Good for a single task
Use Cases and Deployment Scope
We use this to monitor and control the stack of medical devices that cannot be managed via our traditional software stack that gets installed. We use Ordr as a another layer of defense to monitor these devices for activity, track the our Medical IOT stack and create policies that protect them to the best of our abilities while not modifying them as they are considered medical devices.
Pros
- Visibility with out IOT
- Ease of use when creating policies to deploy to other systems (ISE)
- Visualizing the data
Cons
- Initial config was difficult.
- Some of there processes are black boxes and give me pause such as there phishing and malware activity monitors.
Likelihood to Recommend
It works extremely as a monitoring tool and creating access control policies. This function works flawless for us. I do have issues with its other functions such as phishing activity and malware activity. It is being billed as having these great wonderful functions but I have not seen the proof that these actual do anything at all other than have an RNG to make it look like like its doing something. Frankly I am extremely unimpressed with these functions and the lack of transparency from Ordr on how this information is gathered.