Torq Features
Response (7)
Resolution Automation
This feature was mentioned in 19 Torq reviews.
Diagnose and resolve incidents without the need for human interaction.
Resolution Guidance
21 reviewers of Torq have provided feedback on this feature.
Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
Based on 19 Torq reviews.
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
As reported in 20 Torq reviews.
Gathers information related to threats in order to gain further information on remedies.
Alerting
Based on 91 Torq reviews.
Clearly notifies users with relevant information and anomalies in a timely manner.
Performance Baselin
86 reviewers of Torq have provided feedback on this feature.
Sets a standard performance baseline by which to compare log activity.
High Availability/Disaster Recovery
Based on 82 Torq reviews.
Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.
Records (3)
Incident Logs
As reported in 19 Torq reviews.
Information on each incident is stored in databases for user reference and analytics.
Incident Reports
This feature was mentioned in 23 Torq reviews.
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Resource Usage
17 reviewers of Torq have provided feedback on this feature.
Analyzes recurring incidents and remedies to ensure optimal resource usage.
Management (3)
Incident Alerts
18 reviewers of Torq have provided feedback on this feature.
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Database Management
18 reviewers of Torq have provided feedback on this feature.
Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.
Workflow Management
As reported in 18 Torq reviews.
Administrators can organize workflows to guide remedies to specific situations incident types.
Automation (4)
Workflow Mapping
89 reviewers of Torq have provided feedback on this feature.
Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
Workflow Automation
91 reviewers of Torq have provided feedback on this feature.
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Automated Remediation
As reported in 94 Torq reviews.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Log Monitoring
Based on 89 Torq reviews.
Constantly monitors logs to detect anomalies in real time.
Orchestration (4)
Security Orchestration
91 reviewers of Torq have provided feedback on this feature.
Integrates additional security tools to automate security and incident response processes.
Data Collection
As reported in 90 Torq reviews.
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Threat Intelligence
Based on 90 Torq reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Data Visualization
Based on 91 Torq reviews.
Offer pre-built and custom reporting and dashboards for quick insights into system states.
Functionality (6)
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Configuration (5)
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
This feature was mentioned in 13 Torq reviews.
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
Based on 10 Torq reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Generative AI (2)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.
Threat Detection & Triage - AI SOC Agents (3)
Anomaly Detection & Correlation
Detect and link suspicious activities across systems in real time.
False‑Positive Suppression
Identify and dismiss non‑threats through intelligent pattern recognition.
AI‑Driven Alert Triage
Reduce noise by automatically evaluating and prioritizing alerts based on risk and context.
Investigation & Enrichment - AI SOC Agents (3)
Autonomous Case Investigation
Investigate alerts end‑to‑end, gathering evidence and building incident timelines.
Contextual Enrichment from Multiple Sources
Enrich cases with data from SIEM, EDR, cloud, identity, and threat‑intel feeds.
Attack Path Mapping
Create visual maps of threat propagation and lateral movement through networks.
InfoSec Experience & Governance - AI SOC Agents (3)
Conversational Analyst Interface
Allow SOC teams to query agents via natural language about ongoing cases.
Manual Feedback Learning Loop
Improve agent performance through adaptive learning from security team corrections.
Explainability & Audit Trail
Provide human‑readable reasoning trails and decision justifications.
Response & Remediation - AI SOC Agents (3)
Mean Time Reduction Metrics
Track and lower MTTD/MTTR/MTTC through autonomous reactions.
Playbook‑Free Dynamic Workflows
Adapt remediation actions without requiring static SOAR playbooks.
Automated Response Execution
Execute predefined or adaptive responses (e.g., isolate endpoints, revoke credentials).





