TrustRadius: an HG Insights company

Ordr

Score8.7 out of 10

2 Reviews and Ratings

What is Ordr?

The Ordr Connected Device Security is a solution designed to discover and secure connected devices within an enterprise environment. According to the vendor, it offers seamless, agentless deployment and enables businesses of various sizes to gain visibility and insights into their connected devices. This platform caters to professions and industries such as healthcare, financial services, manufacturing, life sciences, and enterprise.

Key Features

Seamless, Agentless Deployment: According to the vendor, the platform allows for the discovery of assets in the environment without the need for agents. It offers multiple device discovery methods, including network sensors, integrated network hardware sensors, cloud integrations, API integrations, and Netflow.

Instant Granular Device Visibility: The Ordr Connected Device Security automatically identifies and classifies devices, providing granular context for each one. According to the vendor, it combines device context with insights from network topology, Active Directory, and threat intelligence to offer a complete profile of every connected asset.

Analyze Device Communications: The platform learns device behaviors, creates baselines, and maps device communication patterns with the Ordr Device Flow Genome. According to the vendor, it provides behavior baselines for each individual device to identify and respond to anomalies. Additionally, it analyzes traffic flows between device groups, the Internet, VLANs, and subnets to identify compliance violations or command and control communications.

Detect and Mitigate Attacks Across the Threat Chain: Ordr Connected Device Security reduces the attack surface pre-attack by automatically identifying devices with risks and vulnerabilities. The vendor claims that it simplifies the generation of Zero Trust segmentation policies and proactively segments vulnerable and mission-critical devices. The platform also detects known exploits and lateral movement, monitors devices for attacker tools, and identifies communications to malicious external domains with threat intelligence feeds.

Industry's ONLY SOC2-Certified Connected Device Security Platform: According to the vendor, Ordr is the only connected security platform that is SOC2-Certified, prioritizing customer privacy and data security.

Enable Faster ROI With Ordr Integrations: The platform seamlessly integrates with over 80 security, networking, infrastructure, IT, and clinical solutions, extending device details, enriching device context, and maximizing the value of existing investments. According to the vendor, it ingests data from every integration into the Ordr Data Lake for a complete and accurate view of every connected device.

Improve CMDB and CMMS Asset Inventory: Ordr Connected Device Security collects and consolidates granular details for every asset in the environment, enriching CMDB or CMMS to ensure accurate and up-to-date asset inventories.

Accelerate Network Access Control: With its connected device visibility and automated classification, the platform supports NAC projects, automating policy creation to simplify enforcement and achieve NAC goals.

Address Gaps in Vulnerability Management: Ordr optimizes the scanning of specific network environments, excluding devices that should not be scanned or applying Zero Trust policies to protect unpatchable devices. According to the vendor, it identifies vulnerabilities for any connected device with the integrated vulnerability scanner.

Enrich Connected Device Context with EDR Data: Ordr Connected Device Security discovers and automatically classifies every connected device, enriching device profiles with EDR data to address critical use cases.

Good for a single task

Use Cases and Deployment Scope

We use this to monitor and control the stack of medical devices that cannot be managed via our traditional software stack that gets installed. We use Ordr as a another layer of defense to monitor these devices for activity, track the our Medical IOT stack and create policies that protect them to the best of our abilities while not modifying them as they are considered medical devices.

Pros

  • Visibility with out IOT
  • Ease of use when creating policies to deploy to other systems (ISE)
  • Visualizing the data

Cons

  • Initial config was difficult.
  • Some of there processes are black boxes and give me pause such as there phishing and malware activity monitors.

Most Important Features

  • The visibility of all of the devices.
  • The creation of ISE policies and seeing the expected behavior of that policy.

Return on Investment

  • Increased visibility
  • Increased control of devices
  • Serious doubts to the veracity of it malicious activity data.