The AI SOC Analyst: How Torq Socrates Automates 90% of Tier-1 Analysis With Generative AI

Contents

Meet Torq Socrates and learn how a Large Language Model (LLM)-powered AI SOC Analyst can revolutionize SecOps.

Artificial intelligence (AI) in the SOC has generated significant hype in recent years, and separating the promise from reality can be challenging. However, at Torq, AI is not just a concept — it is a reality that is revolutionizing the SecOps field, specifically in the area of Tier-1 security analysis. 

This is increasingly important as cybercriminals become more sophisticated in their tactics and techniques, including using AI to launch attacks at scale. Traditional security tools continue to fall short in detecting and mitigating modern attacks effectively, driving the need for AI-powered autonomous SOC solutions that can reduce the burden on human analysts and shore up defenses.

Introducing Torq Socrates, the AI SOC Analyst

Torq Socrates, the AI SOC analyst, introduces dramatic new efficiencies and incident response accuracy by hyperautomating key security operations activities using AI. This alleviates security analysts’ critical challenges, including alert fatigue, false positives, decreased visibility, and job burnout. Socrates is an AI Agent based on cutting-edge Large Language Models (LLMs)  and Generative AI that intelligently analyzes and understands organizations’ unique SOC playbooks to become an integral extension of their SOC teams.

Imagine having a bird’s-eye view of your complete enterprise environment from on-premise, hybrid to full SaaS applications, with all the relevant information at your fingertips. Torq Socrates makes this dream a reality by utilizing the security tooling already connected to the Torq Hyperautomation platform and performing any actions and activities only when explicitly authorized.

How an AI SOC Analyst Uses LLMs to Perform Tier-1 Tasks

So, how does this transformation happen? Let’s journey through a typical security event and see how tasks previously handled by human analysts are now handled with unprecedented efficiency by Torq’s AI SOC Analyst, Socrates.

Watch Socrates, Torq’s AI SOC Analyst, following the guidelines in a SOC runbook to triage a case automatically.

1. Automatic Runbook Analysis

When a security event arises, an analyst traditionally consults a “runbook” – a guide specifying the response to that specific type of event. Today, these “runbooks” exist in all modern SOCs and are prepared by senior architects to benefit Tier-1 and Tier-2 analysts.

Torq Socrates automatically analyzes runbooks written in natural language, typically containing step-by-step procedures for handling various security incidents. By analyzing the semantic meaning of the natural language instructions, the AI SOC Analysts derives action flow from the recommended response strategies for different security events.

The imported runbook is written in natural language that Socrates, the AI SOC Analyst, analyzed, “understood,” and can follow.
The imported runbook is written in natural language that Socrates, the AI SOC Analyst, analyzed, “understood,” and can follow.

2. Workflow Choice to Perform the Designated Runbook Actions 

The next step for a human analyst is to carry out the activities outlined in the runbooks, choosing the proper tool and executing the instructions.

Based on the content of the runbook, the AI SOC Analyst utilizes its semantic analysis capabilities to suggest suitable workflows and security tools from the list of ones explicitly made available inside the Torq platform. These workflows align with the specific steps outlined in the document conveyed in natural language. 

Each workflow made available to Torq Socrates comes with a natural language description of the tasks it can accomplish.

Torq Socrates performing the initial actions within the runbook.
Torq Socrates performing the initial actions within the runbook.

3. Interpreting the Outcome of Executed Actions to Follow the Next Step Prescribed by the Runbook

Various security tools available in the arsenal of Tier-1 SOC analysts can return a large amount of detailed information. The analyst’s goal is to try and synthesize this information into a decision about which next steps should be taken according to the runbook’s guidance.

An LLM-powered AI SOC Analyst like Socrates excels at processing both structured and unstructured security tool data. This enables it to analyze complex information and create dynamic decision trees based on runbook analysis. These decision trees adapt to the specific context of each incident, allowing for more efficient and accurate incident handlingFor example, Socrates can determine: Is the file malicious? Is the user a very important person (VIP)? Is the activity frequent or infrequent during a specific time period indicating anomalous behavior?

Execution showing the Torq AI SOC Analyst's semantic interpretation of a threat intel result.
Execution showing the Torq AI SOC Analyst’s semantic interpretation of a threat intel result.

4. Leveraging Knowledge of Security Frameworks for Context

More experienced alert triage specialists bring their own contextual knowledge and understanding of networking, endpoint architecture, and attack techniques into the mix.

LLMs are trained on an immense body of natural language documents containing information about the above and more. This allows the semantic analysis of an LLM to match between the observed outcome of a security tool and the technique described in a documented framework, such as the MITRE ATT&CK framework.

Using the above technique, Torq’s AI SOC Analyst Socrates leverages the information available in numerous documents describing attack frameworks, such as the MITRE ATT&CK framework, and maps its tactics and techniques to the outcomes observed in the security event being analyzed.

Intelligent modeling with Torq’s AI SOC Analyst Socrates enables it to mimic a human-like thinking process, correlating information efficiently and mapping the appropriate outcomes to common frameworks like the MITRE, NIST, and more.
Intelligent modeling with Torq’s AI SOC Analyst Socrates enables it to mimic a human-like thinking process, correlating information efficiently and mapping the appropriate outcomes to common frameworks like the MITRE, NIST, and more.

5. Automated Incident Investigation

Just as human analysts rely on insights from the runbook, Socrates can assist in automating investigation or even incident response tasks. This includes executing tasks such as alert triage, data enrichment, containment, and remediation actions, which speeds up response times and reduces the manual effort required from analysts.

Socrates utilized Splunk, Crowdstrike Falcon, and a Microsoft Windows WMI query information to distill the relevant information to the SOC analyst.
Socrates utilized Splunk, Crowdstrike Falcon, and a Microsoft Windows WMI query information to distill the relevant information to the human SOC analyst.

6. Summarizing Relevant Security Case Information

An important pillar of any operational practice is meticulous documentation of all actions taken, decisions, and achieved outcomes. 

LLMs have proven to be efficient at rephrasing and summarizing large amounts of natural language text. Torq Socrates leverages this capability to summarize the “conclusions” and desired next steps, and document them in the “case timeline.”

Torq Socrates summarized the findings and actions taken of the security event and automatically added them to Torq’s built-in ticket management system timeline.
Torq Socrates summarized the findings and actions taken of the security event and automatically added them to Torq’s built-in ticket management system timeline.

Reducing the Burden on Tier-1 SOC Analysts with AI

Here’s a summary of how Torq Socrates uses powerful LLMs to perform Tier-1 SOC analyst duties:

Human Tier-1 AnalystAI SOC Analyst
1. Tier-1 analysts work strictly according to defined runbooks1. LLMs effectively analyze natural language text to and break runbooks down into components.
2. Analysts match directives from the runbooks with tools at their disposal.2. LLMs are effective at finding similarities, in this case, between a “desired action” and an “available tool to execute this action.”
3. Analysts digest the output of different tools to choose the correct follow-up course of action.3. LLMs semantically analyze the output of different tools and match it to the runbook directives related to follow-up steps.
4. Analysts can bring in context from their training.4. LLMs can load related context from the myriad of documents scanned during the model’s training.
5. Analysts are required to document all actions taken and the reasoning behind the conclusions. 5. LLMs summarize the matches made and audit all the performed activities.
See how human security analysts can leverage Torq’s AI SOC Analyst, Socrates, to assist the triage of security alerts.

Torq Socrates is designed to handle up to 90% of Tier-1 triage actions by mapping the tasks and activities of human Tier-1 analysts to use cases leveraging LLMs. With Torq Socrates as their AI SOC Analyst, human security analysts remain in charge of processes and outcomes. The AI-powered system introduces dramatic new efficiencies and incident response accuracy, alleviating security analysts’ most critical challenges.

Get the latest on Torq’s AI capabilities >

Simplifying Non-Human Identity Security with Torq and Clutch Security

Contents

The rise of Non-Human Identities (NHIs) — think APIs, bots, service accounts, and machine identities — has expanded the attack surface in ways we’re only beginning to understand. NHIs now outnumber human identities in enterprise environments, often by a staggering ratio. While they streamline processes, enable scalability, and facilitate automation, these identities also present significant security risks.

The Growing Importance of Non-Human Identity Management & Security

Traditional approaches struggle to address the dynamic nature of NHIs, especially when it comes to:

  • Lifecycle governance: Stale or orphaned accounts are often left unchecked, creating vulnerabilities and increasing the risk of unauthorized access.
  • Contextual visibility: A lack of insight into what non-human identities are doing and why they are being used leaves security teams in the dark.
  • Zero Trust alignment: Continuously validating the usage of non-human identities is critical to enforcing least-privilege policies and maintaining security.

Security teams are left grappling with blind spots, operational inefficiencies, and increasing exposure to breaches. This is not just a challenge — it’s a mandate for change.

Enter Torq and Clutch Security: a partnership reshaping how security teams tackle the complexity of non-human identity management and security. 

Empowering SOC Teams with Seamless Zero Trust and Incident Response 

Clutch delivers visibility into NHI activity, offering deep insights into how these identities are created, used, and misused. Torq enhances this visibility with AI-driven Hyperautomation that transforms insights into action. When used together, SOCs are given the power to:

  1. Simplify complexity: Automatically ingest and contextualize Clutch’s NHI inventory into Torq workflows, enabling real-time decision making.
  2. Enhance Zero Trust: Dynamically enforce least-privilege policies for NHIs with automated remediation.
  3. Accelerate incident response: Detect NHI misuse through Clutch, then trigger Torq workflows to contain and remediate threats instantly.
  4. Future-proof security: Transition to ephemeral identities without operational friction, ensuring NHIs always align with your Zero Trust goals.

Real-World Implementation, From Detection to Resolution

Consider a common scenario: a temporary service account is created for a one-off task but inadvertently granted excessive permissions. Without the right tools, detecting and remediating the issue might take hours or even days. With Torq and Clutch, this process becomes seamless:

  1. Detection: Clutch identifies the account’s risky behavior in real time, flagging it for immediate review.
  2. Automation: Torq triggers a workflow to revoke the account’s excessive permissions, notify the SOC, and autonomously document the event for compliance.
  3. Prevention: Clutch provides recommendations for transitioning the account to an ephemeral identity, which Torq enforces automatically.

In short, this partnership enables security teams to do what they do best: defend their organizations with precision and confidence.

Ready to Transform Your Non-Human Identity Management and Security?

If you’re ready to bring Zero Trust to your NHIs and revolutionize your SOC, explore the Clutch-Torq integration today. Together, we’re setting a new standard for how enterprises secure their most overlooked — but most critical — identities.

New to the Torq Library: Analyze Files, Manage Identity, and More

Contents

This month, we’ve continued to expand Torq’s offerings. Discover the new workflow templates, intelligent integrations, and utility steps — all meticulously crafted to streamline security operations and amplify your team’s impact.

New Workflow Templates

Analyze Files with CrowdStrike Falcon Sandbox or Retrieve Cached Results
Put a stop to redundant file analyses. This template checks cached results for files analyzed in the last 24 hours, delivering instant insights when available. Need fresh data? The workflow submits the file for analysis, returning a detailed report featuring MITRE TTPs, related hashes, and more.

Synchronize Torq Runbooks with GitHub Automatically
Keep your runbooks effortlessly in sync. This automation updates your Torq runbooks whenever changes are committed to your GitHub repository. As a result, you can maintain up-to-date runbooks without lifting a finger.

Create Torq Cases from Proofpoint Clicks Permitted
Phishing attacks keep on coming, but this workflow has your back. It scans Proofpoint for “clicks permitted” events, enriches URLs with VirusTotal data, and automatically opens Torq cases.


Intelligent Automation Integrations

Your favorite tools are amplified with new Torq steps.

Seven new steps for the Abnormal integration provide deeper visibility into activities like employee logins and vendor actions:

  • Get Vendor Activity
  • Get Employee Login Details
  • Get Vendor Case Details
  • List Vendor Cases
  • Get Employee Analysis
  • Get Employee Information
  • Get Vendor Details

Gain more control with several new steps in the Elastic integration:

  • Upgrade Elastic Agent version
  • Unenroll Elastic Agent from Fleet
  • Get Agent Details by ID
  • Get Agent Details by Query

The new “Get a Pull Request” step for the GitHub integration simplifies code review workflows.

Manage identity and access with enhanced options for the Okta integration:

  • Reset User Password
  • Create Policy Rule
  • Get Policy
  • List Policies
  • Set Policy Rule Status
  • Revoke API Token
  • List API Tokens
  • List Policy Rules

New Utility Steps for Seamless Operations

Smarter tools for transforming data and processes.

Output Utils: Effortlessly transform your data and turn complex logs into actionable information with the simplicity and elegance you expect.

  • CLF to JSON: Seamlessly convert Common Log Format (CLF) logs into JSON, ready for integration with SIEMs, EDRs, XDRs, and beyond.
  • CEF to JSON: Easily transform Common Event Format (CEF) data into JSON, unlocking enriched analysis and compatibility across your tools.

Utils: Discover new possibilities with tools that bring clarity to network data.

  • DNS Resolution: Instantly resolve IP addresses into domain names, transforming raw data into meaningful insights. Connect malicious IPs to their domains for faster detection and response, and enrich your threat intelligence with actionable details.
  • CIDR Validation: Validate IPv4 addresses effortlessly, ensuring they fall within authorized ranges. Automate access controls and dynamic firewall rules and flag unexpected traffic outside defined ranges to protect your most sensitive systems — even blocking entire regions or countries with precision and ease.

Stay Ahead with Torq

This month’s updates are just scratching the surface. With new workflow templates, smarter steps, and expanded integrations, Torq continuously improves to equip your security team to get more done, faster and strategically.

Now, you can do even more with the top-tier tools you trust, such as SecurityScorecard, Autotask, BitSight, CrowdStrike, Jamf Protect, Jira Cloud, Palo Alto Networks Cortex XDR, SentinelOne, Sumo Logic, ThreatConnect, urlscan.io, and Wazuh.

Want to see it all? Dive into the Full Content Digest for details.

5 Secrets of a SOC Leader Turned Field CISO

Contents

Torq is thrilled to have Patrick Orzechowski (also known as “PO”) on board as our new Field CISO, bringing his expertise and years of experience as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. By way of introduction, below he shares his five top pieces of advice for SOC leaders facing today’s security challenges.

When I say I’ve been in your shoes as a SOC leader, I mean it! I’ve spent around 25 years in the trenches of cybersecurity and security operations centers (SOCs). I’ve dealt with alert fatigue, managed incidents where our team didn’t sleep for days, and searched far and wide for an automation solution that can truly help SOC teams collaborate better and gain deeper insights into incident data.

I started my journey in a SOC at RipTech, which was acquired by Symantec. From there, I worked in the U.S. defense and intelligence communities as both a Blue Teamer and a Red Teamer, building SOCs and leading forensics and incident response as well as doing penetration testing for the U.S. government. My focus then shifted towards data analytics in security operations, and I held roles at telecom giants like TW Telecom and Level 3. 

Ten years ago, I co-founded a Managed Detection and Response (MDR) service called Deepwatch, where I built the SOC infrastructure to run and handle over 250 customers — and which is where I first came across Torq Hyperautomation as the answer to our SOC scaling challenges.

Today, as Field CISO at Torq, I’m applying my experiences as a security practitioner to help organizations navigate the complexities of modern cybersecurity. You’ll find me speaking at security conferences and events around the world, sharing my expertise in Torq content, and leading independent research projects to explore topics like SOC efficiency and case management effectiveness. 

I have seen firsthand that the old ways of doing things in cybersecurity are going away and need to be left in the dust. I truly believe Torq’s AI-driven Hyperautomation is an unprecedented solution for helping SOC leaders stay ahead of this evolution and the main reason why I am so excited to be here now. To pay it forward, below are my 5 top pieces of advice for SOC leaders facing today’s challenges.

5 Keys to Modern SOC Success

1. Evolve for the Expanding Attack Surface

The combination of cloud hyperscalers (such as AWS, Azure, GCP, etc.), legacy apps, on premise requirements, remote work, and SaaS solutions present a very complex problem set for SOC leaders. As the attack surface expands and gets more complex, attackers will have the competitive advantage of targeting disparate systems that do not talk to each other.

Therefore, as vulnerabilities and entry points multiply and digital transformation and AI adoption accelerate, security teams will need systems that become the “glue” that ties together the systems themselves (i.e., automation), the data they produce (i.e., SIEM and search), and event-driven case management

The sheer volume of data gives attackers an advantage as SOCs struggle to sift through the noise. Torq HyperSOC can process and triage high volumes of events to close out false positives more quickly and prioritize responses more efficiently, helping reduce alert fatigue and and intelligently escalating high-priority cases to security analysts so that nothing slips through the cracks.

2. Embrace the AI Revolution, Strategically

We are in a security AI arms race. While AI is undoubtedly a game-changer, it’s a double-edged sword because attackers are also leveraging AI — and they’ll always have the advantage over a defense team that has to worry about compliance, privacy, and red tape. 

It’s daunting to know that attackers can scale everything they do through AI and automation — and that it’s throwing traditional cyber defense rules out the window. For example, every phishing training for the last 15 years told users to “look for grammar errors or weird punctuation”, but a phishing email written with AI can look like a perfectly written email from a legitimate person. 

Deflating the AI fear factor requires strategically automated defenses that can match attackers’ AI-powered speed and scale. With Torq’s AI-powered Hyperautomation, SOC teams can automate repetitive tasks to free up analysts for complex incidents and proactive threat hunting, and can accelerate incident response through auto-remediation and AI-enhanced investigations. Torq’s platform is fully battle-tested to handle the immense data output of the modern SOC’s cloud-native security stack.

It’s crucial to remember that AI is a tool, not a magic bullet. We still need skilled analysts to make informed decisions based on AI insights. Additionally, any AI solution deployed in the SOC should be able to explain how it arrived at its conclusions and provide citations to original forensic evidence so that you can understand and verify its logic.

Get the AI or Die manifesto for advice for deploying AI the right way as a SOC leader.

3. Focus on Security Operations Transformation

Security Operations rationalization is a critical component of any long-term strategy for CISOs and security leadership. While cybersecurity is now recognized as a key business risk, the era of the “blank check” from the C-suite and board to buy whatever technology you want is over. SOC leaders now have to justify your budget and show value and ROI.

Throwing money at the problem by purchasing the newest, shiniest security tools or simply increasing headcount won’t solve your problems anyway. Instead, focus on fundamentally transforming your security operations by investing in automation for routine tasks, streamlining processes, and consolidating data insights from across your stack so you can eliminate analyst burnout and empower your existing team.

4. Overcome Security Data Assumptions

The classic notion of the SOC triad has proven to fail against threat actors who have time and resources. Legacy SIEM, SOAR, EDR, and network controls are not enough to operationalize and automate detection and prevention in an era where attackers are getting faster and faster thanks to AI.

The idea of a singular SIEM to gather, correlate, and alert on all data across the enterprise needs to go extinct. As we move to the new arena of SOC automation, we need scalable, flexible systems that can interconnect not just traditional security stacks but all data sources, including traditional IT systems, HR, Accounting, Sales, and Finance.

5. Don’t Forget the Fundamentals

There’s a lot out there to distract SOC leaders, but maintaining strong cyber hygiene remains crucial. Following basic security practices like zero trust or the NIST cybersecurity framework can never fall by the wayside. 

Additionally, your SOC team’s wellbeing remains central to your security wellbeing. Many SOC challenges are people challenges. Sleep deprivation during major incidents, challenges in effective collaboration, and an inability to access data insights from across different solutions, all add up to frustrated, tired, and checked out analysts — which means a weaker defense. 

When you automate menial, routine tasks and auto-remediate the majority of low-level alerts, you free up analysts to focus on more engaging and rewarding work while also cutting down on alert fatigue. I truly believe all SOCs should be measuring “analyst happiness” as a KPI that reflects the health of security operations.

A Real-World SOC Transformation: Torq + Deepwatch

I know first-hand what happens when a solution like Torq comes in and changes not just technology, but also SOC processes to bring about a more strategic approach.

At Deepwatch, our first foray into automation was with legacy SOAR — but hosting 250 SOAR instances became very expensive, very fast. The platform we were using proved to be costly to scale and extracting critical KPIs like mean time to response (MTTR) was difficult. This hindered our ability to demonstrate value to both internal stakeholders and external customers.

To address these limitations, Deepwatch embarked on a transformative journey with Torq Hyperautomation. The stress test we ran on the Torq platform during the POC was my “aha” moment — and it only impressed me more from there. The Torq platform’s ability to handle high-volume workloads, the simplicity of Torq’s integrations, and the speed and flexibility at which the team could build new workflows accelerated Deepwatch’s analysis, triage, validation, and response. 

Read the full Deepwatch case study here >

Moving Forward, Faster Than Ever

What worked in the SOC a few years ago is often obsolete today, making the ability to adapt rapidly key to survival in the modern security landscape. But this gets harder every day as attackers’ arsenal of technology and tactics gets more complex, sophisticated, and lethal. Somehow, SOC leaders have to keep evolving their tech, people, and processes to combat these evolving threats. It’s not easy, as I know first-hand.

At Torq, we’re revolutionizing the ability of the SOC to quickly move past the challenges that once left SOC leaders in a tar pit of despair. 

Want to chat about the practicalities of transforming your SOC? Let’s talk. 

Building Powerful CrowdStrike Automations: Insights from Fal.Con 2024

Contents

“If I take Torq out, I lose three people.”

This sentiment expressed by Fiverr’s VP of Business Technologies perfectly reflected the energy at the Fal.Con 2024 Torq booth and struck a chord with security teams using CrowdStrike’s powerful tools. Detection isn’t the problem — CrowdStrike excels at that. The challenge lies in automating what happens next.

A Problem-First Approach to Security Automation

Security teams quickly discovered how to reimagine CrowdStrike operations from manual to automated, from reactive to proactive. The challenge was universal — while CrowdStrike excels at detection, teams struggle to scale their response processes. 

Torq’s problem-first approach resonated deeply with the crowd at Fal.Con. By focusing on solving real security challenges through intelligent automation and AI rather than adding more tools to the stack, Torq is trusted by organizations across the globe to complete 5.2 million Torq-CrowdStrike automation actions annually.

CrowdStrike Automation Templates to Tailored Solutions

The Torq platform’s featured EDR workflow (NIST-800-535-PM-16) demonstrates this philosophy. It starts with a foundational five-step process that automatically:

  1. Receives CrowdStrike detection events
  2. Decodes detection IDs and pulls detailed information
  3. Loops through resources and behaviors found in the detection
  4. Checks SHA256 signatures with VirusTotal
  5. Updates block lists across connected security tools

With Torq, security teams can use pre-built CrowdStrike automation templates as a launch pad and modify them as needed or use natural language prompts in AI Workflow Builder for limitless possibilities. Need to add custom enrichment sources? Want to implement team-specific notification procedures? Looking to integrate additional threat intelligence platforms? Simply describe what you need in natural language, and let Torq’s AI help turn your requirements into sophisticated automation in seconds.

Cross-Platform Intelligence

For organizations using Splunk alongside CrowdStrike, we showcased how teams implement seamless correlation and then leverage Socrates, the AI SOC Analyst. When CrowdStrike detections appear in Splunk, the powerful combination of Hyperautomation, Socrates, and AI can automatically help create and enrich cases, take action, and maintain detailed documentation throughout the investigation lifecycle.

Furthermore, two foundational examples handled IOC management — one for individual detections and another for incidents. Each validates files with threat intelligence and updates global block lists, ensuring consistent response across your security infrastructure.

Optimized Security Operations

CrowdStrike integration capabilities extended further with Hyperautomated use cases include:

Beyond Basic Automation

What sets these integrations apart is Torq Socrates’ ability to maintain context across the entire investigation lifecycle. Every action by the AI SOC Analyst, from initial detection to final resolution, is documented with clear reasoning and next steps. This transforms shift handovers from potential security gaps into seamless transitions.

When teams customize automation in Torq, they don’t need to start from scratch or learn complex coding. AI Workflow Builder understands the context of security operations and can transform natural language instructions into sophisticated workflows. Want to add conditional logic based on threat severity? Need to implement custom enrichment procedures? Simply describe what you need in natural language.

The Power of Official Partnership

Technical discussions at Fal.Con confirmed what security teams already know — CrowdStrike provides industry-leading detection capabilities, but the real power comes from intelligent automation. Starting with CrowdStrike automation templates and expanding through AI-powered customization, teams will:

  • Revamp CrowdStrike alerts into automated actions
  • Ensure consistent response procedures across global teams
  • Maintain comprehensive documentation without manual effort
  • Scale CrowdStrike operations without adding headcount

Looking Forward

With 325+ million workflows executed annually, Torq’s integrations demonstrate how teams can maximize their CrowdStrike investments through intelligent automation. The possibilities are limitless, whether starting with pre-built templates, creating new workflows through custom builds, or leveraging natural language instructions.

Discover how quickly you can accelerate from reactive to proactive, manual to automated, and overwhelmed to efficient. Schedule a demo or if you’re already a Torq user, explore the CrowdStrike template library.

Planning with AI: Minimizing Uncertainty, Maximizing Trust

Contents

Gal Peretz, Head of AI & Data at Torq

Gal Peretz is Head of AI & Data at Torq. Gal accelerates Torq’s AI and data initiatives, applying his deep learning and natural language processing expertise to advance AI-powered security automation. He also co-hosts the LangTalks podcast, which discusses the latest AI and LLM technologies.

To stay ahead of today’s threats, you must do more than keep pace — you need to equip your team with tools that enable smarter, faster responses. For SOC analysts, runbooks in case management systems are essential guides for handling security alerts step-by-step. The prospect of automating these runbooks with AI is enticing, promising to streamline daily operations and free up time for more critical tasks.

However, some are rightfully skeptical. They worry that AI automation could introduce unexpected issues without careful planning and collaboration, potentially hindering productivity and increasing risk. This blog explores how collaborating with AI during planning and setting AI guardrails can enhance predictability, transparency, and trust in AI automation.

The Importance of Runbooks in Security Operations

Runbooks are structured, step-by-step guides enabling SOC analysts to respond to security incidents consistently and accurately. They are particularly crucial for Tier 1 analysts, who often serve as the first line of defense against a high volume of alerts. 

These runbooks provide clear instructions for the following:

  • Triaging alerts
  • Investigating potential threats
  • Determining when to escalate issues

By standardizing responses, runbooks reduce human error and ensure efficient handling of all incidents, even in high-pressure situations. Automating runbooks with AI presents an appealing option for scaling operations, accelerating repetitive tasks, and allowing analysts to focus on more complex, high-stakes cases.

The Need for AI Guardrails in Runbook Automation

While automating runbooks with AI is a game-changer, granting AI too much freedom can quickly backfire. Most runbooks are designed with human readers in mind, presenting step-by-step guides that make sense to analysts but can be confusing for AI. 

When left to interpret these text-based instructions independently, AI might:

  • Misinterpret steps
  • Make unexpected decisions
  • Produce unintended results

AI can become unpredictable without a structured plan and human alignment, risking accuracy and eroding your team’s trust in automation. A collaborative planning phase to ensure AI guardrails is crucial as it provides SOC analysts visibility into how the AI “interprets” the runbook and plans to automate it. This transparency allows analysts to refine the AI’s approach, ensuring the plan aligns with real-world needs before execution begins.

Collaborative Planning: Aligning AI and Analysts

To understand the value of Torq’s approach to runbook automation, let’s consider a common SOC runbook for investigating phishing reports. Such runbooks guide analysts through tasks like checking attachments, analyzing email headers, and escalating incidents when certain conditions are met.

Example SOC investigation runbook for User Phishing Reports
Example SOC investigation runbook for User Phishing Reports

Automating these tasks with AI is more complex than simply running through the steps. Many runbooks are written for human understanding and involve actions that may be ambiguous or beyond direct AI capabilities. Torq’s plan-and-execute approach addresses this challenge by separating the process into distinct planning and execution phases, giving analysts more control and visibility over the AI’s actions.

1. Planning Phase

In this phase, the AI:

  1. Reads through the runbook
  2. Converts instructions into a structured, transparent plan
  3. Break down each instruction into clear, atomic steps
  4. Identifies steps it can automate and those requiring human intervention
  5. Highlights gaps where it lacks necessary tools or access

This transparency allows SOC analysts to modify the plan, choosing where the AI should pause for guidance or where additional human-defined workflows are needed. In scenarios where full automation isn’t feasible, such as in highly secure or restricted environments, this collaborative planning ensures that the AI aligns closely with human intent and avoids unnecessary errors.

2. Execution Phase

Once the analyst reviews and approves the plan, execution follows this carefully vetted blueprint. 

This approach:

  • Strips ambiguity and indeterminism from the execution
  • Provides transparency and reliability
  • Fosters trust in the automation process

Analysts can be confident that AI will follow the exact plan, making the automation more efficient and dependable without sacrificing control or accuracy.

To reinforce the concept further, let’s consider how Socrates, our AI SOC analyst, would function without the ability to add tags while focusing on his communication skills and resistance to AI hallucination.

Socrates, even without the capability to add tags, would still demonstrate its effectiveness in several ways:

Clear communication of limitations: When faced with a task it cannot perform, such as adding a tag, Socrates would explicitly state its limitations. For example, it might say, “I’m unable to add the tag ‘Malicious IOC’ as I don’t have that capability. This step requires human intervention.”

Requesting user input: Socrates pauses the process and asks for user input when the necessary tools or permissions are lacking. This demonstrates its ability to recognize boundaries and seek assistance when needed.

Proceeding with available tools: For steps where Socrates has the required capabilities, it would continue to execute them efficiently. These actions would be marked as completed or “green” in the process.

Detailed explanations: Throughout its analysis and decision-making process, Socrates provides clear, thorough explanations of his reasoning, helping analysts understand its thought process even when it couldn’t perform specific actions.

Suggesting alternatives: When unable to perform a specific action, Socrates might suggest alternative approaches or provide information that could help the human analyst complete the task manually.

Focusing on these aspects can highlight Socrates’ ability to communicate effectively, recognize its own limitations, and resist AI hallucination by not claiming capabilities it doesn’t have. This approach emphasizes AI’s role as a collaborative tool that enhances human decision-making in the SOC rather than attempting to replace human judgment entirely. See what this looks like below:

Example of an email analysis workflow generated by the Torq AI SOC Analyst that outlines 11 automated steps for security checks, with green checkmarks indicating executable actions except for two manual breaks serving as AI guardrails by requiring human intervention for tagging “Malicious IOC” and “VIP” cases.
Example of an email analysis workflow generated by the Torq AI SOC Analyst that outlines 11 automated steps for security checks, with two manual breaks that serve as AI guardrails.

Strengthening Security Through Transparent AI Collaboration

Trust and transparency are fundamental to building an effective security strategy in today’s rapidly evolving threat landscape. Torq’s AI capabilities prioritize collaboration and clarity, transforming how SOC teams handle automation. By structuring automation as a two-phase process — planning and execution — Torq ensures that AI usage is efficient, bounded by AI guardrails, and aligned with human oversight and intent.

This collaborative approach allows human SOC analysts to:

  • Maintain control over automated processes
  • Reduce uncertainty in AI actions
  • Trust in the predictability and reliability of AI-driven tasks

Fostering a security environment where AI and human expertise work together can strengthen organizations’ SOC capabilities and enhance overall security posture. See Torq’s AI in action — schedule a demo.

Learn more about building trust in AI and how structured, evidence-backed summaries generated by AI enable seamless SOC shift transfers.

Take Control with Torq’s AI Data Transformation

Contents

Data interoperability is the backbone of building reliable and efficient hyperautomated workflows. However, manipulating and formatting massive amounts of data from various sources — especially in complex JSON files — can feel overwhelming and consume significant time and resources, particularly for those still gaining technical expertise. Teams often lack or have maxed out dedicated resources to wrangle this data.

Today, we’re introducing AI Data Transformation, a powerful AI-accelerated operator that simplifies complex data transformation. It provides the testability, flexibility, and control required to manage enterprise-level workflows without writing a single line of code.

Why Data Transformation is Crucial

In hyperautomated workflows, seamless data flow between steps is crucial for optimal performance. AI Data Transformation achieves this with maximum efficiency by intelligently manipulating data as it flows to downstream steps. This powerful capability enables smooth operations by efficiently handling critical tasks such as attribute mapping, filtering, conditional statements, and aggregation functions — proactively addressing data compatibility between steps. In short, Data Transformation keeps workflows running at peak efficiency.

How AI Data Transformation Helps Security Teams

Torq’s AI translates natural language prompts into JQ commands, simplifying and democratizing JSON transformations. For those savvy in JQ, there’s full flexibility in modifying individual instructions and the generated code. Torq’s approach stands out for:

  • Customizability: Edit or rewrite any command to suit your needs.
  • Testability and Reproducibility: Test transformations and validate results for precise control.
  • Flexibility: Easily tweak transformations without disrupting your workflow.
  • Visibility: See prompts, code, and results at every step — zero guesswork.

While other solutions leave you in the dark, using monolithic parsing that makes it challenging to edit or troubleshoot, Torq keeps you in control through micro-transformations. Every transformation in Torq is testable, customizable, and modified with just a click, ensuring your automation runs precisely as intended.

Gif showing AI Data Transformation in action

Get Started

Transforming data is simple:

  1. Drag the transform operator into your workflow.
  2. Input the contextual JSON data you intend to transform, then click define transformation.
  3. Enter your prompt in natural language (e.g., “extract vulnerabilities”).
  4. Review the AI-generated JQ code and the output. Validate and edit if needed by fine-tuning with dynamic code generation or direct code editing.
  5. Transform your data with complete visibility and control.
  6. Save your work and reuse transformations as custom plans in the future.

Example Prompts

Need ideas? Here are a few natural language prompts and the associated JQ commands the Data Transformation operator could generate:

Natural Language PromptAI Translated JQ CommandSecurity Impact
“Extract all high severity vulnerabilities”.vulnerabilities[] | select(.severity == “high”)Quickly prioritize critical security threats
“Group alerts by source IP”group_by(.source_ip)Identify potential attack patterns or compromised assets
“Calculate the average CVSS score”[.[].cvss_score] | add / lengthAssess the overall vulnerability landscape

Read more about AI Data Transformation in Torq’s documentation or schedule a demo to see how it works.

What’s New With Torq: November 2024

Contents

As we close out 2024, Torq is rolling out powerful new updates to help security teams start the new year with even greater efficiency and impact. These recent enhancements are designed to streamline operations, boost productivity, and support seamless collaboration.

Here’s a look at the latest features set to transform your security operations.

AI Workflow Builder: Build Workflows in Seconds

Explore Torq AI Workflow Builder

AI Workflow Builder enables any security team to quickly create powerful, automated workflows, no coding required. Just describe your workflow in natural language, and AI will generate a fully functional, customizable workflow in seconds. Choose from over 4,000 pre-built actions and 300 integrations to tailor workflows to your security needs, freeing your team to focus on strategy, not setup.

AI Workflow Builder goes beyond the template library by offering fast, flexible automation that meets your organization’s unique security requirements without extensive manual configuration.

Case Management: Accelerating Analysts and Team Leads

We’ve significantly upgraded Torq’s Case Management capabilities to provide more control and flexibility in handling security incidents.

You’ll find the following enhancements:

  • Create Cases from JSON Objects: This new step offers greater flexibility than the standard Create a Case step, allowing you to define additional attributes like custom fields, custom SLA timers, quick actions, and runbooks within a JSON object.
  • Configure Torq HyperSOC Case Settings: Adjust the auto-refresh interval for the Cases page and enable the option to mark notes and comments as public.
  • Granular Permission Controls: Create custom analyst roles without deletion permissions, ensuring only authorized team members can delete cases.
  • Case Note Improvements: For your subsequent work of art, we’ve increased the character limit to 65,000, added easy image resizing with aspect ratio preservation, and added an option to view full-size images. 
  • Bulk Update Cases’ Custom Fields: Use the Input mode dropdown to select whether to update a single field or multiple fields. For multiple fields, provide the key-value pairs in JSON format.

These new additions enable teams to handle incidents faster and more efficiently, from routine alerts to complex, large-scale security events. On to the next!

Interact: Bridge the Gap Between Security and Business

Torq Interact has become the central hub for cross-organizational security collaboration and automation. Now, you can create a portal interface for your internal organization’s end users. This seamless interface enables users to interact with and execute Torq Interact workflows, enhancing operational efficiency through cross-organizational process execution for streamlined, automated actions and real-time data access.

Additional Enhancements

Watch this space for more updates as Torq continues to transform security automation.

GigaOm Declares Torq the Autonomous SOC Leader, Dramatically Outpacing Legacy Vendors

Contents

GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. GigaOm applies proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation, empowering enterprises to successfully compete in a changing business atmosphere.

GigaOm recognizes Torq as the only Hyperautomation vendor capable of delivering true autonomy to the SOC without vendor lock-in.

For years, security teams have grappled with relentless alert fatigue and burnout, exacerbated by disjointed security tools like SIEMs and SOARs. Legacy security vendors have tried to address this by cramming disconnected solutions into “all-encompassing” SecOps platforms, and many have now falsely tacked on “autonomous SOC” and “Hyperautomation” claims to their products. 

Security teams can’t afford to invest in another expensive, hard-to-maintain platform that doesn’t deliver on its promise of autonomy and automation — so where should they turn?

GigaOm’s newly-released Autonomous SOC Radar Report confirms: Torq Hyperautomation is the clear frontrunner in realizing the autonomous SOC vision and delivering the autonomy SOC teams have long been promised.

What is an Autonomous Security Operations Center (SOC)?

While legacy vendors now claim to offer SOC autonomy, true autonomy isn’t achieved by locking users into rigid, all-in-one platforms. These legacy solutions contributed to the very burnout problem that led to a talent shortage of 4 million security professionals. Their proposed solution? Dump more cash into the same outdated platforms.

A genuinely autonomous SOC leverages advanced automation and AI to handle manual and routine security tasks, accelerating response times, enhancing threat management, and ultimately safeguarding the well-being of SOC analysts. The most efficient path to this goal involves breaking down silos between security tools, enabling seamless communication and streamlined security operations across a modern, best-of-breed tech stack.

Simply put, it isn’t possible to achieve an autonomous SOC without automation. Torq is the only vendor solely dedicated to empowering security teams to automate more, faster.

Torq is the only vendor positioned in the Innovation/Feature Play quadrant, as it is the only non-SIEM solution featured in the report, which also explains its differentiated position.

– Andrew Green, Research Analyst for Networking & Security, GigaOm

Torq is the Only Hyperautomation Vendor Listed in GigaOm’s Autonomous SOC Report

Hyperautomation is the next evolution in scalable autonomous security operations. By definition, Hyperautomation requires enterprise-grade scalability, availability, and connectivity — essentially solving the challenges caused by these large legacy vendors. While the idea of the autonomous SOC is centered around the ability to automate everything, similarly, Hyperautomation is built on a foundational ability to integrate with anything. 

Torq’s recognition as the only Hyperautomation vendor in GigaOm’s Autonomous SOC Radar report underscores that unique position in the security operations landscape. 

Frameworks coming into law, such as DORA in the EU and CCSPA in Canada, spotlight the need for vendor diversity to reduce single points of failure and enable redundancy. Torq is the only autonomous SOC vendor enabling organizations to seamlessly integrate best-of-breed solutions — free from vendor lock-in.

Torq combines this vendor-agnostic approach with advanced technologies like purpose-built AI and Hyperautomation, engineered to create intelligent end-to-end solutions for security processes.

And GigaOm isn’t alone in recognizing Torq as the leader of autonomous SOC — industry analysts across the board are taking note.

“Torq is the first solution we’ve seen that effectively enables SOC professionals to mitigate issues including alert fatigue, false positives, staff burnout, and attrition. We’re impressed by how its AI augmentation capabilities empower these staff members to be much more proactive about fortifying the security perimeter.”

– Chris Kissel, Vice President, Security & Trust Products, IDC Research

By choosing Torq, organizations are embracing the future of security operations, as recognized by industry experts — with an approach that’s creating a more agile, effective, and strategic security operation.

Leveraging AI to Drive SOC Autonomy 

Torq integrates purpose-built AI capabilities such as generative AI and large language models (LLMs) to evolve SOC operations fundamentally and deliver on the promise of an autonomous SOC. This enables security teams to focus their efforts on proactive security measures, resulting in greater efficiency and accuracy in decision-making processes.

“80% of our security alerts are assisted and accelerated by Torq workflows. To analyze, enrich, and also autonomously respond to alerts is a paradigm shift that brings unprecedented efficiencies.″

– Joshua Blackwater, Deputy CISO, SentinelOne

Socrates, Torq’s AI SOC Analyst, exemplifies this by automating 90% of Tier-1 tasks through AI-powered triage and investigation. Socrates accelerates analyst response times by summarizing case data and providing immediate insights. It also automates 95% of security cases from investigation to response, intelligently assigning critical cases to human analysts when necessary. This augmentation empowers analysts at all levels to achieve machine-speed response times while supporting ongoing learning and skills development. 

The Sole Winner: Torq’s Unique Position

GigaOm’s report highlights the critical importance of AI-powered autonomous SOCs. As the sole Hyperautomation solution free from platform constraints, Torq provides the agility and innovation necessary for modernizing security operations in an increasingly demanding environment. 

For organizations seeking to enhance their SOC capabilities without sacrificing flexibility or risking vendor lock-in, Torq offers the only comprehensive solution designed to meet these challenges head-on. Schedule a demo to see it in action.

Augment SOC Analysts with AI: 3 Key Use Cases

Contents

How AI in SOC operations frees your analysts from repetitive tasks 

Despite the rapid evolution of security technologies, many SOCs are still weighed down by manual processes and outdated tools. Analysts are burdened with repetitive tasks, inefficient workflows, and disjointed incident response mechanisms. This broken system is leaving SOCs reacting to incidents instead of preventing them.

There’s a better way forward. With Torq’s AI SOC analyst, Socrates, security teams are redefining how they operate — moving from reactive to proactive and supporting efficiency at every level. Socrates enables security teams to automate mundane, repetitive tasks and take contextual action faster, moving towards an autonomous SOC and freeing analysts to focus on higher-order work. 

Let’s explore how Socrates revolutionizes SOCs by addressing three key use cases. 

1. Assigning Cases to Socrates

The average SOC is inundated with alerts, making it challenging to identify and prioritize critical cases. Manual case assignments consume valuable time and often result in misassignments that delay threat response. 

With Socrates, manual case assignment bottlenecks become a thing of the past. Socrates automatically triages incoming alerts, determines their priority level, and assigns them to the appropriate team or individual in real time. This lets analysts immediately focus on resolving high-priority cases without sifting through data or deciding who should handle what. The result is improved speed and accuracy in incident response, reducing time-to-remediation and easing the burden on your SOC team.

2. Augmenting Human-in-the-Loop Remediation

Despite advancements in automated workflows, there are times when human input is essential for nuanced decision-making. Many SOCs struggle to balance automation with human expertise effectively. Legacy models often fail to integrate humans seamlessly into the process, leading to efficiency gaps. 

Socrates streamlines human-in-the-loop workflows by notifying analysts when their input is needed. Analysts can quickly step in to guide the remediation process — whether it’s approving a firewall block, escalating an alert, or providing context for an investigation. This real-time collaboration between automation and human expertise reduces the mental load on analysts while ensuring critical incidents receive timely attention.

3. Automating Case Documentation and Admin Work

SOC analysts often dread documentation — as it takes time away from real security work. Case notes, incident logs, and reports are necessary for compliance and auditing, but they can be time consuming. 

Socrates alleviates the burden by automatically documenting cases as they evolve. From initial assignment to final remediation, Socrates records each step and updates relevant fields in real-time. This reduces the need for manual input, prevents human error, and ensures consistent documentation across the board. By handling admin work in the background, Socrates frees analysts to focus more on proactive security efforts.

The Future of SOC Workflows

The pain of relying on legacy SOAR tools and manual processes is over. By integrating Hyperautomation with AI through Socrates, SOC teams unlock new levels of efficiency, accuracy, and strategic value. Socrates modernizes your SOC from automatic case assignment and streamlined human-in-the-loop workflows to hands-free documentation.

Experience the power of Socrates — the AI SOC analyst who keeps pace with today’s most intense challenges. See Socrates in action — schedule a demo.