Best Software for 2025 is now live!
By torq
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Torq Features

What are the features of Torq?

Response

  • Threat Intelligence
  • Alerting
  • Performance Baselin
  • High Availability/Disaster Recovery

Records

  • Incident Logs
  • Incident Reports

Management

  • Workflow Management

Automation

  • Workflow Mapping
  • Workflow Automation
  • Automated Remediation
  • Log Monitoring

Orchestration

  • Security Orchestration
  • Data Collection
  • Threat Intelligence
  • Data Visualization

Filter for Features

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction. This feature was mentioned in 10 Torq reviews.
87%
(Based on 10 reviews)

Resolution Guidance

Guide users through the resolution process and give specific instructions to remedy individual occurrences. 10 reviewers of Torq have provided feedback on this feature.
88%
(Based on 10 reviews)

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied. 10 reviewers of Torq have provided feedback on this feature.
80%
(Based on 10 reviews)

Threat Intelligence

As reported in 10 Torq reviews. Gathers information related to threats in order to gain further information on remedies.
87%
(Based on 10 reviews)

Alerting

As reported in 78 Torq reviews. Clearly notifies users with relevant information and anomalies in a timely manner.
91%
(Based on 78 reviews)

Performance Baselin

Sets a standard performance baseline by which to compare log activity. This feature was mentioned in 74 Torq reviews.
89%
(Based on 74 reviews)

High Availability/Disaster Recovery

Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities. 70 reviewers of Torq have provided feedback on this feature.
90%
(Based on 70 reviews)

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics. 10 reviewers of Torq have provided feedback on this feature.
82%
(Based on 10 reviews)

Incident Reports

As reported in 10 Torq reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
80%
(Based on 10 reviews)

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage.

Not enough data

Management

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data

Workflow Management

Based on 10 Torq reviews. Administrators can organize workflows to guide remedies to specific situations incident types.
93%
(Based on 10 reviews)

Automation

Workflow Mapping

Based on 76 Torq reviews. Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
91%
(Based on 76 reviews)

Workflow Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. This feature was mentioned in 78 Torq reviews.
93%
(Based on 78 reviews)

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 78 reviewers of Torq have provided feedback on this feature.
92%
(Based on 78 reviews)

Log Monitoring

Constantly monitors logs to detect anomalies in real time. 74 reviewers of Torq have provided feedback on this feature.
89%
(Based on 74 reviews)

Orchestration

Security Orchestration

Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 78 Torq reviews.
93%
(Based on 78 reviews)

Data Collection

As reported in 76 Torq reviews. Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
92%
(Based on 76 reviews)

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 77 Torq reviews.
89%
(Based on 77 reviews)

Data Visualization

Offer pre-built and custom reporting and dashboards for quick insights into system states. This feature was mentioned in 75 Torq reviews.
86%
(Based on 75 reviews)

Functionality

User provisioning

Simplifies or automates user provisioning, deprovisioning, and other user role changes.

Not enough data

Password manager

Offers password management tools to end users.

Not enough data

Single Sign-on

Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.

Not enough data

Enforces policies

Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.

Not enough data

Authentication

Authenticates users prior to granting access to company systems.

Not enough data

Multi-factor authentication

Offers multi-factor authentication methods to verify a user's identity.

Not enough data

Type

On-premises solution

Provides an IAM solution for on-prem systems.

Not enough data

Cloud-solution

Provides an IAM solution for cloud-based systems.

Not enough data

Reporting

Tracking

Tracks user activities across protected systems.

Not enough data

Reporting

Provides reporting functionality.

Not enough data

Configuration

DLP Configuration

Offers data loss prevention tools to protect data from leaving the environments it is allowed to.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Unified Policy Management

Allows users to track and control security policies across cloud services and providers.

Not enough data

Adaptive Access Control

Provides a risk-based approach to determining trust within the network.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Visibility

Multicloud Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Asset Discovery

Detect new assets as they enter a cloud environments and networks to add to asset inventory.

Not enough data

Vulnerability Management

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.

Not enough data

Vulnerability Scanning

Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Vulnerability Intelligence

Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data