The Silent Push Torq integration enables Torq users to enrich domain and IP address data by leveraging Silent Push’s threat intelligence. This integration provides pre-built and customizable workflow templates to streamline threat detection, analysis, and response within the Torq platform.
Key Features
The Silent Push Torq integration supports the following capabilities:
Access Silent Push Data: Query Silent Push APIs for domain and IP information not found in a local cache.
Automate Tasks: Utilize pre-built and customizable workflow templates to automate security processes.
Enrich Threat Indicators: Enhance Indicators of Compromise (IOCs) and Indicators of Future Attack (IOFAs) with contextual threat intelligence.
Benefits
Streamlined Automation: Simplifies security operations with pre-built and customizable workflows.
Enhanced Threat Intelligence: Enriches IOCs and IOFAs with real-time domain and IP data for deeper insights.
Efficient Data Retrieval: Queries Silent Push APIs for up-to-date information, bypassing outdated local caches.
Flexible Integration: Supports diverse use cases through two distinct integration options.
Requirements
To use the Silent Push Torq integration, you need:
Silent Push API Key: A valid API key from a Silent Push account for authentication.
Integration Options
Silent Push offers two integrations with Torq to accommodate different workflow needs. For detailed information on each integration, including prerequisites, installation, and configuration, refer to: