Ordr has released its Systems Control Engine (SCE) 7.4.2 that uses deep packet inspection and advanced machine learning to discover every device, profile its risk and behavior, map communications and protect it with automated policies. It assists organizations to secure every connected device, across IT, IoT, and operational technology (OT) devices.
With the SCE 7.4.2, Ordr can protect devices, ranging from traditional IT devices to newer and more vulnerable IoT, Internet of Medical Things (IoMT), and OT devices. For organizations that are looking to reduce their existing network infrastructure solutions and gain quicker value, Ordr SCE 7.4.2 provides visibility via a virtual or physical sensor, or via a sensor-less telemetry data ingestion, Ordr said in a press statement.
The Ordr 7.4.2 provides support to over 20 brands of network switches, routers, firewalls, wireless controller vendors, and will provide improved visibility using telemetry data with device context supported by the Ordr Data Lake, and then visualized in an out-of-the-box customized dashboard. In addition, Ordr SCE 7.4.2 simplifies deployment options with enhancements such as multi-tenancy, zero touch provisioning, option of on-premises or in the cloud, and a cloud-based portal.
“Ordr provides the most robust, time-to-value security solution for organizations that want to reap the benefits of network-connected devices, yet curtail increased global incidents of ransomware, phishing, credit card, and personal data breaches,” said Gnanaprakasam Pandian, co-founder and chief product officer of Ordr.
As the rise in connected medical devices saw an all-time high deployment point last year, 2021 is likely to see a corresponding increase in initiatives to address the security and risks of these devices, the Santa Clara, California-based company predicts.
Ordr SCE 7.4.2 provides healthcare organizations with clinical data such as medical device data from the FDA, clinical and patient risk associated with a device(s). Information on security risk from MDS2 forms are accessible to support informed decisions and initiate the appropriate workflows within a matter of minutes. The Manufacturer Disclosure Statement for Medical Device Security (MDS2) is a standardized form intended to be filled out by medical device manufacturers to communicate information about their devices’ security and privacy characteristics to current device owners and potential buyers, mainly healthcare delivery organizations.
Users will have a quick view of risk-based analysis for devices with patient risk associated with the Ordr SCE 7.4.2. It helps reduce time spent on locating devices, both on the network and physical location, and decreases time spent on manual analysis of the patient risk associated with devices.
Ordr SCE 7.4.2 has also introduced use case and asset inventory-focused dashboards to adapt to the changing ways in which organizations are conducting businesses. Organizations can drill down into device context based on various parameters including industry-specific devices and role-specific data, with a single click.
The SCE 7.4.2 enables organizations to use flexible grouping of devices to map actions such as communication analysis, policy generation, or assigning custom tagging for NAC and firewalling. Users can also take various classifications such as device type, threat/vulnerability, state of compliance, asset status, department and location, and group them for a specific use case, allowing the policy profile to be analyzed and policies automatically generated.
With this feature, customers can achieve tasks such as controlling access for physical security cameras used in a retail location, segment patient care devices by hospital and healthcare division, or tag all manufacturing devices that are still running Windows XP or Windows 7.
In addition, SCE 7.4.2 will have ransomware signature improvements that will enable optimized detection and tracking within the platform. These security enhancements will enable customers in the wake of high-profile ransomware, as well as espionage-like activity seen in the SolarWinds supply chain attack, to access enhanced security components, focusing on optimized detection, and tracking within the platform.
Users will have the ability to visually track antivirus software activity, URLs associated with phishing, malicious communications, user defined prohibited country communications, and see devices with admin protocols and a snapshot of criticality level for devices with known vulnerabilities, the company said.
Ordr SCE 7.4.2 will come with a Yet Another Markup Language or YAML Ain’t Markup Language (YAML) Editor. Every organization defines their security risks differently and needs to use security tools based on their policies. The editor allows advanced users to adjust some of the cybersecurity system parameters such as cybersecurity risk weighting, network topology definitions, and blocklist content.
In December, Ordr partnered with managed security services provider HSS Technology Services, so that HSS will give users the option of incorporating Ordr into their Spotlight services offering. Spotlight is a medical device security services program that aims to address challenges facing healthcare organizations, such as cyberattacks resulting in compromised devices that impact patient safety, protected patient information and network security.