Breaking down the challenges of securing IoT, IoMT, and critical infrastructure

Pandian Gnanaprakasam, ORDR’s co-founder, shares front-line insights on securing connected devices — from high-risk IoT and unmanaged assets to IoMT in hospitals, industrial systems, and building-management systems across critical industries. In the Founder’s Corner, he reflects on the breakthroughs and lessons that shaped ORDR’s unified approach to visibility, risk reduction, and segmentation in today’s hyper-connected world.

From Outdated to Actionable: Reinventing the CMDB with ORDR + ServiceNow

Read More

Matrix Reloaded: Why Segmentation Fails — and How ORDR Fixes it with AI

Read More

Making Zero Trust Real: AI-driven segmentation with Cisco and ORDR

Read More

TSA Cybersecurity Mandates and Beyond: Strategies for Securing Mission-Critical Environments

Read More

The Hidden Risks of Agentless Devices: How to Secure Your Expanding Attack Surface

Read More

Honoring Veterans Day: United in the Fight for National Security

Read More

Another Year, Another SOC 2 Win

Read More
Organizations need to defend against vulnerabilities discovered in the Chrome browser. Ordr can help protect its customers’ environments.

Detect & Defend Against Chrome Vulnerabilities Using OrdrAI

Read More

Ordr Security Bulletin: Defeating Black Basta with OrdrAI

Read More
Cyber asset attack surface management (CAASM) is a hot cybersecurity category. Learn what true CAASM is, Ordr’s CAASM capabilities, and what sets us apart from the pretenders.

Embrace the Future of Cyber Asset Attack Surface Management

Read More
CAASM is a hot category in cybersecurity, but not all CAASM tools are the same. Find out what makes Ordr different.

Not All CAASMs Are Created Equal: How Ordr Is Different

Read More
The ConnectWise Screen Connect vulnerability puts many enterprises at risk of a cyberattack. Ordr can identify and mitigate the vulnerability.

ConnectWise ScreenConnect CVE Vulnerabilities

Read More
Users of the Ordr platform can find, identify, and protect at-risk cyber assets targeted by the Chinese state-sponsored Volt Typhoon threat group.

Ordr Security Bulletin – Volt Typhoon State-Sponsored Cyber Actor

Read More
Ordr co-founder Pandian Gnanaprakasam looks back over what the company accomplished during 2023, and looks ahead at what's to come in 2024.

Celebrating a Remarkable Year: Ordr’s 2023 Triumphs and 2024 Aspirations

Read More
At Ordr we are committed to security. Here’s a Closer Look at our Commitment to Customer Security and why we make the effort to undergo the SOC 2 Journey

A Closer Look at Ordr’s Commitment to Security: The SOC 2 Journey

Read More
Wes Wright, former Sutter Health CTO, Seattle Children's CIO, and retired Air Force colonel, joins Ordr as the company’s first Chief Health Officer.

Welcome Wes Wright: Another Great Day at Ordr

Read More
Vulnerabilities found in the managed file transfer (MFT) solution MOVEit put enterprises at severe risk of a data breach.

Ordr Security Bulletin: MOVEit Vulnerabilities

Read More
Ordr co-founder and CPO Pandian Gnanaprakasam addresses the impacts digital transformation has on connected device security.

The Impact of Digital Transformation on the Security of Connected Devices

Read More
What are the top 10 risks of not getting your CMDB in order? How can you change the situation with real-time device discovery?

Top 10 Risks of Not Getting Your CMDB In Order and How That Changes Today

Read More
It was a year of important team growth, market growth, & significant innovative breakthroughs for Ordr. Gnanaprakasam Pandian recaps Ordr’s 2022.

A Time of Challenge, Change, and Celebration: Ordr’s Year in Review

Read More
In response to vulnerabilities discovered in OpenSSL, Ordr issues a Security Advisory outlining the threat and how Ordr helps to find, mitigate it.

Open SSL Security Advisory on Critical Vulnerability

Read More
Looking closely at security trend studies like Verizon’s Data Breach Investigation Report, you find the need for and value of accurate threat data.

The Importance of Accurate Device and Flow Context

Read More
Ordr launches Clinical Defender 8.1, a full-lifecycle vulnerability management platform to protect healthcare organizations from threats.

Why Healthcare Organizations Struggle with Vulnerability Management

Read More
When a high-profile whistleblower suggested a major corporation cut corners on cybersecurity people started talking because the story rang true.

Whistleblower’s Twitter Claims Ring True for Connected Device Universe

Read More
North Korean cybercriminals using Maui ransomware are targeting healthcare organizations. Ordr helps them ID and mitigate the threat quickly.

A Response to Maui Ransomware

Read More
Ordr closed a $40 million C-round of venture funding. Here’s how we got there, what it means, and how we intend to invest the new capital in our mission.

Ordr’s Innovation Journey: From Seed to Shining C

Read More
Russia’s history of sponsoring cybercrime has raised concern over increasing attacks on U.S. and western countries in light of the war in Ukraine.

Understanding The Threat of Device Communications to Russia

Read More
The Cisco-Ordr collaboration enables Zero Trust to help enterprises minimize their attack surfaces. Read our blog for more about the partnership.

Ordr Teams up with Cisco to Keep Connected Devices Secure

Read More
Behavioral analytics are important for understanding the IT estate, detecting/preventing threats, and minimizing a cyberattack blast radius.

Solving IoT Security Challenges with Behavioral Analytics

Read More
For many organizations, second line cyber defenses amount to simply recreating the first line of defense. Here’s why this approach misses the mark.

Building a Better Second Line of Cyberdefense

Read More
Identity is foundational to modern security models, allowing organizations to control data or services a user or account should be able to access.

It’s All About Identity

Read More
Design thinking is a team-based iterative process and the basis for a five-stage framework Ordr uses to develop and deploy our IoT security platform.

Design Thinking – How to Make Complex Data, Simply Useful

Read More
Ordr announced availability of Clinical Defender to help healthcare organizations better manage threats and defend against increasing attacks.

Ordr Clinical Defender: HTM for Modern Healthcare

Read More
The White House’s Ambitious Goal of Achieving Zero Trust posture, includes the need for better connected device inventory, management, security.

Achieving a Zero Trust Posture with its Device Inventory

Read More
SOC 2 defines criteria for managing customer data by 5 key principles: security, availability, processing integrity, confidentiality, privacy.

Ordr’s SOC 2 Type 2 Certification:

Read More
Following disclosure of Log4j vulnerability, Ordr detailed how the platform can be used to detect and protect against attacks leveraging Log4j.

Ordr Response to Log4j Vulnerability

Read More
Battery Ventures’ partner Rene Bonvanie has been providing expert cybersecurity counsel to Ordr as a member of the board from the very beginning.

Welcome René Bonvanie, our new Executive Chairman of the Board

Read More
IoT Device Discovery and Security

Introducing Ordr Core and IoT Discovery Program:

Read More
How Ordr customers are identifying account misuse through employee access

How Ordr Customers Are Identifying Account Misuse Through Employee Access

Read More
Segmentation is what keeps chaos from breaking out at the zoo. Segmentation can keep chaos from breaking out on your network.

Finding Peace & Segmentation at the Zoo

Read More
Device segmentation is essential for protecting at-risk devices (IoT, IoMT) and the networks they attach to from cyberattack.

Segmentation Done Right – Part 3: Take Control

Read More
Device segmentation is essential for protecting at-risk devices (IoT, IoMT) and the networks they attach to from cyberattack.

Segmentation Done Right – Part 2: Seeking a Better Way

Read More
Device segmentation is essential for protecting at-risk devices (IoT, IoMT) and the networks they attach to from cyberattack.

Segmentation Done Right – Part 1: Great Idea

Read More
There are six levels of control for managing devices in the network. Knowing them is essential for maintaining cybersecurity.

The Six Levels of Enterprise Asset Control

Read More
It was a year of important team growth, market growth, & significant innovative breakthroughs for Ordr. Gnanaprakasam Pandian recaps Ordr’s 2022.

Application & User Control

Read More
The modern manufacturing floor relies on sensors and controllers of all kinds. And each device increases the attack surface.

Behave You: Network Control

Read More
Knowing what devices you have and how they are supposed to operate is essential for detecting, preventing security incidents.

Network Control: Controlling Those Side to Side Movements

Read More
Airlines have enough trouble keeping planes on schedule and passengers happy. Now they must also worry about cybersecurity.

Making the Friendly Skies Safe

Read More
Security risks, implications must be considered as warehouses and big box retailers grow more reliant on connected devices.

Clean-Up in Aisle 7

Read More
Cybercriminals are exploiting device vulnerabilities to steal billions from casinos without the Oceans 11 glamor or intrigue.

Protecting Casinos from Heists…The Cyber Kind

Read More
Healthcare’s profound digital transformation comes at the cost of higher risk of cyberattack as networks become more complex.

Closing the Door to Cyber Vulnerabilities at Hospitals

Read More
Smart buildings and smart cities deliver great benefits for citizens, but they require special approaches for cybersecurity.

Cyber Attacks in Smart Buildings

Read More
We look at how the explosion of cyber assets and their operational data creates cybersecurity challenges for the enterprise.

A Tree is Worth a Thousand Leaves

Read More
Solutions to complex problems rely on large amounts of rich, accurate data. That is why Ordr offers the device flow genome.

Mapping the Device Flow Genome

Read More

Interested in
Learning More?

Subscribe today to stay informed and get
regular updates from ORDR Cloud

Ready to Get Started?

REQUEST A DEMO