Which of the following is a recommended strategy for enhancing network security?
A) Implementing cloud computing
B) Optimizing data storage
C) Deploying intrusion detection systems (IDS)
D) Utilizing virtualization technologies