I'd go with C as well. Keeping an eye on all those devices and making sure they play by the rules is key. Though I'm also partial to a network core that's data and memory-driven, just for the fun of it.
Option C sounds like the best way to enhance security. Onboarding, monitoring, and applying policies to BYOD and IoT devices is crucial in today's connected world.
Corrie
1 months agoHuey
1 months agoHuey
1 months agoIola
1 months agoErasmo
2 months agoGussie
22 days agoJoaquin
23 days agoFletcher
2 months agoChaya
2 months agoTerry
2 months ago