To see my latest advice, view my profile on the IT Knowledge Exchange:
Puneet's public profile
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
If you have enterprise network security questions, I am still answering them via the Pose a Question link here, and above in red next to my picture. Just expect my responses on the IT Knowledge Exchange under my public profile section.
Dig Deeper on Network Security Best Practices and Products
Related Q&A from Puneet Mehta
Find out if there's a difference between a virtual private network (VPN) concentrator and a network access server (NAS) in this explanation from our ...continue reading
Our network security expert explains how to keep unauthorized users from accessing your router's IP address for Internet access in this advice ...continue reading
If you've used MAC address restriction to control your network access on your wireless router, can you extend this to your wired network? Our ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.