Torq

Portland, OR, USA
2021
  |  By Torq
If you are a cybersecurity professional, it’s hard to ignore the recent shift in the SIEM landscape unless you’ve been living under a rock… or more likely, under the crushing weight of terabytes worth of disconnected SIEM logs. Let’s catch everyone up to speed anyway.
  |  By Torq
IDC declares Torq HyperSOC the first solution to effectively mitigate SOC alert fatigue, false positives, staff burnout, and attrition. In a groundbreaking report, IDC emphatically recognizes the potential of Torq’s latest innovation, Torq HyperSOC, hailing it as a pivotal addition to the SOC analyst toolkit.
  |  By Torq
Organizations’ zero-trust policies and identity-centric programs ensure that user identities and login credentials are vigorously protected with IAM policies and security tools like MFA or IP restrictions. However, the situation is very different regarding non-human identities (NHI) like API keys, OAuth apps, service accounts, and secrets. Lack of visibility, monitoring, and governance of this permissive access is everywhere, and attackers have figured it out.
  |  By Torq
2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.
  |  By Chris Tozzi
The security operations center, or SOC, is the backbone of modern security operations. By centralizing security monitoring, detection, and response, SOCs help organizations manage security risks more efficiently and effectively. But simply setting up a SOC doesn’t guarantee optimal security workflows. To get the very most from your SOC, you must automate its operations as much as possible.
  |  By Torq
The following is adapted from a conversation between Torq and Robbie Jakob-Whitworth, Cybersecurity Solutions Architect at Next DLP. Next DLP is a leading provider of insider risk and data protection solutions. Read on to learn how Robbie has used Torq Hyperautomation to automate alerts and reduce alert fatigue within his organization.
  |  By Torq
Cyberthreats are escalating and SOC budgets are tightening. It’s a recipe for disaster, that is, unless you take advantage of new technologies that keep both in check. The fact is, businesses are now spending nearly a third of their cybersecurity budget towards running an in-house SOC, averaging out to $2.86 million per year, according to Ponemon.
  |  By Torq
Today’s SOC analysts are drowning in myriad notifications. They’re trying to parse what’s real, what matters, and what’s a genuine threat to the organization. This exhausting daily routine is significantly contributing to job dissatisfaction and the high turnover rate in SecOps teams. But there’s a major new innovation that solves it: AI-driven hyperautomation.
  |  By Torq
SecOps teams face an unyielding barrage of security signals raised by various systems and tools. It’s estimated that 56% of large companies receive 1,000 or more alerts per day. SOC analysts are expected to wade through these alerts and determine which ones are important, which are low priority, and which are imperative. According to IDC, 83% of cybersecurity employees say they’re struggling to cope with the overwhelming alert volume.
  |  By Torq
Cyber threats are constantly evolving and becoming increasingly sophisticated, and organizations are continuously searching for ways to fortify their cybersecurity defenses. One approach that has gained significant traction is hyperautomation. Hyperautomation, which automates once-manual security workflows and processes, enhances cybersecurity posture, streamlines security operations, and effectively mitigates risks.
  |  By Torq
How to Automate Phishing Analysis with Torq Hyperautomation. Phishing analysis has never been easier with Torq Hyperautomation. We make it easy to automate phishing analysis using our phishing templates in our template library. If you’re an Outlook user, this one’s is for you! In this example, we'll show you how to monitor an Outlook mailbox for phishing via Graph subscription.
  |  By Torq
How Torq and Anvilogic are Disrupting Legacy Technology Together Omer Singer, VP of Strategy at Anvilogic and Eldad Livni, our Co-Founder and CINO, sat down to share how we're disrupting legacy technology together.
  |  By Torq
Torq Talks To Next DLP Solution Architect, Robbie Jakob-Whitworth.
  |  By Torq
Torq talks to Tyler Young, CISO at Big ID BigID produces software for data security, compliance, privacy, and governance. Watch the full video to learn how Torq Hyperautomation has helped BigID unlock new levels of efficiency and productivity by relieving their team of rudimentary tasks.
  |  By Torq
On this episode of Torq Talks To...we talked to Filip Stojkovski about his blueprint for effective security automation.
  |  By Torq
Torq talks to Abnormal CISO, Mike Britton Mike Britton, CISO at Abnormal Security spoke to our Sr. Social Media Manager, Brittney Zec about how Torq Hyperautomation is helping Abnormal Security's SecOps team operate faster and more efficiently. Mike also talks about the ROI that Abnormal Security is seeing with Torq, along with the advice he would give to other security professionals considering adopting hyperautomation.
  |  By Torq
We’ve been taught to fear the rise of the machines. But what if machines taking over is a good thing? Leonid Belkind, our CTO and Co-Founder, sat down with Brittney Zec, our Senior Social Media & Content Manager to share insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.
  |  By Torq
Introducing Step Builder! Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks - or a wave of a magic wand! Now in GA, Step Builder extends Torq’s already impressive list of no-code capabilities. It gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration truly limitless.
  |  By Torq
Torq is the only hyperautomation solution that offers integrated AWS CLI functionality. With Torq, you don’t have to learn API calls – we cut out APIs altogether.
  |  By Torq
Businesses of all types, and across all verticals, have gone digital-first. This shift enables many benefits, such as greater scalability and speed. But it also amplifies the security and compliance challenges that arise from digital systems. For CISOs, this shift amplifies the need to apply the same level of automation, speed, and business-wide accessibility for security that digitization has brought to other aspects of the business. In short, modern businesses need to adopt a digital-first approach to SecOps itself.
  |  By Torq
The efficiency and scalability that security teams stand to gain from no-code automation is not novel. It's what development teams have been enjoying for years, thanks to the widespread adoption of CI/CD automation tools.

Torq is a no-code automation platform that modernizes security and operations teams. With Torq, frontline security professionals can easily create automated flows that help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.

Torq’s no code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates.

Five minutes to powerful security automation:

  • Supercharge your security posture: Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment.
  • Accelerate security operations: Build flows with a no-code, drag & drop designer — no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection.
  • Work your way — only faster: Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed.
  • Compliant and Secure Platform: Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.

No-code automation for powerful security.