Overview
Torq connects with virtually any system, enabling you to build security operations that are fully interconnected and automated.
Integrations and data connectors
Torq supports two approaches to connecting with third-party sources:
Integrations: A custom approach to pulling data from a third-party source. Integrations typically require additional work such as transformation, deduplication, and logic to make the data usable within workflows.
Data connectors: A plug-and-play solution that handles ingestion, transformation, deduplication, and related logic out of the box, with minimal setup required.
If a system can communicate, Torq can connect to it. Torq gives you two paths to get there:
You build it: Non-technical users get developer-like powers through no-code tools, while advanced users have access to full-code capabilities.
We build it: Torq's customer success team can accelerate your integration development. Torq also regularly introduces new out-of-the-box integrations.
Always up-to-date integrations
Torq's managed integrations are designed to keep your automations running without constant monitoring. The platform proactively updates to stay aligned with changes in third-party APIs, so you can focus on your business rather than maintaining your integrations.
Connect to any interface
Beyond standard API communication, Torq connects through SSH, PowerShell, SQL, Python, Bash, Kubernetes, and CLI tools for AWS, GCP, and Azure. This flexibility is especially valuable for complex or legacy systems that require a non-standard integration approach.
Trigger and step integrations
Torq supports two types of runtime integrations:
Trigger integrations: Execute workflows based on specific events, enabling immediate and accurate responses to your security environment.
Step integrations: Perform direct operations within third-party systems, securely authenticating actions and enhancing workflow efficiency.
Supported integration categories
Torq supports a wide range of security domains, including:
Cyber Defense
Chatbots
Cloud Security Posture Management (CSPM)
Endpoint Detection and Response (EDR)
Identity and Access Management (IAM)
Phishing Response
Security Information and Event Management (SIEM)
Threat Hunting
Top Integration Categories
From cloud-native applications to threat intelligence, Torq supports a wide range of security domains, including:
Cyber Defense
Chatbots
Cloud Security Posture Management (CSPM)
Endpoint Detection and Response (EDR)
Identity and Access Management (IAM)
Phishing Response
Security Information and Event Management (SIEM)
Threat Hunting and more
How to use
To get started, navigate to Build > Integrations.
The setup process varies by vendor, refer to the detailed integration guides for vendor-specific instructions.


