Skip to main content
TrustRadius
Ordr

Ordr

Overview

What is Ordr?

The Ordr Connected Device Security is a solution designed to discover and secure connected devices within an enterprise environment. According to the vendor, it offers seamless, agentless deployment and enables businesses of various sizes to gain visibility and insights into their connected devices....

Read more
Recent Reviews

Good for a single task

6 out of 10
March 09, 2023
We use this to monitor and control the stack of medical devices that cannot be managed via our traditional software stack that gets …
Continue reading
Read all reviews
Return to navigation

Product Details

What is Ordr?

The Ordr Connected Device Security is a solution designed to discover and secure connected devices within an enterprise environment. According to the vendor, it offers seamless, agentless deployment and enables businesses of various sizes to gain visibility and insights into their connected devices. This platform caters to professions and industries such as healthcare, financial services, manufacturing, life sciences, and enterprise.

Key Features

Seamless, Agentless Deployment: According to the vendor, the platform allows for the discovery of assets in the environment without the need for agents. It offers multiple device discovery methods, including network sensors, integrated network hardware sensors, cloud integrations, API integrations, and Netflow.

Instant Granular Device Visibility: The Ordr Connected Device Security automatically identifies and classifies devices, providing granular context for each one. According to the vendor, it combines device context with insights from network topology, Active Directory, and threat intelligence to offer a complete profile of every connected asset.

Analyze Device Communications: The platform learns device behaviors, creates baselines, and maps device communication patterns with the Ordr Device Flow Genome. According to the vendor, it provides behavior baselines for each individual device to identify and respond to anomalies. Additionally, it analyzes traffic flows between device groups, the Internet, VLANs, and subnets to identify compliance violations or command and control communications.

Detect and Mitigate Attacks Across the Threat Chain: Ordr Connected Device Security reduces the attack surface pre-attack by automatically identifying devices with risks and vulnerabilities. The vendor claims that it simplifies the generation of Zero Trust segmentation policies and proactively segments vulnerable and mission-critical devices. The platform also detects known exploits and lateral movement, monitors devices for attacker tools, and identifies communications to malicious external domains with threat intelligence feeds.

Industry's ONLY SOC2-Certified Connected Device Security Platform: According to the vendor, Ordr is the only connected security platform that is SOC2-Certified, prioritizing customer privacy and data security.

Enable Faster ROI With Ordr Integrations: The platform seamlessly integrates with over 80 security, networking, infrastructure, IT, and clinical solutions, extending device details, enriching device context, and maximizing the value of existing investments. According to the vendor, it ingests data from every integration into the Ordr Data Lake for a complete and accurate view of every connected device.

Improve CMDB and CMMS Asset Inventory: Ordr Connected Device Security collects and consolidates granular details for every asset in the environment, enriching CMDB or CMMS to ensure accurate and up-to-date asset inventories.

Accelerate Network Access Control: With its connected device visibility and automated classification, the platform supports NAC projects, automating policy creation to simplify enforcement and achieve NAC goals.

Address Gaps in Vulnerability Management: Ordr optimizes the scanning of specific network environments, excluding devices that should not be scanned or applying Zero Trust policies to protect unpatchable devices. According to the vendor, it identifies vulnerabilities for any connected device with the integrated vulnerability scanner.

Enrich Connected Device Context with EDR Data: Ordr Connected Device Security discovers and automatically classifies every connected device, enriching device profiles with EDR data to address critical use cases.

Ordr Video

Ordr Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(2)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 6 out of 10
Vetted Review
Verified User
We use this to monitor and control the stack of medical devices that cannot be managed via our traditional software stack that gets installed. We use Ordr as a another layer of defense to monitor these devices for activity, track the our Medical IOT stack and create policies that protect them to the best of our abilities while not modifying them as they are considered medical devices.
  • Visibility with out IOT
  • Ease of use when creating policies to deploy to other systems (ISE)
  • Visualizing the data
  • Initial config was difficult.
  • Some of there processes are black boxes and give me pause such as there phishing and malware activity monitors.
It works extremely as a monitoring tool and creating access control policies. This function works flawless for us. I do have issues with its other functions such as phishing activity and malware activity. It is being billed as having these great wonderful functions but I have not seen the proof that these actual do anything at all other than have an RNG to make it look like like its doing something. Frankly I am extremely unimpressed with these functions and the lack of transparency from Ordr on how this information is gathered.
  • The visibility of all of the devices.
  • The creation of ISE policies and seeing the expected behavior of that policy.
  • Increased visibility
  • Increased control of devices
  • Serious doubts to the veracity of it malicious activity data.
Return to navigation