Ordr Platform

Within a few hours of deployment—via network tap or SPAN—we passively discover high-fidelity information about every connected device including make, location, serial number, and application/port usage. This visibility is provided in real time for any new connected device and can be integrated with asset inventory solutions. Understand vulnerabilities, recalls, weak passwords or certificates associated with every device.

Ordr also provides deep insight into device utilization so teams can ensure data-driven moves, adds, and changes as teams scale their capacity. These device insights are also critical to determine the longevity of certain devices, and allows teams to schedule maintenance tickets and support procurement decisions. We automatically group fleet devices, and monitor usage for tracking and comparison purposes. We also integrate with identity systems like Active Directory to identify which user is accessing what device and when.

We offer the most comprehensive visibility into IoT security risks. Our built-in threat detection engine and Ordr Flow Genome behavioral profiling enables us to identify a variety of risks — active threats, exploits, anomalous behaviors, and communications to bad URLs. We also identify devices under recall or with critical vulnerabilities via our built-in integration with a suite of industry threat intelligence feeds, network vulnerability databases, ICSA–ICS-CERT advisories, and FDA lookups. We’ll even identify devices that have weak ciphers and certificates.

Unlike users, devices have specific communications patterns. Using machine learning, the Ordr Flow Genome profiles and baselines communication patterns for every device profile. Visualize communications to other IP/VLAN segments, as well as communications to external networks using our Constellation Map. Identify anomalous communications or traffic to a malicious domain.

To reduce the workload for users, we automate response such as proactive segmentation, triggering operational workflows or incident response actions. For example, by profiling what is normal behavior and communications for a specific device profile, we can create policies to allow only the observed sanctioned communications for IoT devices. These policies can be automatically enforced on existing infrastructure—firewalls, switches, network access control, and wireless LAN controllers—with one click. We can trigger CMMS and CMDB workflows when a new device is discovered, or create policies to segment a vulnerable device as part of incident response.
-
Discover All Devices
Automatically identify, classify, and locate all network-connected devices and systems.
-
Understand Usage
See which—and how—devices are being used. Understand who last logged on and accessed a device.
-
Assess Security Risks
Assess and prioritize exposed weaknesses in real time and at scale to determine potential risk.
-
Profile Behavior
Profile and map all connected device communications. Baseline "sanctioned communications" in your environment
-
Automate Action
Automatically generate, implement, and enforce granular security policies.
Deployment
Flexible, Seamless Deployment
Scanning some sensitive IoT devices can impact their operations. Ordr offers a passive, agentless, and zero touch deployment that provides complete visibility into your devices within minutes. We flexibly support both on-premises and cloud deployments. Simply select the best option for your organization.
Integrations
Industry’s Most Comprehensive Integrations
We offer the most comprehensive integration in the market. We extend IoT device context, address visibility and vulnerability gaps, and generating and enforce policies on your existing infrastructure. Our API integrations are built in and can be enabled with the click of a button.
One Platform
Enable the Complete Device Security Lifecycle
IoT, IoMT and OT devices sometimes reside under different operational owners, but must be managed under one security framework. Ordr provides one common platform for security, networking, and device owners. We enable the complete IoT device security lifecycle — from discovery and profiling of devices and risks, to automated response. We also offer role-based access controls and custom views for every stakeholder.
Resources

Ordr Overview
Learn how the Ordr Systems Control Engine (SCE) will discover every connected device, profile device behaviors and risks, and automate response. Read the solution brief now.

What is Ordr Systems Control Engine?
Get a full overview of the capabilities of the Ordr Systems Control Engine (SCE).

Ordr Integrations Overview
Ordr has the most comprehensive integrations in the market. Learn how we extend IoT context, enforce policies and address vulnerabilities with key solutions