Watch this video on YouTube
To fulfill your company's requirement for the security and network engineering teams to detect all network anomalies and capture payloads within VPCs, which method should you employ?