Orchestrate Your Security Stack With 200+ Integrations.
Our 200+ integrations connect ORDR with the security, networking, IT, and clinical tools you rely on. Together with our technology partners, ORDR helps you see more, simplify workflows, and strengthen your overall security strategy.

The ORDR Integration Ecosystem
Built for collaboration and action, ORDR’s integrations enhance visibility, strengthen intelligence sharing, and help teams respond faster — turning shared data into stronger security outcomes.
ORDR integrates with Absolute Secure Endpoint solutions to centralize complete asset intelligence and uncover security gaps for proactive risk mitigation.
The bidirectional integration between ORDR and Accruent’s Connectiv combines the power of ORDR’s connected device security platform with Accruent’s healthcare CMMS software. The joint solution enables healthcare organizations to improve inventory management while reducing device security risk.
Once ORDR collects and consolidates asset information from Connectiv, it augments the CMMS with ORDR discovered assets, and enriches existing asset with granular profile data, vulnerabilities, risk context, and utilization details.
How it works
Once ORDR collects and consolidates asset information from Connectiv, it augments the CMMS with ORDR discovered assets, and enriches existing asset with granular profile data, vulnerabilities, risk context, and utilization details.
Benefits
- Accurate and streamlined inventory management: Automatically build and maintain a complete and accurate inventory of connected healthcare devices and eliminate manual inspection and software version record-keeping
- Optimize device utilization: Monitor core components of the medical device fleet to efficiently manage and understand medical device utilization data, right-size inventories, lower costs, and optimize placement.
- Risk management: Inform security operations on the precise nature of a vulnerability or threat, quickly identify any at-risk medical devices, and take proactive measures to mitigate risk.
ORDR integrates with Addigy to centralize complete asset intelligence and uncover security gaps for proactive risk mitigation.

ORDR integrates with AIMS 3 to enable healthcare organizations to improve inventory management and accuracy, while reducing device security risk.
Information
CATEGORY
Asset Management
INTEGRATION
AIMS3
The increasing growth of cloud adoption adds a visibility black hole, making it difficult to fully understand how devices are connecting – and what those devices are actually communicating with in the cloud. This increases the risk factors of connected devices exponentially.
Gaining visibility and control across an organization’s entire attack surface of connected assets is one of the most fundamentally important – yet challenging – tasks facing IT and security teams today.
ORDR’s ability to consume STIX and TAXII – and incorporate these threat feeds into the ORDR Data Lake – now extends this security strategy to the critical realm of agentless devices such as IoT, medical devices, smart office appliances, and operational technology, and more for deep understanding of devices, behaviors, and network intelligence to identify assets, alert on threats, and automate response actions.
ORDR integrates with Apple Business Manager to centralize complete asset intelligence, uncover security gaps, prioritize vulnerabilities, and respond to threats quickly.
ORDR integrates with wired and wireless infrastructure solutions to combine network details with granular device insights and ensure accurate device classification, location details, and anomaly detection.
How it works
ORDR analyzes collected data to enhance insights through passive discovery, accurately classifying each asset. By analyzing data from Arista switches, it maps communication flows, establishing normal behavior baselines for each device. These baselines are automatically fine-tuned, updated, and compared to historical behavior and similar devices. ORDR identifies anomalies in device behavior, comparing them to global deployments. This analysis enables incident response teams to swiftly pinpoint specific devices, locations, connections, and communication details, facilitating rapid threat response.

Benefits
- See every device connecting to the network
- Identify anomalous behavior
- Accelerate response to threats
ORDR integrates with Automox to centralize complete asset intelligence and uncover security gaps for proactive risk mitigation.
ORDR integrates with Auvik to augment connected device details and ensure every endpoint is accurately mapped to its current network location and properly secured.
ORDR integrates with Avaya (Extreme Networks) wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with BigFix, an endpoint management platform built to discover, manage, and remediate all endpoints whether on-premises, mobile, virtual, or in the cloud – regardless of the operating system, location, or connectivity.
How it works
ORDR collects attributes for all BigFix managed devices and enables you to see and know more about all your devices, their connections, and vulnerabilities.
Benefits
- See Every Connected Device: Automate and centralize discovery of all managed, unmanaged and newly connected devices.
- Advanced Endpoint Profiling: Know more about devices by combining granular ORDR insights with BigFix endpoint data.
- Security Posture Compliance: Gain a comprehensive understanding of risk and generate compliance reports for all managed and unmanaged devices.
ORDR integrates with Bitdefender to provide comprehensive visibility across all agent-based and agentless devices, and risk insights for proactive risk mitigation.
ORDR integrates with BlueCat to increase data accuracy for device analytics. ORDR collects IP address assignments to devices for accurate MAC-to-IP binding to ensure security alerts and flow data are always mapped to the correct endpoint.
ORDR integration with BMC CMDB allows organizations to simplify inventory management and proactively mitigate asset risk.
ORDR integrates with Broadcom’s Carbon Black to centralize complete asset intelligence, uncover security gaps, prioritize vulnerabilities, and respond to threats quickly.
ORDR integrates with Brocade wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
Together, ORDR and Check Point allow you to Take Control of your IOT and OT security by implementing segmentation across your hyper-connected enterprise. ORDR integrates natively with Check Point Security Management for multi-gateway policy enforcement. When new devices are connected to the network, they are automatically classified and updated in Check Point Security Management and Security Gateways with the proper IoT Asset membership. Through its network and device awareness, ORDR maintains current IP addressing for IoT Assets in all Security Gateways.
How it works
Check Point Security Gateways provide scalable policy enforcement and zone controls for the enterprise. ORDR discovers, classifies and groups all devices and automatically maps them into their respective zones, areas, and cells using Check Point IoT Asset groups, and then dynamically generates Security Gateway policy rules based on these groups to deliver streamlined microsegmentation.
Benefits
- Take Control of your IOT and OT security by implementing segmentation across your hyper-connected enterprise.
Integration between ORDR and CrowdStrike ensures the security of all managed and unmanaged devices with comprehensive device visibility, detailed vulnerability insights, an understanding of risk, and the ability to enforce policy to mitigate active threats and improve security across all connected devices.
How it works
ORDR analyzes network flow data to automatically discover and classify every connected device, profile behavior, and identify active threats. Security telemetry from the CrowdStrike Falcon platform, is shared with ORDR to enhance device insights, and provide a centralized, deep understanding of each device and its associated risk. ORDR uses multiple factors to calculate risk for each device based on business context, asset criticality, vulnerabilities, and overall threat details. With additional device data from the Falcon platform, ORDR provides a highly accurate risk score for each device. By continuously synchronizing device risk scores with CrowdStrike’s enriched security data, ORDR enables teams with an up-to-date view of risk to help them focus on the most critical devices.
Benefits
Gain complete device visibility
- See into all devices – agentless and agent-based
- Track both online and offline devices continuously
- Identify unmanaged devices without CrowdStrike agent for compliance
Minimize risk with better insights
- Improve ORDR risk score accuracy with supplemental event data from CrowdStrike
Remediate faster
- Improve threat detection and incident response time with a combination of ORDR endpoint flow & CrowdStrike process data
- Block/quarantine/segment managed endpoints in ORDR for rapid remediation via the network

Integration between ORDR and Dragos provides organizations with complete and granular IT, OT, and IoT visibility, transforming deep OT intelligence into automated network segmentation policies that enhance operational resilience and reduce cyber risk.
Information
CATEGORY
Security Tools
INTEGRATION
Dragos
ORDR integrates with Duo enabling organizations to seamlessly leverage their preferred user authentication method for secure access with an extra layer of protection.
ORDR and e-Quip provide real-time insights and detailed information to manage and secure the increasing number of connected medical devices.
ORDR integration with Elastic allows SecOps teams to leverage ORDR’s rich device data to create alerts, reports, and custom analyses. ORDR transmits security alerts, device information, and other critical information. QRadar ingests the feed for improved event management.
Information
CATEGORY
SIEM & Observability
INTEGRATION
Elastic
ORDR integrates with Elisity IdentityGraph enabling organizations to enrich device identity information with detailed classification, vulnerability, and risk insights.
Learn More
ORDR integrates with EQ2 HEMS bidirectionally to augment its CMMS records with device and risk insights, while collecting additional inventory details for risk assessment.
ORDR integrates with Eracent to centralize complete asset intelligence, uncover security gaps, prioritize vulnerabilities, and respond to threats quickly.
ORDR’s ability to consume STIX and TAXII – and incorporate these threat feeds into the ORDR Data Lake – now extends this security strategy to the critical realm of agentless devices such as IoT, medical devices, smart office appliances, and operational technology, and more for deep understanding of devices, behaviors, and network intelligence to identify assets, alert on threats, and automate response actions.
ORDR integrates with Extreme networking infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Forescout providing visibility into every connected device to enable rapid response to active threats, and simplify the creation of segmentation policies for improved security.
Fortinet and ORDR have partnered to deliver an industry-leading IoT and unmanaged device security solution by integrating FortiManager, FortiGate and FortiNAC with ORDR Systems Control Engine (SCE).
ORDR integrates with Freshdesk to automate ticketing when a threat or incident is detected.
ORDR integrates with Freshworks solutions bidirectionally to augment asset intelligence and automate IT workflows for faster threat response.

ORDR integrates with Garland Technology to get comprehensive and real-time visibility into all connected devices and communications, while eliminating SPAN security concerns.
A basic tenet of network security and regulatory compliance is that “You cannot secure what you cannot see.” Gigamon and ORDR have teamed to deliver unsurpassed visibility and control into every thing connected to your network.
How It Works
The Gigamon Visibility and Analytics Fabric (VAF) optimizes data collection of all north-south and east-west traffic across branch, campus, data center and cloud. Collected data is delivered to ORDR for analysis to ensure comprehensive device classification and visibility into all device communications. Integration with Gigamon VAF also eliminates concerns of SPAN security and potential impact to network infrastructure with “yet another SPAN port or session.”
By integrating with Gigamon VAF, customers can significantly reduce the number of ORDR sensors required to comprehensively discover and monitor every network-connected device, simplifying your network and security monitoring architecture.
Benefits
- Real-time asset inventory – ORDR continuously analyzes device traffic sent from Gigamon to passively discover an automatically classify every device connected to the network to help you maintain an up-to-date and accurate inventory.
- Connected device risk – using the traffic captured and optimized by Gigamon Hawk, ORDR calculates device risk scores and uncovers connected devices with risk such as outdated operating systems, unpatched software, weak passwords, and manufacturer recalls. ORDR also maps and baselines device communications to identify risk and stop attacks.
- Accelerate Zero Trust – working together, Gigamon and ORDR can map and baseline all IT, IoT and other device communications. ORDR can then dynamically create Zero Trust policies to simplify and accelerate NAC and segmentation projects. These policies can be enforced with popular security and network devices to integrate with existing infrastructure tools.
ORDR integrates with Google Cloud Platform to extend visibility into cloud assets by collecting essential cloud instance attributes from Google Cloud.

ORDR integrates with GoTo (LogMeIn) Resolve to gather additional device and user details for centralizing complete asset intelligence and uncovering security gaps for proactive risk mitigation.
Information
CATEGORY
Endpoint and User Management
INTEGRATION
GoTo Resolve (LogMeIn)
Guardicore pulls ORDR’s device classification data and adds it to a granular map of the whole data center giving you a single view and the ability to segment unmanaged devices.
ORDR integrates with H3C wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Hirschmann wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with HPE networking infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Huawei wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integration with QRadar allows SecOps teams to leverage ORDR’s rich device data to create alerts, reports, and custom analyses. ORDR transmits security alerts, device information, and other critical information. QRadar ingests the feed for improved event management.
ORDR integrates with IGEL to gather additional connected device context for comprehensive asset intelligence and proactive risk assessment.
ORDR integration with Infoblox increases data accuracy for core analytics. ORDR collects IP address assignments to devices for accurate MAC-to-IP binding to ensure security alerts and flow data are always mapped to the correct endpoint.
ORDR integrates with IRU (formerly Kandji) to centralize complete asset intelligence, uncover security gaps, prioritize vulnerabilities, and respond to threats quickly.
ORDR integration with Ivanti MDM allows organizations to leverage rich context from all mobile devices managed by Ivanti. ORDR collects device, user and installed app details enabling you to see and know more about all your devices, connections, and vulnerabilities.
ORDR integrates with Jamf to extend visibility to all managed Apple endpoints and enrich the ORDR Data Lake with rich device context from the Jamf platform.
How it works
ORDR integration with Jamf enables organizations to extend visibility to all Jamf managed Apple devices. ORDR collects device, user, and installed application details to enrich the ORDR Data Lake and enhance the view of all devices, connections, and vulnerabilities.
Benefits
- Real-time visibility of all connected devices across all operating systems, on-prem, remote, managed, and unmanaged.
- Comprehensive insights into vulnerabilities and risk prioritized to align with your organization.
- Centralization of the view for your connected device attack surface and risk posture.
- Acceleration of threat response and proactive Zero Trust security efforts with automated policy.
- Accurate and up-to-date device details to meet compliance and cyber insurance requirements.
ORDR integrates with Jira to automate ticketing when a threat or incident is detected.
ORDR integrates with Juniper networking infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Linux DHCP servers to increase data accuracy for device analytics. ORDR collects IP address assignments to devices for accurate MAC-to-IP binding to ensure security alerts and flow data are always mapped to the correct endpoint.
ORDR integration with LogRhythm allows you to leverage ORDR’s rich device data to create alerts, reports, and custom analyses. ORDR transmits security alerts, device information, and other critical information via the Syslog output format. LogRhythm ingests the feed, parses the data into proper fields for better event management.
ORDR integrates with multiple ManageEngine solutions to exchange asset data and automate alerts when a threat or incident is detected.

ORDR with Medimizer to simplify inventory management and add risk context to connected medical equipment.
ORDR integrates with Motorola wireless infrastructure to augment device profiles with network context, visualize communications and enforce policies.

ORDR integrates with NetBox to augment connected device details and ensure every endpoint is accurately mapped to its current network location and properly secured.
ORDR integrates with NetBrain to augment connected device details and ensure every endpoint is accurately mapped to its current network location and properly secured.
ORDR integrates with Netdisco to augment connected device details and ensure every endpoint is accurately mapped to its current network location and properly secured.
ORDR integrates with Netgear wireless infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Nutanix to deliver complete attack surface management and automated security policy generation with extended visibility into data center virtualization and communications.
Information
CATEGORY
Public/Private Cloud Compute and Security
INTEGRATION
Nutanix

ORDR’s bidirectional integration with Nuvolo allows you to simplify inventory management and proactively mitigate risk. ORDR collects inventory data from Nuvolo and sends device data along with risk and utilization details for all devices.
ORDR and Nuvolo have teamed up to create a healthcare partnership to reduce device cyber security risk. The solution combines ORDR’s superior IoT Security Platform to discover and profile connected devices in healthcare organizations with Nuvolo’s workplace management platform for healthcare.
The joint solution enables organizations to optimize their device utilization while significantly reducing risk and improving operational efficiency.

Enable Single Sign On (SSO) for ORDR with Okta.
Enable Single Sign On (SSO) for IRDR with Oracle IDCS.

ORDR integrates with Osquery by providing a custom query pack for collecting granular device data from devices running the open-source agent.
Gain visibility into all devices independent of operating system with support for Windows, macOS, CentOS, FreeBSD, and almost every Linux distribution.

ORDR integrates with PagerDuty to automate ticketing when a threat or incident is detected.
ORDR integrates with:
- Multiple Palo Alto Network solutions to provide the most effective joint solution to identify, classify, and protect all assets from unauthorized access and cyberattacks.
- Palo Alto Networks Firewalls and Panorama streamlining IoT and OT device security. Grouping all devices and automatically mapping them to zones/areas/cells using PAN-OS tags, and then dynamically generating firewall policy rules delivers effective microsegmentation.
- Palo Alto Networks Global Protect for remote access compliance and risk insights.
- Cortex by Palo Alto Networks enabling organizations to leverage comprehensive device and risk insights delivered by ORDR for advanced threat detection and response.
Information
CATEGORIES
Network and Security Infrastructure, XDR, EDR, SASE and Remote Access
INTEGRATIONS
Palo Alto Networks NGFW, Palo Alto Networks Global Protect, Palo Alto Cortex
ORDR integrates with Philips Focal Point to gain additional insights for Philips devices managed by PerformanceBridge Focal Point.
Enable Single Sign On (SSO) for ORDR with Ping Identity.

ORDR integration with Pulsedive automates threat detection and risk assessment for external traffic from all connected devices. ORDR collects details on malicious URLs, IP addresses, and files from Pulsedive.
ORDR’s bidirectional integration with Qualys enables comprehensive vulnerability scanning without gaps or disruptions. Qualys uses ORDR device insights to determine when and how devices are scanned and if they have been excluded. ORDR uses Qualys scan results in the calculation of device risk scores and other security analytics.
How it works
ORDR integrates with the Qualys Cloud Platform to seamlessly send device insights and enable organizations to identify devices to scan with the appropriate type of scan for each device. ORDR also incorporates Qualys scan results with security and risk analysis to calculate a risk score for every connected device for an accurate and comprehensive view of risk.
Benefits
- Comprehensive Coverage – Gain complete visibility of all devices with ORDR to easily determine which devices are scanned, which are missed, and when scanning occurred. Additionally, ORDR’s identification and classification of lightweight, agentless devices allows administrators to quickly exclude specific connected devices or device categories from active scans, opening network segments to vulnerability scanning that had previously been excluded.
- Optimized Scanning – Easily Identify devices to exclude and apply the right scan type for each device category using detailed ORDR insight on device types, scan sensitivity, and device role within the organization.
- Proactive Protection – Automate segmentation policies with ORDR and enforce with existing security and network infrastructure to secure vulnerable devices rather than block or quarantine critical devices that cannot be patched or updated.
- Smart Scheduling – Leverage device utilization patterns from ORDR to schedule vulnerability scans for times when devices are not in use to minimize disruption and operational risk

ORDR works with Rapid7 to seamlessly discover all connected assets including IoT, IoMT, and OT devices. The joint solution enables Rapid7 to perform the right scan at the right time regardless of the device type, location, criticality or role within the organization. Many vulnerable IoT/OT devices discovered by Rapid7 cannot be patched or updated. ORDR automates the application of compensating controls to safeguard these devices by sending protection policies directly to firewalls, switches, wireless, or NAC systems. Similarly, infected devices can be quickly isolated through existing network and security devices.
Information
CATEGORY
Vulnerability Management Systems
INTEGRATION
Rapid7 InsightVM
ORDR integrates with Riverbed wired infrastructure to augment device profiles with network context, visualize communications and enforce policies.
ORDR integrates with Salesforce for additional user, usage and device context to deliver rich user insights.
ORDR integration with SentinelOne enables collection of managed device data, vulnerabilities and threat insights for comprehensive device visibility and a better understanding of risk.
How It Works
ORDR discovers and secures every connected device—from traditional IT to new or vulnerable IoT, IoMT, and OT devices. With the SentinelOne integration, ORDR collects managed device data, vulnerabilities, and threat insights from the Singularity Platform delivering comprehensive device visibility, a better understanding of risk, and the ability to enforce policy to mitigate active threats and improve security across all connected devices.
Benefits
Gain Complete Device Visibility
- See granular details for all agentless and agent-based devices.
- Track both online and offline devices continuously.
- Identify unmanaged devices without the SentinelOne agent to meet compliance requirements.
Minimize Risk with Extended Insights
- Improve risk score accuracy with supplemental event data from SentinelOne.
Remediate Faster
- Improve threat detection and incident response with combined ORDR endpoint flow and SentinelOne process data.
- Block/quarantine/segment managed endpoints in ORDR for rapid remediation via the network.
ORDR integrates with Shodan to gain additional connected device details including geolocation information for comprehensive risk assessment.
ORDR integrates with Slack to automate alert communications when a threat or incident is detected.

ORDR integrates with multiple SolarWinds solutions to augment connected device details and accelerate incident management by automating ticketing workflows when threats or incidents are detected.
Information
CATEGORY
Network Management Systems, IT Service Management (ITSM)
INTEGRATIONS
SolarWinds, SolarWinds Service Desk

ORDR integrates with Sophos XDR platform enabling organizations to leverage comprehensive device and risk insights for advanced threat detection and response.

ORDR integrates with multiple SolarWinds solutions to centralize complete asset intelligence and automate ITSM workflows.
ORDR integration with Splunk allows you to leverage ORDR’s rich device data to create alerts, reports, and custom analyses. ORDR transmits security alerts, device information, and other critical information. Splunk ingests the feed for better event management.

ORDR integrates with Tanium to provide comprehensive visibility across all agent-based and agentless devices, and risk insights for proactive risk mitigation.
ORDR integrates with:
- Multiple Tenable vulnerability management solutions to simplify and enrich vulnerability management.
- Tenable.io and Tenable.sc with bidirectional data exchange to detect and eliminate vulnerability scan gaps and disruptions.
- Tenable Nessus Pro to gather scan details for augmenting device vulnerabilities and risk insights.
Information
CATEGORY
Vulnerability Management Systems
INTEGRATIONS
Tenable.io, Tenable.sc, Tenable Nessus Pro

ORDR integration with ThreatConnect allows you to leverage ORDR’s rich device data to create alerts, reports, and custom analyses. ORDR transmits security alerts, device information, and other critical information. ThreatConect ingests the feed, parses the data into proper fields for better event management.
ORDR integrates with Trellix Helix enabling SecOps teams to leverage ORDR’s rich asset intelligence and risk insights to create events, reports, and custom analyses.
ORDR leverages the vSphere API, which provides access to server management, virtual machine provisioning, monitoring, and more. ORDR collects datacenter asset details including the servers (hosts), individual virtual machines (guests), operating systems, shared compute resources (CPU, memory, disk), status, and compatibility.
The extended visibility to VMware workloads running in public, private, and hybrid cloud environments delivers a ‘whole hospital’ or ‘whole enterprise’ approach to security ensuring that no device or connection remains unknown.

ORDR integrates with Wiz to provide extended intelligence on cloud assets including security posture for end-to-end visibility and control across an organization’s entire attack surface.
Information
CATEGORY
Public/Private Cloud Compute and Security
INTEGRATION
Wiz
ORDR integrates with Zendesk to automate ticketing when a threat or incident is detected.
ORDR integrates with Zenefits for additional user context to deliver rich user insights.
ORDR integrates with Zimperium enabling organizations to leverage comprehensive device and risk insights for advanced threat detection and response.
ORDR integrates with Zoom to capture additional user, usage and device context to deliver rich user insights.

ORDR integrates with Zscaler’s Zero Trust Device Segmentation platform and Client Connector enabling Security teams to assess and contain risk without network redesign.