Introducing G2.ai, the future of software buying.Try now

Torq Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

1 month

Torq Media

Play Torq Video
Mike Britton, CISO at Abnormal Security spoke to our Sr. Social Media Manager, Brittney Zec about how Torq Hyperautomation is helping Abnormal Security's SecOps team operate faster and more efficiently.
Play Torq Video
Mike Britton, CISO at Abnormal Security spoke to our Sr. Social Media Manager, Brittney Zec about how Torq Hyperautomation is helping Abnormal Security's SecOps team operate faster and more efficiently.
Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks.
Play Torq Video
Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks.
On this episode of Torq Talks To, we talked to Filip Stojkovski about his blueprint for effective security automation.
Play Torq Video
On this episode of Torq Talks To, we talked to Filip Stojkovski about his blueprint for effective security automation.
Play Torq Video
Product Avatar Image

Have you used Torq before?

Answer a few questions to help the Torq community

Torq Reviews (151)

Reviews

Torq Reviews (151)

4.8
151 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
OP
Security Administrator
Mid-Market (51-1000 emp.)
"Centralized Incident Management That Exceeds Expectations"
What do you like best about Torq?

I appreciate how it simplifies the process of viewing all incidents in a single location, bringing together all related discussions. Additionally, it enables alerts to be integrated into existing workflows and offers the security operations center an effective method for tracking all activity related to events. Review collected by and hosted on G2.com.

What do you dislike about Torq?

We have total confidence in this program; there is truly nothing I dislike about it. It has provided everything we needed and has been customized to fit our specific requirements. Review collected by and hosted on G2.com.

NA
Cyber Security Analyst
Mid-Market (51-1000 emp.)
"The tool is designed in an intelligent and functional way for immediate threat blocking"
What do you like best about Torq?

Torq is great product supporting our organization’s vulnerability program and it really performs well in assessing vulnerabilities across our network, server and endpoint infrastructure. The dashboards are intuitive and make it to prioritize remediation based on real time risk. The coverage of the network analysis offers high ability to identify even less visible vulnerabilities raising our level of threat responsiveness across the organization. Review collected by and hosted on G2.com.

What do you dislike about Torq?

The user experience was smooth and effective at every stage of the analysis and at the moment there is nothing negative to report. Review collected by and hosted on G2.com.

CS
IT Risk & Compliance Analyst
Mid-Market (51-1000 emp.)
"Comprehensive network scans to achieve the strongest remediation efforts with Torq"
What do you like best about Torq?

I like how it quickly picks up vulnerabilities that we never knew were a thing because of how comprehensive it is in scans. I really enjoy using this platform as it gives me the necessary vulnerability insights and allows us to easily customize firewall policies prioritizing the risk at hand to mitigate any possible malware attack. Review collected by and hosted on G2.com.

What do you dislike about Torq?

They have great documentation, but there is a lot to this platform, so learning all of its best-practices can take some time for some users. Review collected by and hosted on G2.com.

OR
Infrastructure and Security Senior Manager
Mid-Market (51-1000 emp.)
"Torq reliably exposes all vulnerabilities with sufficient reporting on patch management"
What do you like best about Torq?

Initial implementation and configuration of this product was flawless, allowing us to transition from a competitor product to this powerful product without any gaps in our vulnerability management program. We broadly use Torq to see all the devices in our network that may have vulnerabilities and it usually accurately spots these and points us in the right direction for remediation. Review collected by and hosted on G2.com.

What do you dislike about Torq?

There is nothing I don’t like about Torq, the remediations are great and it has shown its value in protecting our network from all types of threats. Review collected by and hosted on G2.com.

SM
Network Engineer
Mid-Market (51-1000 emp.)
"Powerful Security Insights and Fast CVE Detection to Protect Devices"
What do you like best about Torq?

Torq is a powerful tool that generates valuable metrics and dashboards that make it easy to surface high-critical security issues within the network. Once the product was deployed the vulnerability scans are now continuous and it does not congest the network. It is very quick at detecting newly released CVEs and reporting them to us with great support of the remediation plan aspect. Review collected by and hosted on G2.com.

What do you dislike about Torq?

Probably you may need to train some of the team members on how to use its advanced features and customizing quality reports. Review collected by and hosted on G2.com.

BP
Security Analyst
Mid-Market (51-1000 emp.)
"Comprehensive Threat Detection with Seamless Automation"
What do you like best about Torq?

I appreciate the threat detection feature, as it provides a broad array of functions. Its seamless integration with automation delivers a unified and strong security overview. However, I have noticed that the application does not continuously adapt to monitor emerging threats. Review collected by and hosted on G2.com.

What do you dislike about Torq?

At times, the system fails to retrieve the data I select in the fields, and I feel the search function could use some improvement. Additionally, the interface can occasionally be less intuitive for administrators, which makes the process more time-consuming. Review collected by and hosted on G2.com.

RK
Cloud Security Architect
Mid-Market (51-1000 emp.)
"Unmatched Threat Management Through Quick Log Consolidation and Malware Blocking"
What do you like best about Torq?

Powerful tool for vulnerability management which helps with regular scanning of the network and also in prioritizing vulnerabilities in our systems. Right out of the box Torq was discovering vulnerabilities on the network that previous vendors were not discovering because of its brilliant ability to consolidate logs from all devices into one dashboard for effective analysis. Review collected by and hosted on G2.com.

What do you dislike about Torq?

There is nothing to dislike about this tool just that its robust so be prepared to do some scan engine configurations. Review collected by and hosted on G2.com.

SP
System Administrator
Mid-Market (51-1000 emp.)
"Solid choice for network protection with better stability and more device security functions"
What do you like best about Torq?

It’s proactive threat protection option is very useful and the weekly and monthly scan reports can be scheduled and automated and the network logs are very descriptive which helped us build a very effective firewall function as we get data from many sources and protect our devices from ransomware which could be so harmful to our data. Review collected by and hosted on G2.com.

What do you dislike about Torq?

For me I have been using this threat protection platform at work for our company environment without any downsides. It is ideal if you want a reliable solution that does the job well. Review collected by and hosted on G2.com.

NM
IT Security Operations Asst.
Mid-Market (51-1000 emp.)
"Finds vulnerabilities in a quick manner and suggests the most secure firewall optimization practices"
What do you like best about Torq?

I have used Torq’s threat detection service and I was very satisfied with the results obtained. The network scanning process was very comprehensive and thorough, with a detailed assessment of vulnerabilities in the system and possible solutions to fix them. Review collected by and hosted on G2.com.

What do you dislike about Torq?

With this functionality and the quality of service received there is no competition, it is exactly what I needed and nothing complain about so far. Review collected by and hosted on G2.com.

ML
SOC Analyst
Mid-Market (51-1000 emp.)
"Fantastic tool offering very reliable vulnerability scanning and patch management in one offering"
What do you like best about Torq?

This tool provides a lot of features which are missing in other threat management tools like custom reports, risk score, and unlimited network scans. I like how it allows a broader view of risk exposure across different devices throughout the organization. The features included provide a complete vulnerability management solution without the need for too much configuration. Review collected by and hosted on G2.com.

What do you dislike about Torq?

There isn’t one single thing that it doesn’t do effectively and its completeness in threat management is just amazing. Review collected by and hosted on G2.com.

Discussions related to Torq

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing Insights

Averages based on real user reviews.

Time to Implement

1 month

Return on Investment

8 months

Average Discount

19%

Torq Comparisons
Product Avatar Image
Tines
Compare Now
Product Avatar Image
Swimlane
Compare Now
Product Avatar Image
Splunk SOAR (Security Orchestration, Automation and Response)
Compare Now
Torq Features
Resolution Automation
Resolution Guidance
Threat Intelligence
Incident Reports
Workflow Mapping
Workflow Automation
Automated Remediation
Security Orchestration
Data Collection
Threat Intelligence
Product Avatar Image
Product Avatar Image
Torq