I'd go with C as well. Keeping an eye on all those devices and making sure they play by the rules is key. Though I'm also partial to a network core that's data and memory-driven, just for the fun of it.
Option C sounds like the best way to enhance security. Onboarding, monitoring, and applying policies to BYOD and IoT devices is crucial in today's connected world.
Corrie
3 days agoHuey
5 days agoIola
7 days agoErasmo
9 days agoFletcher
17 days agoChaya
18 days agoTerry
22 days ago