Category: Uncategorized

Don’t Orphan Your IoT Project!

Companies across a wide swath of vertical industries are deploying IoT in a range of use cases to improve business processes, drive revenue, and reduce costs. In our recent 2019/2020 IoT research study, Nemertes found that 67% of 403 participating firms said they had IoT initiatives (or would have them by the end of 2019.)…

Read More

Hey, Let’s Implement Zero Trust Across the Enterprise. It’s Easy, Right??

It’s an unassailable reality for today’s enterprise organizations:  security and network teams must continue to do more to address the rapidly growing mass of devices that are being connected to their networks.  And they absolutely must keep up with this increased device scale without the benefit of analogous scale to their resources, neither human nor capital. …

Read More

A Tree is Worth a Thousand Leaves

The Numbers Game Today, virtually every device connects to the enterprise network. From simple function IoT devices to multi-million-dollar operational systems, modern devices utilize data connectivity to perform highly specialized tasks much more intelligently. The sheer heterogeneity of these devices is growing exponentially. Effectively regulating these devices, in terms of what it can and cannot do…

Read More

BlueKeep Wormable Windows Bug the Next WannaCry? Not If Everything’s in Ordr.

Microsoft is warning users of legacy Windows OS systems that they must act quickly to patch the newly-detected BlueKeep Wormable vulnerability or face dire consequences that could rise to the level of the WannaCry attack that shut down systems worldwide in 2017.  Yikes. “An attacker who successfully exploited this vulnerability could execute arbitrary code on the…

Read More

Everything in Ordr: Managing Software Patches

One thing that will never change for IT teams is the never-ending need to patch system software.  Microsoft recently released a massive system patch update that contains fixes for 74 vulnerabilities.  Alarmingly, two known issues addressed in the release are zero-day vulnerabilities, leaving unpatched systems at extremely high risk. Check out this article for more detail….

Read More

Welcome to the hyper-connected enterprise

The history of enterprise computing is one of increasing scale, complexity and heterogeneity. First there was client-server computing, ushering in the PC era where there was a computer for every employee and several switch ports in every cubicle. And then the mobile enterprise, with a new generation of employees using their laptops, tablets and smartphones…

Read More

Mapping the Device Flow Genome

Incredibly complex problems cannot be solved without first establishing a baseline of understanding the elements of the problem in very fine grain detail. In the medical community, for example, development of targeted therapy for many serious diseases was comparatively ineffective before the mapping and sequencing of more than 3 billion nucleotides in the human genome….

Read More

What’s in a name?

Ordr. Four simple letters that will undoubtedly elicit varying reactions from our customers, partners, friends and family. We certainly think – and hope – the vast majority will be excited and positive. That’s been our experience as we’ve shared the brand name with those closest to us. They find it to be friendly, approachable, elegant…

Read More