Portland, OR, USA
Nov 21, 2022   |  By Torq
Torq is extremely proud to announce the formation of the Torq Advisory Board, a group of some of the world’s most respected cybersecurity professionals, including several industry-leading CISOs and heads of information security. All of our advisors have made major impacts in cybersecurity for their companies, and for the industry at large.
Nov 21, 2022   |  By Eldad Livni
Torq is proud to announce the immediate general availability of its no-code security solution in AWS Marketplace, the curated digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).
Nov 18, 2022   |  By Chris Tozzi
So you’ve set up a Security Orchestration, Automation and Response (SOAR) platform. You’re now ready to detect, respond to and remediate whichever threats cyberspace throws at you, right? Well, not necessarily. In order to deliver their maximum value, SOAR tools should be combined with playbooks, which can be used to drive SOAR systems and ensure that SOARs remediate threats as quickly as possible — in some cases, without even waiting on humans to respond.
Nov 16, 2022   |  By Eldad Livni
We’re extremely happy to announce that Torq has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. The CSA has more than 80,000 members worldwide and has been endorsed by the American Presidential Administration, which selected the CSA Summit as the venue for announcing the federal government’s cloud computing strategy.
Nov 14, 2022   |  By Chris Tozzi
The Security Operations Center, or SOC, is the backbone of modern security operations. By centralizing security monitoring, detection, and response, SOCs help organizations manage security risks more efficiently and effectively. But simply setting up a SOC doesn’t guarantee optimal security workflows. To get the very most from your SOC, you must automate its operations as much as possible.
Nov 9, 2022   |  By Torq
Jason Chan, a key member of the Torq Advisory Board, has spent more than 20 years working in pivotal cybersecurity roles. One of his most important positions was leading the information security organization at the video streaming behemoth Netflix for more than a decade. His Netflix team set the bar extraordinarily high, focusing on sophisticated risk assessment and management, and compliance management strategies and approaches.
Nov 7, 2022   |  By Torq
“If you fail to plan, you plan to fail,” said Benjamin Franklin. These words cannot be overstated in most business fields, especially when it comes to automation. Process automation has the potential to enhance operations in most organizations, but problems can emerge when they don’t plan and strategize around their automation objectives.
Nov 4, 2022   |  By Chris Tozzi
Everyone loves automation, and it can be easy to assume that the more you automate, the better. Indeed, falling short of achieving fully autonomous processes can feel like a defeat. If you don't automate completely, you're the one falling behind, right? Well, not exactly. Although automation is, in general, a good thing, there is such a thing as too much automation. And blindly striving to automate everything under the sun is not necessarily the best strategy. Instead, you should be strategic about what you do and don't automate.
Oct 26, 2022   |  By Torq
MITRE is a world-renowned research organization that aims to help build a safer world. It is probably best known in the information security industry for being the organization behind the industry-standard CVE (Common Vulnerabilities and Exposures) list. Each entry on the list is supposed to include an explanation of how the vulnerability could be exploited. These attack vectors are tracked and defined in another well-known knowledge base called ATT&CK, which is also maintained by MITRE.
Oct 19, 2022   |  By Torq
Torq is extremely proud to have Jason Chan on our advisory board. Jason has more than 20 years of experience working in cybersecurity. He’s one of the world’s leading experts in adopting security automation, cloud security, and enhancing security in modern software development practices. Jason’s most recent career experience was leading the information security organization at Netflix for more than a decade.
Nov 11, 2022   |  By Torq
Torq is extremely proud to have Jason Chan on our advisory board. Watch Jason explore the positive impacts security automation is having on organizations of all sizes, worldwide
Nov 11, 2022   |  By Torq
Learn about Jason Chan's pioneering efforts that helped set the stage for a dramatic shift from legacy cybersecurity approaches to today’s modern no-code security automation offerings.
Oct 24, 2022   |  By Torq
Operationalizing data at the same scale it’s collected is vital, yet 55% of organizations surveyed by analyst firm ESG said they don’t have the skills or the time to create automations or playbooks to manage all threat data at machine speed. @Enterprise Strategy Group ESG and @Torq will explore the landscape of EDR and XDR systems and show how teams can approach the challenges of operationalizing the threat data they provide with different approaches to automation.
Sep 20, 2022   |  By Torq
New threats arise every day, and malicious actors move faster than ever before. Staying ahead of attacks requires cybersecurity teams to be armed with continuously updated intelligence, and empowered to move at machine speed in response to new threats.
Sep 15, 2022   |  By Torq
Parallel Execution is a significant evolution for no-code security automation that enables you to instantly create multiple branches within an automatic workflow, and handle each concurrently before seamlessly merging back into a single flow. Security teams can now execute more tasks simultaneously to quickly enrich, analyze, contain, and resolve security threats.
Aug 26, 2022   |  By Torq
Is your SOC facing the top challenges in cybersecurity as identified by the SANS 2022 SOC Survey? In this 50-minute webinar, we’ll review results from recent global surveys and examine how no-code automation can solve the most commonly reported challenges.
Jul 19, 2022   |  By Torq
Automatically generate a daily report on device compliance from Intune and deliver it to Slack using this pre-built template from Torq.
Jul 19, 2022   |  By Torq
When credentials are requested by a Slack command Torq adds users to a JumpCloud user group. When the time limit for access has expired, the user's permissions will automatically be revoked - closing security gaps.
Jul 19, 2022   |  By Torq
This workflow uses the Torq chatbot to check URLs on request, then add to a global blocklist in Zscaler if needed.
Jul 19, 2022   |  By Torq
Automate the "offboarding" process for dormant contractor accounts with this workflow template. Set the workflow to run daily, weekly, or at any interval you require.
Jan 10, 2022   |  By Torq
Businesses of all types, and across all verticals, have gone digital-first. This shift enables many benefits, such as greater scalability and speed. But it also amplifies the security and compliance challenges that arise from digital systems. For CISOs, this shift amplifies the need to apply the same level of automation, speed, and business-wide accessibility for security that digitization has brought to other aspects of the business. In short, modern businesses need to adopt a digital-first approach to SecOps itself.
Jan 10, 2022   |  By Torq
The efficiency and scalability that security teams stand to gain from no-code automation is not novel. It's what development teams have been enjoying for years, thanks to the widespread adoption of CI/CD automation tools.

Torq is a no-code automation platform that modernizes security and operations teams. With Torq, frontline security professionals can easily create automated flows that help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.

Torq’s no code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates.

Five minutes to powerful security automation:

  • Supercharge your security posture: Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment.
  • Accelerate security operations: Build flows with a no-code, drag & drop designer — no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection.
  • Work your way — only faster: Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed.
  • Compliant and Secure Platform: Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.

No-code automation for powerful security.