Operations | Monitoring | ITSM | DevOps | Cloud

Torq

Top 5 Takeaways from RSAC 2022

It’s been just over a month since cybersecurity conferences returned in a big way with the comeback of RSA Conference after last year’s hiatus. A lot happened between 2020 and 2022 in the world, our lives, and cybersecurity, including the birth of a little no-code security automation start-up named Torq. RSAC 2022 was a great place to catch up on these changes and look forward to emerging trends and security needs.

Sponsored Post

Automated Security Alert Remediation: A Closer Look

In cloud-native organizations and software as a service (SaaS) businesses, cloud security automation is becoming a must-have feature. You can't stay ahead of threats across several levels of your cloud environment using manual procedures alone, and you can't rely exclusively on cloud providers' security technology, which doesn't operate across different clouds and lacks advanced automation features. Managing these infrastructures and apps in multi-cloud settings becomes increasingly difficult and compounds the operational issues that you face today. Automation is the way to go if you want to stay ahead of the game and meet the expectations of your customers.

JSON Basics: Building Blocks for Workflow Automation

Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, multi-step processes, thereby allowing people to focus on higher-value tasks. On top of that, automation workflows can provide valuable insights through the metrics that they gather – including the number of requests, the date and time they were requested, the time it took to complete each request, who made the request, and much more.

What to Automate First in Your SOC - Intro to Torq Webinar

Automation can transform how security teams operate, but knowing where to start can be the most difficult part. At Torq, we help teams make these decisions every day. Using our no-code automation platform, security teams can be up and running with their first workflow in as little as a few hours. The secret to making it work is our template library. This 45 minutes webinar will show you how to begin an automation program from scratch, using Torq.

Automatically Update URL Blocklists in Zscaler Using Torq

Blocking access to certain URLs is a simple, effective strategy for protecting users and the network. But, in a world where new and increasingly sophisticated scams seem to appear almost weekly, the task of maintaining that list can become overly burdensome when performed manually. Torq offers a number of ways to automate URL blocklist management, reducing manual effort and speeding up response to new threats.

How to Automatically Suspend Inactive Accounts Using Torq

Contractors, freelancers, and other temporary workers have become essential parts of the modern enterprise. For IT and security teams, these individuals present unique challenges compared to full-time workers—and potential risks. The ‘offboarding’ process for these contractors is often less formal than bringing them on. Meaning, many just stop using their entitlements and accounts without actually closing them. These dormant accounts can pose serious risks to the organization.