In an organization that has undergone an expansion through an acquisition which of the following would BEST secure the enterprise network?
A. Using security groups
B. Log analysis of system access
C. Business or role-based segmentation
D. Encryption of data traversing networks
A. Using security groups
B. Log analysis of system access
C. Business or role-based segmentation
D. Encryption of data traversing networks