Threat Hunting
Automate threat hunting for EDR, XDR, and SIEM with workflows.
Cloud Security Posture Management
Automate continuous CSPM and response workflows.
Security Alert Remediation
Automatically remediate security alerts (Cloud/SaaS/On-Prem).
Email Phishing Response
Automate email phishing incident response.
Suspicious User Activity Response
Automatically investigate and respond to suspicious behavior.
Application Security
Streamline application security across the entire development lifecycle.
Security Bots Automation
Turn automated workflows into interactive security bots.
Identity Lifecycle Management
Automatically update device, network and other access policies.
Secure Access to Sensitive Data
Automate secure and controlled access to sensitive data.
Events & Webinars
Details on all the conferences and virtual events that Torq attends.
Partners
Our partners make Torq stronger for security teams.
Careers
Our teams in the United States and Israel are growing fast.
Our Story
The "why" behind Torq's lightweight automation solution.
Swing by our (virtual or IRL) booth and get to know the Torq Team and our uncomplicated approach to powerful security automation.
Blog
Read security automation thought leadership and how to's.
Documentation
Get access to all Torq product documentation.
Library
Get eBooks, case studies, white papers, and more.
Get Started
Get started with a trial or demo of Torq.
The SANS SOC 2022 Survey
The latest SANS SOC Survey explores how SOCs are evolving, the current landscape, and how SOC admins are adapting.
Case Study
eBooks
FILTER BY: