A security engineer needs to recommend a solution that will meet the following requirements: - Identify sensitive data in the provider's network - Maintain compliance with company and regulatory guidelines - Detect and respond to insider threats, privileged user threats, and compromised accounts - Enforce datacentric security, such as encryption, tokenization, and access control Which of the following solutions should the security engineer recommend to address these requirements?