Syndicated Blog

Ordr Blog – Ordr
See, Know, and Secure Every Connected Device

A Closer Look at Ordr’s Commitment to Security: Navigating the SOC 2 Implementation Journey

A special blog for October Cybersecurity Awareness Month In an era where data security is paramount, we at Ordr, specializing in comprehensive security solutions for connected devices, prioritize safeguarding customer information as ...
Powering ServiceNow Vulnerability Response with Complete and Accurate Data for All Devices

Powering ServiceNow Vulnerability Response with Complete and Accurate Data for All Devices

| | integration, IoT Security
Overview Enterprises are a complex mix of devices, applications, and data, and the speed at which they are changing is growing exponentially. Look just about anywhere in the modern technology estate and ...

Welcome Wes Wright: Another Great Day at Ordr

Ordr welcomes Wes Wright as our new Chief Healthcare Officer with immense pleasure and pride. Wes’s distinguished military background, extensive expertise in healthcare, and unwavering commitment to patient safety make him an ...
Sept EPOM - Ordr

Meraki Chooses Ordr as Ecosystem Partner of the Month!

| | General
We’ve always known the value of partnering with Cisco Meraki. Recently we learned that we were selected by the Meraki team as the September 2023 Ecosystem Partner of the Month. This is ...

Why Ordr? Why Now?

| | General
I just joined Ordr as Chief Healthcare Officer and, as is often the case in life, there’s a story, personal and professional, behind my new adventure here.  A little more than seven ...
Demo Forum - Cyber Asset and Attack Surface Management

What is Cyber Asset and Attack Surface Management?

| | General
Gartner analysts have been busy recently publishing several Hype Cycles. If you’re not familiar with the Gartner Hype Cycle, it is a graphic representation of the maturity lifecycle of new technologies, and ...
Countering Cyberthreats with a Whole Enterprise Security Approach

Countering Cyberthreats with a Whole Enterprise Security Approach

There has been a lot of attention paid to ransomware over the last few years, and with good reason. In 2021 Fierce Healthcare reported a 470% increase in ransomware attacks on the ...
The Unique Security Challenges of Cyber-Physical Systems Require New Security Tools

The Unique Security Challenges of Cyber-Physical Systems Require New Security Tools

Ordr’s See, Know, Secure Approach to Connected Device Security is Ideal for CPS Protection   As IT estates and their attack surfaces grow in complexity, cyber-physical systems (CPS) are getting more attention ...
Connected Devices Conspicuously Absent from 2023 Verizon Data Breach Investigations Report

Connected Devices Conspicuously Absent from 2023 Verizon Data Breach Investigations Report

The 2023 Verizon Data Breach Investigations Report is out. Like most folks in the cybersecurity industry, we downloaded it and pored over the contents to see what was new and relevant and ...
graphic of device impacted by MOVEit

Ordr Security Bulletin: MOVEit Vulnerabilities

Coauthors: Srinivas Loke, Gowri Sunder Ravi Progress Software, which makes the MOVEit Transfer app, first disclosed a vulnerability for the MOVEit application on May 31st, 2023. The MOVEit application is a managed ...