Intranet

An intranet is a private network based on TCP/IP and belongs to an individual organization. It’s only accessible to that organization’s members, employees, or others with authorization. An intranet’s websites and software applications appear and behave like any other, but the firewall surrounding an intranet fends off unauthorized access and use.

How are intranets used?

Like the internet itself, intranets are used to share information. Secure intranets represent a large segment of the internet because they are much less expensive to build and manage than private networks based on proprietary protocols.

Intranet applications are similar to Internet applications like browsers, teleconferencing tools, or word processors. Unlike Internet applications, however, intranet applications reside on a local server. Some of these applications include:

Intranet vs. other networks

An intranet is designed to allow a company to share information and resources with others in the company. This is in contrast to the Internet, which is publicly available to any user with a valid access point such as a modem or Ethernet connection.

When a company allows access to any part of its intranet to customers, partners, or suppliers outside the company, it is called an extranet. External users access an extranet with valid login credentials, and user access controls can be customized to specify which parts of the extranet can be viewed.

A virtual private network (VPN) functions similarly to an intranet in that it creates a secure way to access information. However, intranet does not require Internet access whereas a VPN is primarily used to securely connect to the Internet. If an intranet features an internet portal, it will typically use a VPN to establish that connection.

UPDATED: This page was updated April 2021 by Web Webster.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...