Answer:
c.
Explanation:
Based on the information provided within the question it can be said that the best recommendation for this scenario would be to implement an endpoint management server appliance. This is a device or software that will allow the company to discover, manage and control all devices that are attempting to connect to the company's network. Allowing also to be able to restrict certain rights or access to the device.