A company has had several malware incidents that have been traced back to users accessing personal SaaS applications on the internet from the company network. The company has a policy that states users can only access business-related cloud applications from within the company network. Which of the following technical solutions should be used to enforce the policy?
NetworkTester1235
Highly Voted 1 year, 3 months agoha_ha
Highly Voted 1 year, 5 months agosalah112
Most Recent 1 year, 4 months agojohnabayot
1 year, 5 months agoLuckyAro
1 year, 5 months ago[Removed]
1 year, 5 months agodavid124
1 year, 5 months agotoluwalase022
1 year, 5 months ago