A strong base for OT/ICS security needs real-time access of the entire hardware, software and firmware in the network, customer’s data, active accounts information, patches status, susceptibilities, network system configurations, windows updates, implanted system backplanes, the status of diverse security components such as application firewalls, whitelisting, antivirus,