|An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the Wide Area Network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.
eXpertWeb Architect will help you accelerate your project, whether you are planning your very first Web site or Intranet, redesigning an existing site, or making the leap from a simple Web presence to e-Commerce. eXpertWeb’s Internet and Intranet experience combined with excellent project management, facilitation and communication skills offer our clients a superior level of consulting expertise. We can assume responsibility for your entire project or supplement your own capabilities, providing excellence and value as our services fill in the gaps.
Our experience embraces all facets of the Intranet and Internet development process, from requirement definition and planning through development, marketing and maintenance. We also have a unique ability to draw upon our extensive experience, security, and Intra- and Internet technologies. This combined experience allows us to deliver comprehensive solutions and truly sets us apart from the competition.
|Some of the services eXpertWeb provide are:|
|An extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business’s information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company’s intranet that is extended to users outside the company. Think of an extranet as being a private portion of the Internet. If you were to remove the secure aspects of an extranet then you would in effect have just another piece of the Internet.
An extranet requires security and privacy. These require firewall server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks (VPN) that tunnel through the public network.
|Companies can use an extranet to:|
|The extranet is where e-business begins. Tactical extranets increase customer and partner loyalty, commitment, and confidence, all of which drive revenue and competitive advantage. Extranets are being used to automate supply chains, co-develop new products, and transform business processes. As mergers and acquisitions intensify and organizations increasingly rely on outside consultants and outsourcers, the need for secure extranets becomes even more urgent. Companies are no longer asking “Should we build an extranet,” but rather, “How do we build the extranet that gives us a competitive edge.” Deploying the right extranet solution now, one that attacks the challenges of the extranet head-on, is critical to e-business success.|
|» Rules of the Extranet|
|With competitive advantage as the ultimate prize, two fundamental drivers are propelling large enterprises to the extranet: market consolidation and service externalization. Markets are consolidating as the pace of merger, investment, and acquisition intensifies. Yet within companies, core services are also increasingly being externalized, delivered by a network of external parties that includes outsourcers, demand and supply chain partners, consultants, and contractors. This dynamic environment presents clear business needs, which can be summarized as the Five Rules of the Extranet.|
|An extranet must:|
|» Be as flexible as the business|
|An extranet must be driven by the demands of the market, not the limitations of technology. It must be extremely flexible and allow companies to immediately deploy extranet services that best fit the business need, be it intimate supply chain partners using a wide range of applications or mass e-commerce extranets driven by Web-based applications.|
|» Deploy in “Internet time”|
|An extranet develops quickly-every moment of hesitation is opportunity lost. To deploy an extranet, companies shouldn’t have to roll out a new infrastructure or go through a major re-architecting of their applications. To remain market-driven, enterprises must be able to deploy their extranet quickly, and leverage their existing infrastructure to do so. The extranet technology must drop-in to a network and give partners immediate authorized access.|
|» Protect the interests of the data owner|
|Extranet services need to be deployed in a fast and flexible way, but with the complete assurance that only the correct users can access the right services. An extranet must ensure that what’s supposed to be private, stays private.|
|» Serve the partner as a customer|
|An extranet presents a very important and delicate balance: providing customer service to key partners (who might also be customers) in a competitive environment with mission-critical resources at risk. The final solution must be an extranet without compromise. Partners should never be required to change their security policies, networks, applications, and firewalls for the “good” of the extranet community.|
|» Drive information to the decision-maker|
|An extranet must provide a central means to measure progress, performance, and popularity. Business units deploying applications need to understand which extranet content and applications are most successful.|