Torq Trust Center

Get access to this Torq Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

At Torq, we understand the challenges facing front-line security teams, who are often overwhelmed as the number of security events continues to rise within increasingly complex environments.

Our platform helps front-line teams and CISOs by delivering lightweight, modern security automation that is easily integrated with their existing tools set, and flexible enough to seamlessly scale as organizations’ needs change.

Welcome to Torq's Security Trust Center. Built with a security mindset from the foundation up, Torq platform and its operations comply with the industry-leading standards. Our operations are monitored continuously to ensure that all controls are enforced at all times.

Use this portal to learn about our security posture and request full access to our security documentation.

Email us at security@torq.io if you have any additional questions not answered by this Portal.

Compliance

CCPA Logo
CCPA
CSA STAR Logo
CSA STAR
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
SOC 2 Logo
SOC 2
Get access to this Torq Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Torq is reviewed and trusted by

ArmisArmis
LemonadeLemonade
AgodaAgoda
Abnormal SecurityAbnormal Security
SentinelOneSentinelOne
BlackstoneBlackstone
HashiCorpHashiCorp
ZoomInfoZoomInfo
RiskifiedRiskified
FiverrFiverr
ironSourceironSource
Chipotle Mexican GrillChipotle Mexican Grill

Documents

Network Diagram
Pentest Report
GDPR
ISO 27001
SOC 2
CAIQ
Cyber Insurance
Service-Level Agreement
Subprocessors
Access Control Policy
Backup Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Other Policies
Password Policy
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy
BC/DR
Data and secrets safety, privacy and security
Security architecture policy
Torq Code of Business Conduct and Ethics
Torq data retention archive and destruction policy

Risk Profile

Data Access LevelInternal
Recovery Time Objective12 hours
Recovery Point Objective24-48 hours
See more

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Network Diagram
Other Reports
Pentest Report
See more

Self-Assessments

CAIQ

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Credential Management
See more

Data Privacy

Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
BC/DR
See more

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
See more

Network Security

Firewall
Security Information and Event Management
Spoofing Protection
See more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
See more

Policies

Access Control Policy
Backup Policy
Encryption Policy
See more

Security Grades

Qualys SSL Labs
Commercial website
A
Torq application
A+

Trust Center Updates

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo