect against identity-based breaches.

Why Non-Human Identity Security Needs to Be a Priority

Cybersecurity teams invest heavily in protecting user identities, securing login credentials, and enforcing authentication. However, the rising number of non-human identities (NHIs) often escapes similar scrutiny, creating significant security vulnerabilities. NHIs have become a primary attack vector due to widespread lack of visibility, weak governance, and unmanaged permissions.

Common risks associated with NHIs include:

  • Over-permissioned or over-privileged access
  • Lack of credential rotation and MFA
  • Unused tokens and keys increasing vulnerability
  • Poor visibility across cloud and SaaS integrations
  • Increased susceptibility to credential-based cyberattacks

The Hidden Risk Behind Digital Identities

Non-human identities frequently possess highly privileged access with little oversight. Service accounts, API keys, OAuth applications, and other machine identities can remain active indefinitely without periodic checks, making them prime targets for exploitation. Credential misuse or breaches involving these identities often go unnoticed until damage is already done.

Why Traditional Identity Management Falls Short

Traditional identity solutions, such as Identity Access Management (IAM) and Privileged Access Management (PAM), primarily focus on human users. They enforce policies like MFA, regular password rotation, and robust activity monitoring. These tools, however, are not built for automated services or non-human identities, leaving a substantial gap in security posture.

How Torq and Astrix Automate Non-Human Identity Protection

Torq and Astrix seamlessly integrate to deliver a comprehensive solution that automates the detection and remediation of non-human identity risks. By combining Astrix’s advanced behavioral analytics with Torq’s intelligent automation, security teams gain unprecedented visibility and control.

Detecting Anomalous Behavior in Real Time

Astrix Security applies behavioral analysis typically reserved for human identities to NHIs. By monitoring activity patterns, Astrix detects unusual behaviors, unauthorized access, or suspicious usage in real-time, closing gaps often overlooked by conventional identity management solutions.

Triggering No-Code Remediation Playbooks Automatically

When Astrix identifies an anomaly, Torq instantly triggers no-code remediation workflows based on preset rules. These automated playbooks rapidly address issues such as revoking access, rotating credentials, disabling unused identities, or alerting security teams, streamlining threat mitigation, and significantly reducing response times.

Enforcing Least-Privilege Access with Continuous Policy Management

Astrix continuously assesses and identifies NHIs with excessive privileges and dormant or outdated credentials. Torq automates the enforcement of least-privilege access policies by proactively removing unnecessary permissions, revoking unused tokens, and continuously updating identity posture, ensuring minimal attack surface exposure.

Strengthening Authentication and Access Control with Automation

Static access controls and manual credential management are no longer sufficient. As organizations adopt cloud-native infrastructure, DevOps pipelines, and an ever-growing array of third-party services, the number of digital identities — especially non-human ones — has exploded. 

Without automation, ensuring secure authentication and effective access control becomes unmanageable at scale. Automating these processes enhances identity hygiene, reduces risk, and allows security teams to enforce policy consistently across complex, dynamic environments.

Simulating MFA and Rotating Credentials Automatically

While multi-factor authentication (MFA) remains a cornerstone of identity security for human users, non-human identities often can’t use MFA in traditional ways. Organizations are turning to automated mechanisms that simulate MFA behavior like enforcing time-limited credentials, rotating keys after specific usage thresholds, or applying context-aware access restrictions. Automatically rotating credentials or secrets based on predefined policies helps prevent unauthorized reuse, reduce the impact of credential leakage, and limit the exposure window for attackers.

Securing Third-Party Integrations and External Access Points

Third-party applications and services can significantly expand an organization’s attack surface if not properly secured. Many breaches originate from overly permissive or forgotten integrations. Automating these external connections’ discovery, evaluation, and control is essential for maintaining security. By continuously monitoring for risky behaviors, organizations can automatically revoke or reconfigure access, enforce least-privilege principles, and minimize external risk without relying on manual reviews. 

Common Identity Security Challenges and How Torq Solves Them

Closing Visibility Gaps Across Cloud and SaaS Environments

Torq consolidates identity and security signals from your entire security and tech stack, providing unified visibility into NHI risks. By centralizing this information, Torq enables precise identification and quick remediation of identity-related vulnerabilities across the entire digital ecosystem.

Stopping Credential Misuse and Phishing-Style Exploits

With automated playbooks, Torq instantly identifies and stops credential misuse, proactively revoking compromised tokens, and preventing phishing-like attacks on NHIs. This immediate response capability significantly reduces security risks and minimizes potential damage.

Eliminating Alert Fatigue and Manual Remediation Backlogs

Manual remediation processes can overwhelm security teams, resulting in alert fatigue and delayed responses. Torq autonomously resolves repetitive and high-volume NHI-related incidents, reducing operational overhead and allowing security analysts to focus on strategic security initiatives.

Securing the Future of Identity Security

As the volume and complexity of non-human identities grow, so does the urgency of securing them with the same rigor applied to human users. API keys, service accounts, and automation credentials often fly under the radar, creating a hidden and highly exploitable attack surface. Traditional tools were never designed to manage this scale or speed. 

By integrating behavioral detection and intelligent auto-remediation, Torq and Astrix empower security teams to proactively manage identity risk, streamline response, and enforce consistent access controls. The result is a scalable, flexible, and future-proof approach to identity security that addresses today’s threats and tomorrow’s challenges.

Ready to close the gap on non-human identity risk? Request a demo to see how automated identity security works in action.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO

Impossible Travel Detection with Torq: Stop Identity-Based Attacks in Real Time

Contents

Get a Personalized Demo

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster.

Request a Demo

With remote work and global access, defending identity is now a 24/7 discipline. One high-fidelity risk signal is when a user appears to log in from two distant locations in an unrealistically short window — an anomaly that’s often a sign of stolen credentials, session hijacking, or policy misuse. Catching this impossible travel detection early lets you block access before attackers pivot, escalate, or exfiltrate data.

What Is Impossible Travel Detection?

How Impossible Travel Happens

Credential theft: Phishing, multi-factor authentication (MFA) “push fatigue,” and password reuse feed credential-stuffing and direct account takeover.

Token and session abuse: OAuth consent phishing, stolen refresh tokens, or session hijacking from compromised devices enable logins from anywhere without the password.

VPN/proxy/geolocation spoofing: Consumer VPNs, TOR, residential proxies, and cloud egress IPs make a user appear to “teleport” between countries.

Shared or service accounts: Multiple people (or scripts) using one identity from different regions trigger impossible travel detection.

Federated SSO drift: Misconfigured IdP/SAML/OIDC trusts or third-party SaaS logins from distant regions create mismatched signals.

Mobile or network artifacts: Carrier-grade NAT, roaming, airplane/ship Wi-Fi, and inaccurate IP geolocation can look like anomaly detection hits even when benign.

Why Impossible Travel Detection Matters

Early containment: Catching suspicious logins at the first hop prevents lateral movement, privilege escalation, BEC, and data exfiltration.

Lower dwell time and MTTR: Rapid triage and verification shrinks exposure windows, cuts investigation hours, and reduces downstream incident costs.

Protection of high-value access: Stops unauthorized entry to SaaS suites (email, finance, CRM), cloud consoles, and identity systems before damage occurs.

Fewer false positives with context: Pairing geo-velocity with device fingerprint, IP reputation, VPN awareness, and user history reduces noise while preserving real detections.

Compliance and audit readiness: Clear, automated decisions and records support regulations, incident reporting, and fraud investigations.

Proven pattern from fraud prevention: The same impossible travel logic used in travel and payment fraud highlights anomalous access patterns in enterprise identity, with measurable risk reduction.

Why Identity Threats Are the New Frontline in Cybersecurity

According to IBM, stolen or compromised credentials account for up to 40% of malicious incidents in Fortune 500 companies. These breaches also rank among the most expensive, adding over $1 million in costs per incident. Despite best practices like MFA and employee security training, the human element remains the weakest link — 68% of breaches stem from social engineering or user error.

Identity signals must be correlated in real time across IdPs (Okta, Microsoft Entra), EDR/XDR (e.g., Microsoft Defender), email, and cloud. That’s why modern security operations teams operationalize IdentityOps: for automated detection, contextual enrichment, and instant, policy-driven response.

How Torq Automates Impossible Travel Detection

To save security analysts from legacy systems and alert fatigue, Torq created an Impossible Travel Detection workflow that eliminates reliance on legacy, manual security processes. Torq automates Impossible Travel Detection with your existing best-of-breed toolstack. 

With 300+ integrations, this workflow can integrate with Okta, Microsoft Entra (Azure AD), and other leading identity providers, leveraging geolocation, user behavior analytics, and AI-driven security automation to identify and block suspicious logins instantly.

How To Detect Impossible Travel

Torq autonomously triggers its detection workflow based on successful login events from your identity access management (IAM) provider of choice and follows this streamlined identity-centric process:

  1. Login event capture: Activates the workflow when a user logs into Okta (or another IAM solution).
  2. Geolocation analysis: Determines the IP address’s physical location via integrated intelligence tools.
  3. Historical user behavior comparison: Compares the login’s geolocation with previous locations stored as identity baselines.
  4. Distance and speed calculation: Uses the Haversine formula to determine the travel distance and computes implied travel speed.
  5. Anomaly detection: Flags logins that exceed a predefined speed threshold (e.g., 1,000 km/h).
  6. Risk scoring and identity context awareness: Incorporates additional risk intelligence to minimize false positives.
  7. Automated response actions: Torq can automatically reset the user’s password, revoke active sessions, notify the SOC via Slack or Teams, and create an incident ticket — all in seconds.

By analyzing real-time user behavior and risk signals at machine speed, Torq instantly determines whether a login attempt is legitimate or an identity-based attack.

Going Beyond Geolocation: Smarter Identity Threat Detection

The power of IdentityOps lies in your ability to integrate across the security ecosystem — leveraging multiple threat intelligence and user behavior signals to detect, assess, and remediate compromised identities dynamically.

Advanced Risk Signals Integrated into Torq’s IdentityOps Workflow

Torq enriches Impossible Travel Detection with best-in-class security integrations, ensuring high-fidelity threat identification through:

  • IP reputation enrichment: Queries VirusTotal, Recorded Future, or CrowdStrike to determine if the login originates from a known malicious or suspicious source.
  • User behavior profiling: Establishes a historical baseline of each user’s login habits to detect anomalous patterns.
  • Context-aware decisioning: Analyzes additional identity context, VPN usage, corporate IP addresses, travel windows, verified itinerary data, and cloud service access patterns to reduce false positives.

These multi-layered identity security checks ensure precision threat detection while maintaining a seamless user experience.

Real-Time User Verification and Remediation Workflow

With this workflow, Torq detects potential takeovers. Then, Torq automatically engages users and security teams for real-time resolution.

Step 1: User Notification & Verification

The moment a suspicious login is detected, Torq automatically contacts the affected user with a context-rich, real-time security challenge delivered via their preferred channel (i.e., email, Slack, Teams, or SMS):

🚨 Suspicious Login Detected

We noticed a suspicious login to your account from [Geo IP City]; your last login was from [Cache Geo IP City].

📍 Distance between logins: [Calculated Distance]

❓ Do you recognize this login as yours? [Yes] / [No]

This proactive approach serves three key purposes:

  1. Alerts the user of potential credential compromise.
  2. Provides contextual insight into login activity.
  3. Engages users in real-time identity verification.

Step 2: Adaptive, Automated Remediation

If the login is verified as legitimate:

  • Torq updates the user’s known location history and device fingerprint.
  • A log entry is created in the audit trail for compliance tracking.
  • Operations continue without interruption.

If the login is denied (or is ignored or times out), Torq initiates auto-remediation.:

  1. Torq forces an immediate password reset and sends a secure reset link to the user.
  2. All active sessions are terminated across web, mobile, and connected apps.
  3. The SOC is alerted via Slack, Teams, SIEM, or ITSM for visibility.
  4. An incident ticket is automatically created and enriched with geolocation, IP reputation, and session history for investigation.

Optional: AI-Driven Investigation & Escalation

For high-risk scenarios — such as an admin account compromise or repeated suspicious logins — Torq automatically escalates the response by:

  • Disabling the account entirely until security clearance
  • Revoking OAuth and SSO sessions across all connected platforms
  • Enforcing step-up MFA for reauthentication
  • Running additional enrichment workflows such as IP threat lookups, device risk scoring, dark web credential checks

The result is a closed-loop, autonomous detection and remediation process that catches account takeover attempts early, engages the right people instantly, and resolves incidents before damage is done — without relying on slow, manual analyst intervention.

Save your SOC with Torq HyperSOC

Customizing IdentityOps: Flexible, No-Code Security Automation

Every organization’s identity posture is unique. Torq HyperSOC™ lets you tune thresholds, data sources, and actions without long dev cycles. Torq has: 

  • Customizable risk scoring and speed thresholds
  • Seamless integration with IAM, SIEM, and XDR platforms
  • Adaptable remediation actions based on risk severity
  • Agentic AI and AI Workflow Builder for instant, custom identity automation

Organizations can fine-tune Impossible Travel Detection to align with their unique security policies, compliance needs, and identity protection strategy, including:

  • Adjusting velocity rules, confidence cutoffs, and country allow-lists
  • Choosing your enrichment stack (IdP, Microsoft Defender, EDR, TI, SIEM) and the integrations that matter
  • Routing outcomes to ITSM, SIEM, data warehouse, or compliance dashboards
  • Localizing messaging and multi-language prompts to reduce end-user confusion

Transform Your Identity Security with Torq

By shifting to IdentityOps automation, security teams can radically transform how they detect, manage, and respond to identity threats. When you connect IdentityOps signals to automation workflows, you:

  • Lower dwell time and MTTR: Automated verification and remediation closes the loop in minutes.
  • Reduce false positives: Contextual scoring means fewer noisy cases and crisper “go/no-go” decisions.
  • Protect critical access: Prevent bad actors from reaching SaaS finance apps, admin portals, and cloud consoles.
  • Prove outcomes: Every alert, action, and result is captured for audit and continuous improvement.

Instead of relying on reactive security controls and manual investigations, Torq proactively enforces identity security at scale — ensuring only trusted users access your most sensitive resources. 

Stop credential-based attacks before they spread. See how Torq turns identity signals into decisive action in our Don’t Die, Get Torq manifesto.

SEE TORQ IN ACTION

Ready to automate everything?

“Torq takes the vision that’s in your head and actually puts it on paper and into practice.”

Corey Kaemming, Senior Director of InfoSec

“Torq HyperSOC offers unprecedented protection and drives extraordinary efficiency for RSM and our customers.”

Todd Willoughby, Director

Compuquip logo in white

“Torq saves hundreds of hours a month on analysis. Alert fatigue is a thing of the past.”

Phillip Tarrant, SOC Technical Manager

Fiverr logo in black

“The only limit Torq has is people’s imaginations.”

Gai Hanochi, VP Business Technologies

Carvana logo in black

“Torq Agentic AI now handles 100% of Carvana’s Tier-1 security alerts.”

Dina Mathers, CISO

Riskified logo in white

“Torq has transformed efficiency for all five of my security teams and enabled them to focus on much more high-value strategic work.”

Yossi Yeshua, CISO