List of Torq Threat Hunting Customers
Osaka, 550-0015,
Japan
Since 2010, our global team of researchers has been studying Torq Threat Hunting customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Torq Threat Hunting for Threat Modeling from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Torq Threat Hunting for Threat Modeling include: Check Point Software, a Israel based Professional Services organisation with 6669 employees and revenues of $2.57 billion, Valvoline Inc, a United States based Oil, Gas and Chemicals organisation with 8900 employees and revenues of $1.24 billion, Deepwatch, a United States based Professional Services organisation with 350 employees and revenues of $55.0 million and many others.
Contact us if you need a completed and verified list of companies using Torq Threat Hunting, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Torq Threat Hunting customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Check Point Software | Professional Services | 6669 | $2.6B | Israel | Torq | Torq Threat Hunting | Threat Modeling | 2023 | n/a |
In 2023, Check Point Software deployed Torq HyperSOC and implemented Torq Threat Hunting as part of a Threat Modeling initiative to reduce alert fatigue and speed SOC investigations. The deployment centralized automation of triage, enrichment, and response across its global security operations, leveraging dozens of AI driven playbooks to accelerate incident handling.
Torq Threat Hunting capabilities were used within the HyperSOC to support continuous threat detection, automated triage, contextual enrichment, and containment orchestration. Configuration emphasized playbook driven automation, orchestration of incident enrichment data, and automated decision steps to route or remediate alerts, aligning with common Threat Modeling functional workflows for detection engineering and SOC investigations.
Operational coverage extended to Check Point's global SOC teams and security operations, with rollout focused on embedding automated triage into analyst investigation workflows and reducing manual escalation. Governance changes included updating SOC procedures to incorporate playbook approvals and automated response gates, and establishing monitoring of playbook execution across sites. The stated outcomes were reduced alert fatigue and faster SOC investigations through automated triage, enrichment, and response, with Torq Threat Hunting providing the threat detection and hunting capabilities within the HyperSOC framework.
|
|
|
Deepwatch | Professional Services | 350 | $55M | United States | Torq | Torq Threat Hunting | Threat Modeling | 2023 | n/a |
In 2023 Deepwatch adopted Torq Hyperautomation and deployed Torq Threat Hunting to hyperautomate managed detection and response customer onboarding and to standardize incident response playbooks across its service portfolio in the United States. The deployment positioned Torq Threat Hunting within the Threat Modeling category as the operational engine for triage orchestration and enrichment workflows used by Deepwatch analysts during investigative workstreams.
Torq Threat Hunting was configured to centralize triage logic and automate enrichment tasks, enabling standardized response playbooks and scripted escalation steps. Implementation focused on playbook orchestration, automated evidence enrichment, and workflow automation to reduce manual handoffs during initial onboarding and subsequent investigations.
Operational coverage extended across Deepwatch managed security customers in the United States and was embedded into the companys MDR operations and analyst workflows. Integrations with specific third party systems are not stated, the implementation instead emphasized platform-driven orchestration and consistent triage procedures across customer engagements to ensure repeatable investigations and faster time-to-value.
Governance changes included formalizing standardized response playbooks and operational runbooks, aligning analyst procedures to the Torq Threat Hunting automations. Reported outcomes included improved onboarding speed and enhanced customer ROI for Deepwatch managed security customers, driven by the standardized triage and enrichment workflows.
|
|
|
Valvoline Inc | Oil, Gas and Chemicals | 8900 | $1.2B | United States | Torq | Torq Threat Hunting | Threat Modeling | 2023 | n/a |
In 2023, Valvoline Inc implemented Torq Threat Hunting as part of a Torq Hyperautomation deployment in its North American SOC. The deployment is classified in the Threat Modeling category and was provisioned to support security operations and incident response workflows.
Torq Threat Hunting features were leveraged to automate phishing triage, containment, and case management, enriching alerts and accelerating investigations and remediation. Functional configuration included automated triage rules, orchestration of real-time containment actions, and structured case workflows to expedite analyst handoffs and evidence collection.
The implementation was embedded into the SOC alert pipeline across North America, operating across security operations and incident response teams and focusing on phishing-related threat vectors. Integrations were used to drive containment actions and to populate case management records, improving alert enrichment and investigation speed.
Operational governance introduced centralized, playbook driven workflows and formal case ownership handoffs to standardize triage and remediation steps. The Torq Threat Hunting deployment reclaimed approximately 6 to 7 analyst hours per day and enabled real-time containment actions, streamlining SOC case management and reducing manual containment effort.
|
Buyer Intent: Companies Evaluating Torq Threat Hunting
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||