A company wants to limit access to its systems to users connecting from certain countries to comply with regional regulations. Which of the following methods would BEST achieve this?
Utilizing encryption for all data in transit
Implementing geolocation-based access controls
Enforcing strong authentication protocols
Deploying endpoint security software