An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?
Deploying a firewall with deep packet inspection
Implementing an Intrusion Detection System
Using a Content Filter
Installing an Intrusion Prevention System