I'd go with C as well. Keeping an eye on all those devices and making sure they play by the rules is key. Though I'm also partial to a network core that's data and memory-driven, just for the fun of it.
Option C sounds like the best way to enhance security. Onboarding, monitoring, and applying policies to BYOD and IoT devices is crucial in today's connected world.
Corrie
3 months agoWilliam
1 months agoVallie
1 months agoSamira
1 months agoHuey
3 months agoHuey
3 months agoIola
3 months agoErasmo
4 months agoGussie
3 months agoJoaquin
3 months agoFletcher
4 months agoChaya
4 months agoTerry
4 months ago