Torq Features
What are the features of Torq?
Response
- Threat Intelligence
- Alerting
- Performance Baselin
- High Availability/Disaster Recovery
Records
- Incident Logs
- Incident Reports
Management
- Workflow Management
Automation
- Workflow Mapping
- Workflow Automation
- Automated Remediation
- Log Monitoring
Orchestration
- Security Orchestration
- Data Collection
- Threat Intelligence
- Data Visualization
Torq Categories on G2
Filter for Features
Response
Resolution Automation | Diagnose and resolve incidents without the need for human interaction. This feature was mentioned in 10 Torq reviews. | 87% (Based on 10 reviews) | |
Resolution Guidance | Guide users through the resolution process and give specific instructions to remedy individual occurrences. 10 reviewers of Torq have provided feedback on this feature. | 88% (Based on 10 reviews) | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. 10 reviewers of Torq have provided feedback on this feature. | 80% (Based on 10 reviews) | |
Threat Intelligence | As reported in 10 Torq reviews. Gathers information related to threats in order to gain further information on remedies. | 87% (Based on 10 reviews) | |
Alerting | As reported in 78 Torq reviews. Clearly notifies users with relevant information and anomalies in a timely manner. | 91% (Based on 78 reviews) | |
Performance Baselin | Sets a standard performance baseline by which to compare log activity. This feature was mentioned in 74 Torq reviews. | 89% (Based on 74 reviews) | |
High Availability/Disaster Recovery | Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities. 70 reviewers of Torq have provided feedback on this feature. | 90% (Based on 70 reviews) |
Records
Incident Logs | Information on each incident is stored in databases for user reference and analytics. 10 reviewers of Torq have provided feedback on this feature. | 82% (Based on 10 reviews) | |
Incident Reports | As reported in 10 Torq reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | 80% (Based on 10 reviews) | |
Resource Usage | Analyzes recurring incidents and remedies to ensure optimal resource usage. | Not enough data |
Management
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Database Management | Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. | Not enough data | |
Workflow Management | Based on 10 Torq reviews. Administrators can organize workflows to guide remedies to specific situations incident types. | 93% (Based on 10 reviews) |
Automation
Workflow Mapping | Based on 76 Torq reviews. Visually displays connected applications and integrated data. Allows customization and management of workflow structures. | 91% (Based on 76 reviews) | |
Workflow Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. This feature was mentioned in 78 Torq reviews. | 93% (Based on 78 reviews) | |
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 78 reviewers of Torq have provided feedback on this feature. | 92% (Based on 78 reviews) | |
Log Monitoring | Constantly monitors logs to detect anomalies in real time. 74 reviewers of Torq have provided feedback on this feature. | 89% (Based on 74 reviews) |
Orchestration
Security Orchestration | Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 78 Torq reviews. | 93% (Based on 78 reviews) | |
Data Collection | As reported in 76 Torq reviews. Collects information from multiple sources to cross reference and build contextual to correlate intelligence. | 92% (Based on 76 reviews) | |
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 77 Torq reviews. | 89% (Based on 77 reviews) | |
Data Visualization | Offer pre-built and custom reporting and dashboards for quick insights into system states. This feature was mentioned in 75 Torq reviews. | 86% (Based on 75 reviews) |
Functionality
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |
Configuration
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Unified Policy Management | Allows users to track and control security policies across cloud services and providers. | Not enough data | |
Adaptive Access Control | Provides a risk-based approach to determining trust within the network. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Visibility
Multicloud Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Asset Discovery | Detect new assets as they enter a cloud environments and networks to add to asset inventory. | Not enough data |
Vulnerability Management
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | Not enough data | |
Vulnerability Scanning | Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |