answersLogoWhite

0


Best Answer

Companies which need to allow access to outside parties, such as vendors.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What companies use both intranets and extranets?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How is the trend to open systems connectivity and interoperability related to business use of Internet Intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the internet,


How is the trend toward open systems connectivity and interoperability related to business use of the Internet intranets and extranets?

How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet,


2 The IT tools being used by Otis in 2004 are simply-database workflow software intranets and extranets email- but the benefits appear to be extraordinary How can this be?

yes it was a good to use IT tools to improve quality and reduce costs


Secure network used for electronic commerce by authorized users are called?

pg 220 extranets secure networks used for e business and accesible through the firms web site by authorized usuers :) if u use these answers you should also contribute right ones too! we all benifit


How many companies use USA in there name?

22 million U.S. companies use USA in there name. While U.S. companies are usually followed by "Inc.", In Finland, many companies use both this Swedish abbreviation and the Finnish language.


What companies use virtualisation?

There are a lot of major companies that are using virtualisation. Apparently, this is the new way of computing. Companies such as Nostra Systems-IT Consultants and IBM IT Sollutions both use virtualisation.


How does the use of internet intranets and extranets by companies todat support their business processes and activities?

Internet: organization can connect directly with the general public. Opportunities range from giving away basic product information to automatically updating or patching retail software. Many businesses also conduct retail operations online.Intranets: organizations often use internet technologies to facilitate operations within the organization. Such systems might include product support knowledge bases, training systems, and access to the organisation's benefits system.Extranet: organizations may use these same internet technologies to connect with their business partners to facilitate supply chain management, help manage projects, manage accounts, or provide advanced technical support.Organizations use internet technologies to connect with both customers and suppliers. These technologies allow customers to generate and track their own orders as well as manager their accounts. They also enable significant supply chain automation


Can you use gateway in intranet?

of course , You can use gateway or firewall for intranet. Intranet is a combination of multiple local area networks. In Huge organizations, intranets are prevented from unauthorized external access by using network gateway and firewall. For small organizations, intranets may be created simply by using private Internet Protocol address ranges.


How do companies use extranets to link with those of their suppliers?

The extranet will link two businesses together. The link and be just for an electronic ordering system, or for more complex sharing transactions. The link can be put in so that the order is put in regularly for a certain supply, or an order is automatically generated to the supplier when stock reaches a certain level.


What potential security problems do you see in the increasing use of intranets and extranets in business?

As the use of Intranets and Extranets has grown, so has the need for security. Intranet and Extranet security breaches can take a variety of forms. For example, (!) An unauthorized person, such as a contractor or visitor, might gain access to a company’s computer system. (!) An employee or supplier authorized to use the system for one purpose might use it for another. For example, an engineer might break into the HR database to obtain confidential salary information. (!) Confidential information might be intercepted as it is being sent to an authorized user. For example, an intruder might attach a network sniffing device to the network. While sniffers are normally used for network diagnostics, they can also be used to intercept data coming over the wire. (!) Users may share documents between geographically separated offices over the Internet or Extranet, or telecommuters accessing the corporate Intranet from their home computer can expose sensitive data as it is sent over the wire. (!) Electronic mail can be intercepted in transit.Fortunately, there are a variety of techniques available to address these security holes within Extranets and Intranets. Keep in mind five fundamental goals of a security system: Privacy, Authentication, Content Integrity, Non-repudiation, and Ease-of-use, a set of technologies have been developed over the past fifteen years that are particular well suited to meeting these five security goals. Broadly called Public Key Infrastructure (PKI), this technology allows organizations using open networks, such as TCP/IP Intranets and Extranets, to replicate or even improve on the mechanisms used to ensure security in the physical world. Envelopes and secure couriers are replaced with sophisticated methods of data encryption, which can ensure that messages are only read by their intended recipients. Physical signatures and seals are replaced with digital signatures which, in addition to ensuring that messages came from a particular entity, can also ensure that message was not altered by as much as one bit during transit. Identity documents, such as passports, employee ID cards, and business licenses, can be replaced with digital certificates (also known as Digital IDs). Finally, the various mechanisms for centralized control, audit, and authorization, such as those provided by corporate governance structures, industry boards, or trusted third parties such as accountants, can be replicated in the digital world through the infrastructure used to managed encryption, digital signatures, and Digital IDs.


What companies manufacture giant bean bags?

Giant bean bags are produced by various companies and are available both for indoor or outdoor use. Two such specialist companies are 'Great Beanbags', or alternatively 'Comfy Sacks', both have online websites and have a great selection to choose from.


How can internet technologies be involved in improving a process in one of the function of business?

Using the Internet, intranets, extranets, and other network changes how accounting information systems monitor and track business activity. The online, interactive nature of such networks calls for new forms of transaction documents, procedures, and controls. Many companies are using or developing network links to their trading partners through the use of the Internet or other networks for applications such as order processing, inventory control, accounts receivable, and accounts payable. These advances in the accounting function have to vast improvements in the capturing, reporting, and the accuracy of company data. Thus, real-time processing of accounting information enables executives to make better and more informed decisions involving their firm’s resources.