Your organization is interested in deploying a solution that not only monitors network traffic for suspicious behavior but also actively intervenes to thwart any detected threats. What is the most appropriate device to implement?
Firewall
IDS
Proxy server
IPS