Ordr Announces Integration with ServiceNow Vulnerability Response Read more here!

Ordr 8.2 is now available

Updates in Ordr 8.2 include platform updates and new integrations to expand the Ordr Data Lake enabling you to SEE more devices in more places, KNOW more about vulnerabilities and risk, and SECURE devices more rapidly through enhanced capabilities across the Zero Trust ecosystem.

SEE: Gain Granular Visibility of Every Connected Device

The devices used every day by a remote and distributed workforce create attack surface visibility gaps for security teams, resulting in a state of increased risk for organizations. Security teams need to understand the risk posture of both managed and unmanaged devices, while establishing a complete and accurate device inventory.

Mobile Device Management (MDM) and Endpoint Detection and Response (EDR)
To address this, Ordr delivers device insights and enables a centralized view of every device for a comprehensive view of the attack surface. Ordr has integrated with top MDM and EDR platforms, including JAMF, Microsoft Intune, and SentinelOne, enabling managed device details to be integrated in the Ordr Data Lake to enhance the view of vulnerabilities and risk.

Ordr Software Inventory Collector
Ordr Software Inventory Collector gathers essential details from devices to provide insights into vulnerabilities and risks, such as unpatched software, unauthorized software, and outdated or disabled antivirus programs. Ordr Software Inventory Collector now fetches additional endpoint attributes for teams, including user login, admin, hardware details, certification and IP address, while also complimenting Software Bill-of-Materials (SBOM) efforts with real-time visibility into the state of software, date it was installed, and what patches have been implemented.

Cisco DNA Center
By integrating with the Cisco DNA Center, Ordr enhances the view of devices, adding device location context with building and floor details. This improves incident response when physical access is needed to remove a device from the network (e.g., unplug it) or if physical access is needed for patching.

ServiceNow Service Graph Connector
Ordr eliminates manual efforts by automatically and continuously discovering and gathering granular details for every connected device. By integrating with ServiceNow Service Graph Connector, Ordr helps teams ensure that asset inventories are accurate and up-to-date.

KNOW: Strengthen Vulnerability Management and Risk Reduction Efforts

Ordr device classification and insight capabilities enable teams to scan previously unscanned devices or environments and optimize scanning to ensure the operation of critical devices and services are not impacted.

Qualys Cloud Platform
Scanning devices is important to give security teams a proper view into potential vulnerabilities and risks. That said, there are many devices and pieces of equipment with scanning restrictions, or where scanning could impact operation. By integrating with Qualys, Ordr enables previously unscanned devices and environments to be scanned, as there controls for scanning strength, depth and timing are added. Gaps in the attack surface are closed without an impact on operations.

CrowdStrike Spotlight API
Ordr can now easily integrate device vulnerability information from CrowdStrike managed devices using the CrowdStrike Spotlight API. This provides teams with a centralized and enhanced view of device vulnerabilities and risks.

New Threat Detections
Ordr version 8.2 incorporates several features that help customers detect attempts to exploit the latest ransomware and zero-day threats, such as the OpenSSL vulnerability.

SECURE: Accelerate and Scale Proactive Security with Zero Trust

A critical part of implementing segmentation or other Zero Trust policies is that policy enforcement does not “break” critical applications, impacting operations, safety, or customer services. Capabilities in Ordr 8.2 help teams proactively improve security by automating the creation and customization of Zero Trust policies, and optimizing those policies for enforcement at scale on solutions such as Cisco ISE, Aruba ClearPass, and Fortinet FortiNAC.

Aruba ClearPass
Ordr version 8.2 enhances integrations with Aruba ClearPass, auto-updating endpoints with current classification information, security metrics (including an adjusted risk score), what alarm categories were triggered, and the reason for any block or quarantine action. This ensures ClearPass administrators have a clear understanding of why a device may be denied network access.

Ordr continues to offer HPE-Aruba customers the most comprehensive solution for ClearPass deployments, including the richest set of device context, providing complete visibility for clinical and non-clinical devices; flexible device grouping to facilitate compliance and governance policies; dynamic threat containment, leveraging the Ordr Rules and Actions Engine; and simplified role mapping and policy automation using Cisco dACLs (with TCAM utilization tracking) and Aruba DUR policies for Zero Trust segmentation.

Additional Resources

Ordr Overview Solution Brief

Learn how Ordr discovers every connected device, profiles device behaviors, uncovers risks, and automates zero trust policies.

Learn More

Ordr Software Inventory Collector Solution Brief

Learn how Ordr Software Inventory Collector simplifies how software stack, patch data, and other device details are gathered for all managed and unmanaged devices.

Learn More

5 Steps to Zero Trust for Unmanaged and IoT Devices

Read the whitepaper to learn how Ordr can help you extend Zero Trust to all devices on your network.

Learn More

Get Your Devices in Ordr

Request a Demo

Let our product experts show you how Ordr addresses your critical use cases.

Get A Demo

Request an Assessment

Get a no-obligation, free assessment for your business. Identify assets and the risks they bring.

Get an Assessment