Skip to main content

Integrate Anything. Automate Everything.

Discover how Torq's powerful integration capabilities transform your security operations by seamlessly connecting with any system.

Overview

Torq connects with virtually any system, enabling you to build security operations that are fully interconnected and automated.

Integrations and data connectors

Torq supports two approaches to connecting with third-party sources:

  • Integrations: A custom approach to pulling data from a third-party source. Integrations typically require additional work such as transformation, deduplication, and logic to make the data usable within workflows.

  • Data connectors: A plug-and-play solution that handles ingestion, transformation, deduplication, and related logic out of the box, with minimal setup required.

If a system can communicate, Torq can connect to it. Torq gives you two paths to get there:

  • You build it: Non-technical users get developer-like powers through no-code tools, while advanced users have access to full-code capabilities.

  • We build it: Torq's customer success team can accelerate your integration development. Torq also regularly introduces new out-of-the-box integrations.

Always up-to-date integrations

Torq's managed integrations are designed to keep your automations running without constant monitoring. The platform proactively updates to stay aligned with changes in third-party APIs, so you can focus on your business rather than maintaining your integrations.

Connect to any interface

Beyond standard API communication, Torq connects through SSH, PowerShell, SQL, Python, Bash, Kubernetes, and CLI tools for AWS, GCP, and Azure. This flexibility is especially valuable for complex or legacy systems that require a non-standard integration approach.

Trigger and step integrations

Torq supports two types of runtime integrations:

  • Trigger integrations: Execute workflows based on specific events, enabling immediate and accurate responses to your security environment.

  • Step integrations: Perform direct operations within third-party systems, securely authenticating actions and enhancing workflow efficiency.

Supported integration categories

Torq supports a wide range of security domains, including:

  • Cyber Defense

  • Chatbots

  • Cloud Security Posture Management (CSPM)

  • Endpoint Detection and Response (EDR)

  • Identity and Access Management (IAM)

  • Phishing Response

  • Security Information and Event Management (SIEM)

  • Threat Hunting

Top Integration Categories

From cloud-native applications to threat intelligence, Torq supports a wide range of security domains, including:

  • Cyber Defense

  • Chatbots

  • Cloud Security Posture Management (CSPM)

  • Endpoint Detection and Response (EDR)

  • Identity and Access Management (IAM)

  • Phishing Response

  • Security Information and Event Management (SIEM)

  • Threat Hunting and more

How to use

The setup process varies by vendor, refer to the detailed integration guides for vendor-specific instructions.

Did this answer your question?