Torq Integration

Prev Next

The Silent Push Torq integration enables Torq users to enrich domain and IP address data by leveraging Silent Push’s threat intelligence. This integration provides pre-built and customizable workflow templates to streamline threat detection, analysis, and response within the Torq platform.

Key Features

The Silent Push Torq integration supports the following capabilities:

  • Access Silent Push Data: Query Silent Push APIs for domain and IP information not found in a local cache.

  • Automate Tasks: Utilize pre-built and customizable workflow templates to automate security processes.

  • Enrich Threat Indicators: Enhance Indicators of Compromise (IOCs) and Indicators of Future Attack (IOFAs) with contextual threat intelligence.

Benefits

  • Streamlined Automation: Simplifies security operations with pre-built and customizable workflows.

  • Enhanced Threat Intelligence: Enriches IOCs and IOFAs with real-time domain and IP data for deeper insights.

  • Efficient Data Retrieval: Queries Silent Push APIs for up-to-date information, bypassing outdated local caches.

  • Flexible Integration: Supports diverse use cases through two distinct integration options.

  • Requirements

To use the Silent Push Torq integration, you need:

  • Silent Push API Key: A valid API key from a Silent Push account for authentication.

Integration Options

Silent Push offers two integrations with Torq to accommodate different workflow needs. For detailed information on each integration, including prerequisites, installation, and configuration, refer to: