Which one of these actions is the best way to resolve security challenges in borderless networks?
A.
Update existing security products to the latest hardware and software versions.
B.
Identify the vulnerabilities of newly deployed services and protect them by the appropriate point
device.
C.
Identify vulnerabilities of newly deployed entry points and deploy the appropriate security
solutions at the corresponding network access point.
D.
Migrate to a more architectural approach to security.