An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?
Using a Content Filter
Installing an Intrusion Prevention System
Implementing an Intrusion Detection System
Deploying a firewall with deep packet inspection