Accelerating Torq’s Vision: Announcing Our Series C Funding Round

I’m excited to share some significant news that marks a pivotal milestone in Torq’s journey. We’ve successfully closed our Series C funding round, securing a $70M investment to propel our mission of revolutionizing SecOps through the Generative AI-based Torq Hyperautomation Platform and cutting-edge Torq HyperSOC solution.

A Journey Fueled by Innovation

When we launched Torq three years ago, our vision was clear: To transform SOC automation and operation teams with solutions that not only defend against sophisticated threats, but also streamline and hyperautomate SecOps at the largest global enterprises. During the past three years, our dedicated team has worked tirelessly to build the Torq Hyperautomation Platform which seamlessly integrates with any existing infrastructure and security tool, providing the unparalleled ability to instantly and precisely remediate security events, and orchestrate complex security processes at scale. 

This funding round is more than just a financial boost. It reflects the confidence of our investors and the strength of our technology. We’re thrilled to continue pushing the boundaries of what’s possible in cybersecurity, particularly with a focus on Hyperautomation.

Doubling Down on Generative AI

A key highlight of this funding round is our commitment to double down on Generative AI. We recognize that Generative AI has transformative potential in enhancing cybersecurity. By integrating these advanced technologies into our platform, we aim to provide even more sophisticated threat detection, response automation, and predictive capabilities.

Generative AI will empower our systems to analyze vast amounts of data and generate actionable insights in real-time. This will not only improve the accuracy and efficiency of SecOps, but also enable our customers to stay ahead of adversaries with cutting-edge defensive measures.

What Series C Means for Us and Our Customers

Series C will accelerate our growth in several key areas:

  1. Innovation and R&D: We’ll invest heavily in R&D to enhance our platform’s capabilities, ensuring we stay ahead of emerging threats and provide our customers with state-of-the-art solutions.
  2. Expansion of Our Talent Pool: To drive our vision forward, we need the best minds in the industry. This funding will allow us to expand our team and bring in experts who are as passionate about cybersecurity and Hyperautomation as we are.
  3. Market Penetration and Customer Growth: With this capital, we’ll accelerate our go-to-market strategy and scale our operations to reach more businesses and organizations globally. Our commitment to innovation has already attracted a rapidly growing customer base, and we are excited to extend our reach even further. New and existing customers will benefit from enhanced features, faster deployment, and robust security measures designed to meet their evolving needs.
  4. Customer Success and Support: We’re dedicated to providing exceptional products and ensuring our customers have the support they need to maximize their investment in our technology. This funding will help us enhance our customer success programs and provide top-tier support to our growing client base.

Value for Our Growing Customer Base

Our expanding customer base is clear validation of our approach and the value we deliver. For our existing customers, this funding means we can continue to enhance and refine our platform, offering sophisticated tools and capabilities to keep their operations secure. For new customers, it represents an opportunity to leverage our state-of-the-art technology from a company committed to pushing the boundaries of cybersecurity and automation.

A Thank You to Our Partners and Team

This achievement would not have been possible without the unwavering support of our investors, partners, and incredible employees. Your collective belief in our vision and dedication to our mission have been instrumental in getting us to where we are today.

Looking Ahead

As we move forward, our commitment to innovation and excellence remains steadfast. We’re excited about the possibilities ahead and are more determined than ever to lead the way in cybersecurity and Hyperautomation. Together, we will continue to build a safer, more resilient digital world.

Thank you for your continued support and trust in us. Here’s to the next chapter of our journey!

The Evolution of Automation and AI for Security Operations

Contents

In an era where cyber threats are constantly evolving and security teams are overwhelmed by an ever-expanding flood of alerts, tech sprawl, and an ongoing talent shortage, the modernization of the SOC is no longer optional — it’s imperative. 

According to Gartner, automation and artificial intelligence are the keys to unlocking new levels of efficiency, accuracy, and resilience in the fight against cyber threats. Learn how SecOps automation has evolved way (way) past SOAR and how SOC teams are putting AI into action to elevate their teams and achieve machine-speed response times.

The Security Operations Automation Journey

  1. Legacy SOAR came – and went. The security operations automation journey started with Security Orchestration Automation and Response (SOAR) as the primary automation and orchestration option for SecOps teams. However, as the cybersecurity landscape grew more complex and the volume of threats increased, SOAR’s limitations became glaringly evident. Gartner even went as far as to say “SOAR is Obsolete” in their latest ITSM Hype Cycle (2024), placing SOAR at the bottom of their “Trough of Disillusionment”. 
  1. Hyperautomation unleashed limitless potential. Unlike SOAR, Hyperautomation offered unlimited security integrations, simple automations, and cloud-native scalability. The incorporation of Case Management into a Hyperautomation engine helped mitigate alert fatigue by enabling automated remediation of false positives and other low-risk threats, while more intelligently prioritizing comprehensive security cases in a meaningful way. 
  1. AI sped up the SOC. The next evolution of security automation involved leveraging Artificial Intelligence to augment human expertise, enabling analysts to achieve machine-speed detection and response.

The modern SOC has arrived. As Gartner highlighted, to overcome the existential challenges that continue to plague SOC teams, security operations must continue to adapt. This brings us to the future of SecOps, where the gold standard for the modern SOC is a purpose-built combination of Hyperautomation and AI to achieve the autonomous SOC.

Benefits of Adopting Automation and AI for Security Operations 

Adopting automation and AI for security operations is not about eliminating the need for SOC analysts — it’s about alleviating the pressure on SOC teams, helping to avoid burnout and reduce the 4 million+ talent shortage gap that exists in the cybersecurity industry today. 

“By 2028, AI in threat detection and IR will rise from 5% to 70%, to primarily augment, not replace staff.” 

Source: Gartner

As Gartner highlights, while the growth of AI continues to expand, its primary aim should be to augment the existing staff operating the SOC, not replace them entirely. This is good to keep in mind, as many organizations are hesitant to fully entrust AI with their security operations. However, with the rise of AI used in targeted attack campaigns, most organizations do recognize that it is near impossible for humans alone to keep pace with today’s quantity and complexity of threats.

When implementing AI for security operations, the most successful benchmarks to strive for are: 

  • Eliminating alert fatigue
  • Improving SOC analyst morale
  • Getting time back to focus on critical threats
  • Mitigating threats more quickly and efficiently
  • Increasing the accuracy of results

The benefits of automation and AI for security operations are not in removing human decision making altogether, but rather to uplevel the skills of the most junior SOC analysts, while preventing the most experienced analysts from burning out of their role. And that is exactly what Torq Socrates was built for. 

The AI SOC Analyst

Torq Socrates is an AI SOC Analyst for autonomous contextual alert triage, incident investigation, and response. Socrates elevates the performance of tier-1 analysts and augments end-to-end investigations of alerts. Socrates is only able to leverage the tools and access given to it through building automated workflows, so SOC teams always remain in control of what is possible with AI while significantly improving their operational efficiency.

There are 2 ways SOC teams use Socrates: 

  1. Assigning cases for auto-remediation
  2. Remediating cases faster with AI augmentation 

First, SOC teams can assign specific cases to Socrates for auto-remediation without requiring any human intervention. 

In traditional analyst remediation, when a case is assigned, the analyst typically consults a runbook to guide them through the response required to contain the specific event (or events) that appear within the case. From start to finish — the triage, investigation, and remediation of a single case can take a human analyst 30 minutes or more, depending on the experience level of the analyst.

Socrates follows the same process, but at machine speed. Socrates analyzes SOC-defined runbooks written in natural language and follows explicit instructions, resulting in complete auto-remediation of 95% of cases in mere minutes. 

For cases that increase in severity based on Socrates’ investigation, or as new case data is added raising the threat to a critical level, SOC teams can build off-ramps into each runbook that tell Socrates when to escalate cases to a human analyst for intervention.

Which brings us to the second use case, leveraging Socrates to remediate cases that do require human decision making — faster. Analysts who are assigned critical cases for human-in-the-loop remediation can use natural language to chat with Socrates, asking it to: 

  • Summarize case observables, attachments, historical findings, associated indicators of compromise (IOCs), or current case status.
  • Enrich cases by requesting further triage, investigation, and additional threat intelligence.
  • Trigger complex remediation workflows through Torq’s Hyperautomation platform.  

With Socrates, even a brand new analyst who hasn’t been trained on how to leverage the full functionality of every security solution in their stack can easily ask Socrates to quarantine devices, isolate hosts, or kick off a password reset — without the risk of human error. Socrates’ capabilities are as limitless as the Hyperautomation engine it’s built on, but bounded by the automation workflows that SOC teams opt to build into Socrates’ toolbox. 

In its simplest form, Socrates was built to do what Torq has set out to do from the very beginning: Hyperautomate SecOps. Socrates automates repetitive tasks and reduces Tier-1 triage and investigation by 90% — helping humans respond to threats faster.

Embracing Hyperautomation and AI for Security Operations 

In an era where cyber threats are constantly evolving, the modernization of the SOC is no longer optional — it’s imperative. The inclusion of AI for security operations — like Torq Socrates — marks a pivotal shift in how SOC teams can combat alert fatigue, tech sprawl, and talent shortage. 

By integrating Hyperautomation and AI, organizations regain significant amounts of time, allowing SOC analysts to focus on more strategic tasks while maintaining control over critical security operations. The future of security operations lies in this harmonious blend of human expertise and intelligent automation, setting a new standard for operational efficiency in security operations.

Ready to embrace Hyperautomation and AI for security operations? Get a demo today.

Build Security Workflows in Seconds with AI Workflow Builder

In today’s fast-moving threat landscape, Hyperautomation is essential. But building workflows from scratch? That’s time you don’t have. That’s why we started with a library of pre-built templates, helping teams quickly configure security automation workflows. Templates made automation more accessible. Now, we’re taking the next step in that evolution and introducing Torq’s AI Workflow Builder.

By harnessing the power of AI, we’re going beyond templates. Now, in addition to the library of pre-built workflows, you can simply describe what you need, and Torq will generate a workflow tailored for you in seconds. No code, no limits — just fast, flexible automation that meets your unique security requirements.

Evolving from Templates to AI-Powered Workflows

The days of spending hours manually building workflow from scratch are over. Security teams need agility, but building automation workflows step-by-step slows you down. Templates provide a fast way to get started by selecting from pre-configured workflows. However, we recognize that templates have limitations and can sometimes call for resources the team doesn’t have. They require adaptation and configuration and sometimes fail to fully capture the specific needs of each security team.

You already know the events and actions for your team —  let AI Workflow Builder take care of the rest. AI Workflow Builder is a natural language agent that leverages Torq’s 4,000+ out-of-the-box actions and 300+ integrations and enables you to implement faster than ever before. Allowing you to focus on the bigger picture: securing your organization.

With AI Workflow Builder, simply:

  1. Describe your workflow: Provide bullet points describing your desired actions.
  2. Get instant results: Torq’s AI instantly generates a workflow preview tailored to your needs.
  3. Customize with ease: You remain in full control, with the flexibility to adjust, fine-tune, and add configurations as needed.


As Gartner highlighted in their 2024 Hype Cycle, the industry has evolved beyond traditional SOAR platforms. As the autonomous SOC emerges, Torq is setting a new standard with Hyperautomation — one that prioritizes speed, efficiency, and security.

AI Builder In Action: Instant IP Threat Detection

As an example, you might need to check an IP address or a range of IP addresses using VirusTotal and take action if they’re flagged. Simply prompt the AI Workflow Builder with natural language to describe what you need:

“Check IP address 8.8.8.8 with VirusTotal, and if it’s flagged as malicious more than 3 times then do the following:

  1. Create a Torq case with High severity 
  2. Send a notification to #alerts in Slack.”

Seconds later, Torq’s AI Workflow Builder generates a fully functioning workflow ready for review. You can tweak anything — from setting custom thresholds to fine-tuning case details and personalizing Slack alerts. AI handles the grunt work, but you stay in control.

Get Started with AI Workflow Builder

Whether you’re a beginner or an automation expert, Torq’s AI Workflow Builder simplifies creating powerful, secure workflows. With 4,000+ out-of-the-box actions, 300+ integrations, and 325+ million workflows executed annually, Torq has the speed, flexibility, and scale to meet modern security needs.

Schedule a demo today and discover how powerful and easy Hyperautomation can be with Torq.

What’s New With Torq: September 2024

Contents

The Team at Torq is pushing the boundaries of what’s possible in security automation, and we’re excited to share several new capabilities designed to make security analysts’ lives easier and more efficient:

Introducing AI Case Summaries

Torq AI Case Summaries leverages the power of artificial intelligence to streamline and accelerate your security operations. Imagine this: instead of manually reviewing pages of logs and incident details, your team is presented with a concise, insightful summary of each case automatically generated by Torq.

Here’s how it works:

  • AI-Powered Summarization: Torq AI Case Summary analyzes all the relevant data points associated with a security alert, including logs, threat intelligence feeds, and historical incident data.
  • Instant Insights: Our advanced AI algorithms identify the most critical information and present it in a clear, easy-to-understand summary, highlighting the potential impact and recommended actions.
  • Faster Response Times: Armed with these AI-driven insights, your team can quickly understand the nature of the threat, prioritize incidents effectively, and take decisive action to mitigate risks.

Torq AI Case Summary enables your security team to operate at peak performance. By automating the tedious task of case summarization, AI Case Summary frees up analysts to focus on what matters most: investigating complex threats, hunting for vulnerabilities, and proactively strengthening your security posture.

Learn More

Simplify Form Building with Torq Interact

Need a department head to approve a suspicious travel request? Or perhaps you need a marketing manager to verify the legitimacy of a social media file? Torq Interact empowers security teams to automate approvals and data collection tasks with teams outside the security organization, ensuring a swift and coordinated response to security events.

As customers use Torq Interact to streamline both security team processes and end-user engagement, we continue to find new ways to improve the Interact experience. As of today, four new fields have been added to Torq Interact: 

  1. Date & Time Parameter: End users can easily select specific dates and times within interactions. For example, they can pinpoint the exact date of a thwarted phishing attempt.
  2. Enhanced File Parameter: Users can now upload multiple files simultaneously rather than one at a time. This simplifies the user experience, especially when dealing with unpredictable files. 
  3. Download File Parameter: Now, Torq users can leverage Interact to send files directly to end users for download, either directly or through workflow context. Analysts might be looking for a secure way to send a potentially malicious file to another team member so they can execute it in a sandbox for further investigation. 
  4. Secondary Button: This enables Interact users to add flexibility to their workflows with a secondary button that allows users to submit forms without filling in all required fields, perfect for adapting to various interaction scenarios.
  5. Conditional Elements: The conditional element introduces an advanced logic conditional element to enhance the end-user experience by dynamically presenting questions or information based on live responses, increasing the accuracy of every interaction.

Learn More

Enhanced Data Records with Torq Tables

Security teams are drowning in data. Every tool in your stack generates logs, alerts, and reports. But making sense of it all? That’s where things get messy. Spreadsheets buckle under the weight of hundreds, thousands, millions of rows. Custom dashboards require coding expertise and constant maintenance. You need a way to wrangle your data, not be ruled by it.

Torq Tables is a powerful, flexible way to interact with all your security data, directly within the Torq platform.

Torq Tables Enable You To:

  • Centralize your data: Pull in data from any source – NIST, SIEM, EDR, cloud platforms, and more – into a single, unified view—no jumping between tools and screens.
  • Investigate with speed and precision: Filter, sort, and analyze a significant amount of data in real-time. Uncover hidden threats and patterns that would otherwise remain buried.
  • Automate with ease: Trigger workflows directly from data in tables, responding to threats and anomalies at machine speed.

Torq Tables is now available for all Torq users. Log in to your Torq instance to get started, or schedule a demo.

Learn More

Monitor and Manage Workspaces with Organization Management

Organization Management introduces a new single pane of glass view, simplifying the process for Torq users to monitor usage across multiple workspaces and perform org-level administrative tasks. Additionally, we’ve introduced a new Organization Manager role to grant appropriate stakeholders org-level access while adhering to a least-privilege access approach. 

Learn More

We’re excited to see what security teams will accomplish with these new capabilities. Keep an eye out for future updates as we push the boundaries of security automation!

A Blueprint for Hyperautomating Your Next-Gen Secure Software Development Lifecycle

Aner Izraeli is the Chief Information Security Officer (CISO) at Torq. He leads Torq’s cybersecurity strategy with a focus on innovation and resilience. Aner’s career spans over two decades in the cybersecurity field, where he has consistently demonstrated expertise in SIEM/SOC, incident response, and network security. 

At Torq, we’re all about pushing boundaries and driving innovation. But we can’t afford to treat security as an afterthought in our relentless pursuit of speed and creativity. As a lean and agile team, we’re constantly challenged to stay ahead of emerging threats without slowing down our momentum. In this blog, I’ll take you behind the curtain to reveal how we’ve engineered an automated application security pipeline that helps us maintain security and fuels our rapid innovation.

The Challenge

At Torq, our software engineering teams manage various components and microservices, each with unique functionalities requiring meticulous threat modeling and vulnerability assessments. Modern software engineering integrates open-source and proprietary libraries, which introduces potential security vulnerabilities in individual and shared components across teams. The primary challenge is ensuring these vulnerabilities are continuously identified and mitigated before they compromise the production environment. Simultaneously, it’s crucial to maintain an environment where teams can continue to innovate and deliver high-quality software without being hindered by security concerns. In short, how do we ensure that potential application security vulnerabilities are identified and resolved before they can threaten our production environment, all while empowering our teams to innovate and deliver high-quality software?

The Solution Architecture

Our solution started with integrating an Application Security Posture Management (ASPM) platform, providing complete control over our supply chain and Software Development Life Cycle (SDLC). This visibility extends across open-source packages, Dockerfile dependencies, and container images—everything from the far-right side of the SDLC. But visibility alone can be overwhelming. We needed to take it further by leveraging Torq’s Hyperautomation capabilities. 

This diagram provides a high-level illustration of the components that participate in the Application Security events pipeline.

Program Vision

My vision was simple, but ambitious: create a seamless, automated pipeline that transforms how we manage vulnerabilities. Here’s how we did it:

  • Torq Workflows: Aggregate vulnerabilities by category (open-source, SBOM, secrets) and severity, streamlining issue management.
  • Centralized Case Management: A single, aggregated Torq case for each repo, simplifying investigation and eliminating redundant tickets.
  • Automation at Scale: With one click, generate Jira tickets, pull requests, and Slack notifications, all customized to our R&D teams’ templates.
  • Daily SLA Reminders: Automated workflows ensure SLAs are met, keeping teams on track and focused.

I used Torq’s workflows to categorize and aggregate issues, while centralized case management simplifies investigations for R&D teams. Automation facilitates generating Jira tickets, pull requests, and Slack notifications, keeping teams aligned with daily SLA reminders. Ultimately ensuring our teams can focus on what matters most—innovation without compromise. Below is an illustration of what that automated flow looks like:

The Implementation In Action

A single Torq case aggregates issues based on the severity and category within a specific repository, streamlining the work for R&D teams. 

When a new issue is automatically pushed from the ASPM to Torq, it presents a comprehensive table with the relevant package, recommended upgrades, a verdict, and direct links to GitHub and ASPM findings. If the issue requires R&D attention, Torq’s quick action button can initiate a new workflow, generating a Jira ticket, a branch-based Pull Request, and notify the relevant R&D team via Slack, all while ensuring SLA compliance.

Now, with the necessary information at their fingertips, R&D teams can quickly identify and address what needs to be patched. They’re provided a direct link to the Pull Request, ensuring a seamless transition to the next steps. From here, Torq’s change management and SDLC policies take over, with the changes being reviewed, approved, and merged just like any other code, new Torq feature, or artifact.

SLA Compliance

In line with Torq’s policy, every issue is assigned a Service Level Agreement (SLA) based on severity. To ensure timely resolution, a daily automated workflow reviews open cases and notifies each R&D team of their remaining time to address these issues. This approach keeps teams on track, ensuring vulnerabilities are managed effectively without disrupting ongoing development.

When To Implement Successful Hyperautomation in SSDLC

Achieving fully automated vulnerability management may sound like an ambitious goal, but it’s essential for the velocity of modern security operations. Within Torq, we strive for a seamless process from detection to merge. Successful automation of these processes became possible:

  1. When the vulnerability management program is mature and well-established.
  2. When there are consistent, repeatable actions required for product or software updates.
  3. When the SDLC includes a robust testing process, acting as a safety net to catch any oversights during automation.

Conclusion: The Business Impact

The result of our efforts: A fully automated vulnerability management process that has revolutionized our approach to AppSec. We’ve slashed remediation time, improved SLA adherence, and empowered our R&D teams to deliver secure, high-quality software faster than ever. Here was the quantitative impact:

Black Hat 2024: Torq Takes Over Vegas

Our Arrival: Black Hat 2024

Subtlety has never been our specialty. Our arrival in Las Vegas for Black Hat 2024 had the city abuzz with excitement as our HyperTrucks blazed through the street, broadcasting that “SOAR is dead.” Our team traveled from across the globe, and converged to make this event unforgettable. We were not just attending; we were here to revolutionize how security operations are perceived and executed.

Torq HyperSOC™: The Demo that Broke Black Hat

Torq HyperSOC™ was undeniably the star of the show. Our demo booths were consistently surrounded by security teams waiting for their turn to witness the groundbreaking capabilities of our latest solution. The reactions were phenomenal—visitors were blown away by the efficiency and innovation that Torq HyperSOC™ brings to the table. The non-stop lines at our demo stations were a testament to the immense interest and excitement generated by our cutting-edge technology. 

“I’ve never seen anything like it in 20-something years of doing this.”

Mick Leach, Field CISO at Abnormal Security

Torq for Good

To raise awareness of the cyber skills gap and to encourage the next generation of young professionals to consider a career in cybersecurity, we committed to donate $10 for every person who visited our booth to Tech Queen Elite Training Institute. They caught our eye as a local Vegas non-profit organization that trains students in coding, business communication skills, and digital marketing technologies. We are also donating a pair of premium socks for every visitor to our booth via the Communities In Schools, Nevada organization. This donation is designed to inform kids about the value of a SOC career while also providing them with a useful back-to-school item. Communities In Schools is the nation’s leading dropout prevention organization. Its mission is to assess needs and deliver resources that remove barriers to success. It supports more than 100,000 students at 110 schools. 

Hyperautomation™ Reaches New Heights

Our booth at Black Hat 2024 was not just a display; it was an experience. The buzz and energy were palpable, with attendees continually stopping by to see what the excitement was all about. We made it loud and clear that “SOAR is Dead,” and the hundreds of security professionals we spoke to agreed.

Torq, Out. 

Black Hat 2024 was a monumental success for Torq, as we showcased our commitment to pushing the boundaries of cybersecurity and automation. Stay tuned for more exciting updates and innovations from our team – and be sure to catch us back in Vegas next month for Fal.Con.

Torq Delivers SOC(ks) for the Community

Torq Gives Back and Supports the Next Generation of Cyber Talent

For the second year in a row, Torq is pleased to make donations to charities that invest in supporting the next generation of young professionals and encourage them to consider STEM-related career paths. 

Torq will be at Black Hat, one of the cybersecurity industry’s leading trade shows, August 6-8 at Mandalay Bay, Las Vegas. We’ll be exhibiting Torq Hyperautomation at our booth, including the AI-driven Torq HyperSOC, a purpose-built solution that automates, manages, and monitors critical SOC (Security Operations Center) responses at machine speed. This innovation has been game-changing for tech workers in the SOC and is helping alleviate the cybersecurity skills gap that’s leading to global labor shortages and burnout.

To raise awareness of the cyber skills gap and to encourage the next generation of young professionals to consider a career in cybersecurity, Torq will donate $10 for every person that visits its booth (#960) to Tech Queen Elite Training Institute. It’s a non-profit organization dedicated to training students in coding, business communication skills, and digital marketing technologies. Tech Queen Elite Training Institute helps eliminate barriers so students can earn globally-recognized credentials and become gainfully employed, in fields that include cybersecurity and AI.

“We’re grateful to Torq for making such a generous investment in the career paths of Tech Queen Elite Training Institute students,” said Dr. Duana Malone, Founder of Tech Queen Elite Training Institute. “Our goal is to ensure every student we work with has an opportunity to devote themselves to meaningful skills development that enables them to elevate their future potential, as well as their community at large. Torq’s donation will make a real difference for many students in Nevada.”

In addition, for every visitor to our Black Hat booth, Torq will donate a pair of premium socks to local kids in need via the Communities In Schools, Nevada organization. This donation is designed to inform kids about the value of a SOC career, while also providing them with a useful back-to-school item. Communities In Schools is the nation’s leading dropout prevention organization. Its mission is to assess needs and deliver resources that remove barriers to success. It supports more than 100,000 students at 110 schools. 

“Communities In Schools, Nevada, is very happy to have Torq contribute to the back-to-school packages we’re providing our students this year,” said Hayden Havon, Events Coordinator, Communities In Schools, Nevada. “Together with our other partners, Torq is helping ensure kids have the essentials they need to get up and running for their 2024-2025 academic sessions.”

“Every employee at Torq worldwide is proud to help make a positive impact in the communities in which we do business,” said Ofer Smadari, CEO, Torq. “We’re very happy to contribute to the wellbeing of students and for them to be exposed to the possibilities of cybersecurity as a fulfilling and valuable career option for the future. All of us are incredibly impressed by Tech Queen Elite Training Institute and Communities In Schools, Nevada, and we encourage others to also step forward and support their amazing work.”

Three-Time Torq Hyperautomation™ Customer Achieves Unparalleled Productivity and Efficiency

The following is from a conversation between Torq and Kevin Rickard, VP of IT and Security at Jobcase, Inc. Jobcase is an online community dedicated to guiding and advocating for the world’s workers. Read on to learn how Kevin and his team have used Torq Hyperautomation to automate many security workflows.

From Torq Customer to Hyperautomation Enthusiast

Kevin Rickard is not just a repeat customer of Torq; he’s a three-time advocate for the transformative power of Torq Hyperautomation. What keeps him coming back? The exceptional quality of Torq’s pre-and post-sales support.

“The folks at Torq have been top-tier, and their expertise and support have made a world of difference,” Kevin shared. Compared to other SOAR products, Torq Hyperautomation stands out, offering unmatched agility and productivity. Kevin and his team at Jobcase have been able to deploy use cases within hours—something they hadn’t achieved with other solutions.

“Nothing compares to the agility and productivity I’ve achieved with Torq Hyperautomation.”

Kevin Rickard, VP of IT and Security at Jobcase, Inc.

Seamless Collaboration with the Torq Team

Jobcase’s collaboration with the Torq team has been both productive and ROI-driven. From the outset, Torq has been deeply engaged with the team, providing initial drafts for Jobcase’s workflows and demonstrating a deep understanding of their needs and processes. This personalized support has been instrumental in optimizing their security operations.

Top Hyperautomation Use Cases at Jobcase

Kevin’s team has found Torq particularly useful for a variety of IT and security processes, both large and small. One standout area is phishing analysis. With Torq Hyperautomation, they can quickly identify phishing threats and significantly reduce the alert fatigue caused by false positives. Additionally, automating employee onboarding and offboarding has improved operational efficiency and satisfaction among internal customers by eliminating many manual tasks.

With Torq Hyperautomation, Jobcase has streamlined workflows through Slack messages, automating everything from user welcome emails to complete enrollment processes. This automation has saved valuable time, eliminated repetitive tasks, and streamlined processes, allowing the team to allocate their efforts to more impactful and strategic initiatives.

How Torq Hyperautomation is Different from SOAR Offerings

Kevin’s experience with multiple SOAR platforms underscores the unique advantages of Torq Hyperautomation. Unlike traditional SOAR platforms, which often require extensive experience and substantial time investments, Torq’s ease of use and rapid deployment capabilities are game-changers. Teams can go from development to full production in just days.

Moreover, previous SOAR solutions often fell short in their tiered support structures, sometimes necessitating additional financial investments for adequate assistance. Torq, on the other hand, provides a seamless and supportive user experience, ensuring rapid and efficient operationalization of security workflows without extra costs.

In summary, Torq Hyperautomation has revolutionized how Jobcase manages its security workflows, driving unprecedented productivity and efficiency. Kevin Rickard’s continued reliance on Torq is a testament to its superior capabilities and exceptional support.Want to learn more about Torq Hyperautomation? Get a demo.

Watch the Full Interview

The 5 Hidden Costs of SOAR for MSSPs

Leading MSSP Increases Service Delivery with Hyperautomation

The following is from a conversation between Torq and Brian Brown, CISO at Solis. Solis delivers best-in-class managed cybersecurity services and incident response to small businesses around the world. Read on to learn how Brian and his team have used Torq Hyperautomation to exponentially increase the number of workflows running to prevent and respond to cyber threats.

Introduction to Solis

Solis is a full-spectrum MSSP and DFIR company. It has been in business for over 20 years and serves a range of customers from SMBs to enterprises, with a core focus on small- to medium-sized businesses. 

“I consider Torq’s automation format to be best in class from everything we’ve evaluated in the market.” – Brian Brown, CISO at Solis

The Benefits of Hyperautomation for MSSPs

Solis has experienced multiple benefits since adopting Torq Hyperautomation. Efficiency and agility (without sacrificing security) are crucial to delivering the service they promise to their customers, as managing the security practices of multiple clients simultaneously comes with a great deal of responsibility. 

The team has evaluated many automation options in the market, and they’ve come to consider Torq’s automation format to be the best in class. Solis cited the integration support and the speed at which development happens within Torq as “amazing.” 

“Having an assigned Sales Engineer, having an assigned team, and having ready access to them, all while having them understand the product from top to bottom, has been absolutely critical to the speed we’re trying to deploy this,” Brown added. “Additionally, having the Torq team available to answer our questions at any time has been extremely valuable. Outside of the technology being best in class, the service and support has been what has really pushed Solis forward.”

Experience Using Torq Hyperautomation

Solis has been pleasantly surprised at how quickly they have developed and deployed over 273 workspaces and over 5,823 workflows. Using Torq gave Solis the efficiency to build out automations that are consistent between workspaces as needed and the flexibility to fully customize those same workflows for each client’s environments and requirements. “The speed in which our automations run and the security around isolating those workspaces has been advantageous for us as well,” Brown commented. 

Want to learn more about Torq Hyperautomation? Get a demo.

Watch the Full Interview