FINGERPRINT: EQoRZF5CQBBzRUhDEXpYRBFkXhBjVUdfXUVFWV5eWEpUEGJVUkVDWUVJEX9BQxFnWERZEH1ZR1URdFBEUBB8UUFD
: SYSTEM UNKNOWN

Torq Buys Jit To Revolutionize Security Ops With Live Data Maps

Torq Acquires Jit to Power Next-Generation Security Operations

On May 19, 2026, the security automation leader Torq bought Jit, a startup known for its smart data maps. This move brings a massive shift to the security operations center. Instead of forcing security teams to stare at thousands of separate, confusing alerts, Torq will now use Jit's technology to build a live map of how an organization actually works. This live map connects users, tools, and business goals in real time to help software make smart decisions on its own.

Behind this deal lies a massive war chest. Torq recently closed a $140 million Series D funding round, which valued the company at a staggering $1.2 billion. With this money, the company is putting its software agents deep inside the networks of massive brands like PepsiCo, Siemens, and Uber. Security automation is no longer a luxury for tech startups. It is now a core system for the biggest businesses on earth.

In Boston, Jit built its reputation by solving a very hard technical problem. Founded by David Melamed and Aviram Shmueli, the company raised nearly $40 million from big venture firms like Boldstart Ventures and Tiger Global. Under the guidance of CEO Shai Horovitz, who formerly helped run Cybereason, Jit hired a brilliant group of engineers to map out how cloud applications and data connect.

Torq is now absorbing this entire team to speed up its own software development.

The Hidden Engine Behind Autonomous Security Decisions

This acceleration is designed to address a critical vulnerability: most security systems fail because they are blind to the real world. Under the hood, traditional tools only look at static lists of computers and users. If an employee logs in from a new coffee shop, the old tools sound an alarm because they do not understand the situation.

By integrating Jit's live data map, the Torq platform actually understands who has permission to access sensitive data and why. This means the AI can spot real threats without bothering human workers with useless alerts.

In the high-pressure world of security operations, speed is everything. When an attack happens, human analysts often spend hours digging through different databases to find out what happened. Torq aims to cut this time down to seconds. The AI can now isolate a compromised laptop, block a bad IP address, and warn the IT team in one single, fluid motion. Security teams can finally stop playing defense and start winning the war against hackers.

The Global Consolidation of Cybersecurity Infrastructure

This evolution of capabilities is driving a broader shift across the entire technology market, where a massive wave of consolidation is happening. Corporate buyers are tired of managing fifty different security products that do not talk to each other. They want a single, unified layer that can ingest data and take action immediately. Torq is positioning itself as that single layer. This acquisition shows that the era of tiny, specialized security tools is coming to a rapid end.

This shift is further fueled by the rise of agentic AI. As these platforms transition from simple assistants to active operational tools, corporate trust becomes the ultimate currency; if a business cannot trust these systems to act on their own, it will simply move too slow to survive.

The Friction of Letting Algorithms Pull the Trigger

However, this relentless drive toward total automation is causing a massive firestorm in the tech community. Many security leaders are absolutely terrified of letting a computer make autonomous decisions. At recent industry events, security chiefs have openly argued about the dangers of rogue software.

Imagine a scenario where a well-meaning AI accidentally shuts down a company's main payment system during a busy holiday because it mistook a routine update for a cyberattack.

This fear is real, and it has sparked intense debates on platforms like the OWASP forums, where experts argue over how much control we should give to machines.

To understand this battle better, you can read the latest security guidelines from CISA on how to safely deploy automated software. Many experts suggest starting with a hybrid model where the AI recommends actions but a human still clicks the final button.

Over time, as trust grows, companies can slowly remove the human from the loop. For more details on this transition, look up the research papers from the SANS Institute regarding automated incident response failures in large networks.

The Rise of Graph Theory in Digital Defense

To prevent these failures and achieve the structural mapping accuracy required for safe automation, developers are changing how they model corporate networks. For decades, security tools relied on basic tables to organize data. These databases worked well for simple tasks, but they failed to show how different systems interact in modern cloud environments.

Graph databases solve this problem by treating every asset as a point and every interaction as a line. By analyzing these lines in real time, security teams can trace the exact path an attacker took through a network.

This math-based approach is now the standard for modern digital defense.

Other posts:
System Unknown is a technology-focused platform covering AI transformation, industrial automation, cybersecurity, and aerospace engineering. We provide analysis on industry trends and educational content regarding scientific advancement. Learn more about us