Intranet

An intranet is a private network based on TCP/IP and belongs to an individual organization. It’s only accessible to that organization’s members, employees, or others with authorization. An intranet’s websites and software applications appear and behave like any other, but the firewall surrounding an intranet fends off unauthorized access and use.

How are intranets used?

Like the internet itself, intranets are used to share information. Secure intranets represent a large segment of the internet because they are much less expensive to build and manage than private networks based on proprietary protocols.

Intranet applications are similar to Internet applications like browsers, teleconferencing tools, or word processors. Unlike Internet applications, however, intranet applications reside on a local server. Some of these applications include:

Intranet vs. other networks

An intranet is designed to allow a company to share information and resources with others in the company. This is in contrast to the Internet, which is publicly available to any user with a valid access point such as a modem or Ethernet connection.

When a company allows access to any part of its intranet to customers, partners, or suppliers outside the company, it is called an extranet. External users access an extranet with valid login credentials, and user access controls can be customized to specify which parts of the extranet can be viewed.

A virtual private network (VPN) functions similarly to an intranet in that it creates a secure way to access information. However, intranet does not require Internet access whereas a VPN is primarily used to securely connect to the Internet. If an intranet features an internet portal, it will typically use a VPN to establish that connection.

UPDATED: This page was updated April 2021 by Web Webster.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...