Ordr works with Tenable to seamlessly discover all connected assets including IoT, IoMT, and OT devices. The joint solution enables Tenable to perform the right scan at the right time regardless of the device type, location, criticality or role within the organization.

How It Works

Ordr automatically discovers and classifies all network connected devices and gathers granular context such as make, model,
hardware, OS, and software versions by passively analyzing network traffic with deep packet inspection. Ordr can then send
collected device details to a customer’s Tenable.io or Tenable.sc instance, providing these tools with a detailed understanding of
which assets to scan and the type of scan best suited to each device.


  • Comprehensive Coverage – Ordr’s identification and classification of lightweight, agentless devices allows administrators to quickly exclude specific IoT devices or categories from active Tenable scans, opening network segments to vulnerability scanning that had previously been excluded. 
  • Optimized Scanning – Using Ordr’s detailed insight into device types, scan sensitivity, and their critical role within the organization, Tenable scans can be tailored to each device. 
  • Proactive Protection – Rather than blocking or quarantining critical IoT devices after infection, Ordr’s segmentation policies create barriers that protect vulnerable devices while still enabling essential services. 
  • Smart Scheduling – Ordr tracks utilization patterns for critical devices, allowing administrators to schedule vulnerability scans for times when devices are not in use, minimizing disruption and operational risk.