Intranet

An intranet is a private network based on TCP/IP and belongs to an individual organization. It’s only accessible to that organization’s members, employees, or others with authorization. An intranet’s websites and software applications appear and behave like any other, but the firewall surrounding an intranet fends off unauthorized access and use.

How are intranets used?

Like the internet itself, intranets are used to share information. Secure intranets represent a large segment of the internet because they are much less expensive to build and manage than private networks based on proprietary protocols.

Intranet applications are similar to Internet applications like browsers, teleconferencing tools, or word processors. Unlike Internet applications, however, intranet applications reside on a local server. Some of these applications include:

Intranet vs. other networks

An intranet is designed to allow a company to share information and resources with others in the company. This is in contrast to the Internet, which is publicly available to any user with a valid access point such as a modem or Ethernet connection.

When a company allows access to any part of its intranet to customers, partners, or suppliers outside the company, it is called an extranet. External users access an extranet with valid login credentials, and user access controls can be customized to specify which parts of the extranet can be viewed.

A virtual private network (VPN) functions similarly to an intranet in that it creates a secure way to access information. However, intranet does not require Internet access whereas a VPN is primarily used to securely connect to the Internet. If an intranet features an internet portal, it will typically use a VPN to establish that connection.

UPDATED: This page was updated April 2021 by Web Webster.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...