A cybersecurity technician at a financial services firm is tasked with implementing a technical control to prevent unauthorized devices from connecting to the corporate wired network. The solution must automatically assess the security posture of any device attempting to connect and place non-compliant devices into a quarantined VLAN for remediation. Which of the following technologies is best suited to meet these requirements?