Audience

SOC teams

About Torq

Torq is transforming cybersecurity with its AI-native autonomous SOC powered by hyperautomation. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and precisely remediate security events, and orchestrate complex security processes at scale. Fortune 500 enterprises, including the world’s biggest financial, technology, consumer packaged goods, fashion, hospitality, and sports apparel companies are experiencing extraordinary outcomes with Torq.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Torq
United States
torq.io

Videos and Screen Captures

Other Useful Business Software
Stay in Flow. Let Zenflow Handle the Heavy Lifting. Icon
Stay in Flow. Let Zenflow Handle the Heavy Lifting.

Your AI engineering control center. Zenflow turns specs into shipped features using parallel agents and multi-repo intelligence.

Zenflow is your engineering control center, turning specs into shipped features. Parallel agents handle coding, testing, and refactoring with real repo context. Multi-agent workflows remove bottlenecks and automate routine work so developers stay focused and in flow.
Try free now

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
Webinars
In Person
Videos
Support
Online

Torq Frequently Asked Questions

Q: What kinds of users and organization types does Torq work with?
Q: What languages does Torq support in their product?
Q: What other applications or services does Torq integrate with?
Q: What type of training does Torq provide?

Torq Product Features

Application Security

Source Code Analysis
Open Source Component Monitoring
Vulnerability Detection
Vulnerability Remediation
Third-Party Tools Integration
Training Resources
Analytics / Reporting

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting