Torq

Portland, OR, USA
2021
  |  By Aner Izraeli
At Torq, our commitment to security has always been at the forefront of our mission to empower businesses through our SaaS platform. Today, we’re proud to announce a significant step forward in our security journey: Torq has signed the CISA Secure by Design Pledge. This pledge underscores our dedication to ensuring that our customers can trust our platform to uphold the highest security standards, enabling customers to focus on their goals without concerns about their security posture.
  |  By Torq
For security teams, resolving a cloud incident takes an average of 10 days — time attackers can exploit to cause further damage. The problem? SOCs often lack the context and cloud security automation they need to respond faster. That’s where the partnership between Torq and Sweet Security changes the game.
  |  By Don Jeter
Last year was an absolutely amazing year for Torq. The stats are just mind-blowing: 300% revenue growth and 200% employee growth. We also closed our $70M Series C round, bringing our total funding to $192M.
  |  By Torq
SOC teams often wrestle with clunky, siloed reporting tools that lack real-time, connected capabilities. Analysts end up buried under a mountain of fragmented xdata, forcing teams to spend valuable hours tracking down answers to their most pressing questions, rather than tackling threats head-on. At Torq, we feel SOC reporting should be your power move, not a painful process.
  |  By Gal Peretz
Gal Peretz is Head of AI & Data at Torq. Gal accelerates Torq’s AI and data initiatives, applying his deep learning and natural language processing expertise to advance AI-powered security automation. He also co-hosts the LangTalks podcast, which discusses the latest AI and LLM technologies. Our previous blog post explored how planning with AI systems can set the stage for smooth collaboration between humans and machines. However, a solid plan alone isn’t enough.
  |  By Torq
Case management for modern SOCs can be a maze of endless alerts, overwhelming data, and intense pressure. Legacy solutions often exacerbate these issues with rigid workflows, limited automation capabilities, and a lack of real-time adaptability, leaving teams ill-equipped to handle the growing complexity of threats. The volume of cases, manual workflows, and processes leave analysts overwhelmed, exhausted, and struggling to keep pace.
  |  By Brian Higgins
With widespread remote work and global access, organizations face mounting challenges in securing user identities against sophisticated threats. One critical identity risk signal is impossible travel, where a user appears to log in from two unrecognized, geographically distant locations within an unrealistic timeframe, indicating the possibility of compromised credentials or session hijacking.
  |  By Torq
As C-suites and boards are bombarded with headlines about AI revolutionizing cybersecurity, it’s no wonder they’re putting pressure on SOC leaders to adopt AI. The promise of AI in the SOC is rightfully alluring. An AI-native autonomous SOC has the potential to create a world where AI Agents collaborate with each other to take care of repetitive tasks and handle the majority of low-level alerts, freeing your human team up for strategic, proactive work. The hurdle?
  |  By Leonid Belkind
Meet Torq Socrates and learn how a Large Language Model (LLM)-powered AI SOC Analyst can revolutionize SecOps. Artificial intelligence (AI) in the SOC has generated significant hype in recent years, and separating the promise from reality can be challenging. However, at Torq, AI is not just a concept — it is a reality that is revolutionizing the SecOps field, specifically in the area of Tier-1 security analysis.
  |  By Torq
The rise of Non-Human Identities (NHIs) — think APIs, bots, service accounts, and machine identities — has expanded the attack surface in ways we’re only beginning to understand. NHIs now outnumber human identities in enterprise environments, often by a staggering ratio. While they streamline processes, enable scalability, and facilitate automation, these identities also present significant security risks.
  |  By Torq
  |  By Torq
  |  By Torq
  |  By Torq
  |  By Torq
Ready to unlock peak efficiency? Introducing AI Data Transformation Torq's AI Data Transformation provides the testability, flexibility, and control required to manage enterprise-level workflows without writing a single line of code.
  |  By Torq
Curious to know what's new with Torq? Watch this video to learn what the latest updates are to the Torq Hyperautomation platform. Chapters.
  |  By Torq
GigaOm declares Torq the autonomous SOC leader.
  |  By Torq
NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari Ofer Smadari, Torq’s CEO and Co-Founder joined Floor Talk with Judy Khan Shaw to talk about Torq’s momentum from our $70M Series C and what sets Torq Hyperautomation apart from legacy technology.
  |  By Torq
Businesses of all types, and across all verticals, have gone digital-first. This shift enables many benefits, such as greater scalability and speed. But it also amplifies the security and compliance challenges that arise from digital systems. For CISOs, this shift amplifies the need to apply the same level of automation, speed, and business-wide accessibility for security that digitization has brought to other aspects of the business. In short, modern businesses need to adopt a digital-first approach to SecOps itself.
  |  By Torq
The efficiency and scalability that security teams stand to gain from no-code automation is not novel. It's what development teams have been enjoying for years, thanks to the widespread adoption of CI/CD automation tools.

Torq is a no-code automation platform that modernizes security and operations teams. With Torq, frontline security professionals can easily create automated flows that help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.

Torq’s no code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates.

Five minutes to powerful security automation:

  • Supercharge your security posture: Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment.
  • Accelerate security operations: Build flows with a no-code, drag & drop designer — no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection.
  • Work your way — only faster: Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed.
  • Compliant and Secure Platform: Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.

No-code automation for powerful security.