STAKEHOLDERS
WITH
EXTRANETS
HOW-TO GUIDE
Supporting Stakeholders with Extranets
HOW-TO GUIDE
This report provides practical advice for developing secure, user-friendly extranets for your key
stakeholders.
What is an Extranet?
Business Benefits of Creating an Extranet
Security Issues Surrounding Extranets
Extranet Design Best Practices
How to Set-up your Extranet
Review this report to understand how to implement an external communication tool for employees,
partners, customers, or other key stakeholders. Use our Extranet Development Checklist to
ensure you don’t miss any key steps in the process.
What is an Extranet?
An extranet is an extension of a company’s internal network that allows authorized users to access
information in a secured manner. Public access can be given to employees, customers, partners,
investors, or other key stakeholders.
Extranets generally reside on a company’s private server rather than on a public Internet server.
However, they use Internet protocols so users can navigate with a web browser.
Access from the Internet can be controlled through various architectures that are username/pass-
word specific, thus limiting users to pages relevant to their needs, while keeping other areas of
the extranet private and secure.
Many service oriented companies use extranets to provide a system for customer support and to
have a single user interface to communicate with business partners. Other reasons companies
tend to use extranets are as follows:
Supply Chain Integration: online ordering, order tracking, and inventory management.
Cost Reduction: companies will often make manuals, catalogues, or technical documentation
available online to save money on printing and distributing hard copies.
Accountability: past projects and draft documents can be archived, accurate time and billing
information can be documented, and a communication log can be maintained to ensure
service level agreement are met.
Collaboration between Business Partners: allowing members of a product team to work with
common documentation remotely can increase collaboration.
Improve Customer Service: allows customers to have direct access to information and to
resolve their own inquiries 24/7.
Work remotely: enables constant communication and access to business information regard-
less of time or location. This can also make servicing remote clients easier and less expensive
than traditional methods.
Security: provided this is a requirement for your extranet, exchanges will take place in a secure
environment with log information readily available.
Take Extranet Liabilities into Account: risks such as unplanned disasters (denial of service),
performance degradations or application unavailability, and security breaches, can cause
major problems if your business becomes entirely dependent on this system.
Review Extranet Access Controls: validate that they represent the best choices for the specific
business applications and user connectivity needs. Consider adding two-factor authentication
to increase security.
Consider Other Security Measures on a per application basis: These include data encryption
and protection, mutual client/server authentication, and user access rights verification along
with non-repudiation.
Establish Security Policies: user access and privilege requirements must be established,
disseminated to users, and actively enforced to reduce your risk.
Review Privacy Legislation: evaluate HIPAA, Sarbanes Oxley, and other legislation to ensure
that the information you plan to provide is permitted.
Application Security Reviews: should be conducted to ensure that security policies are
working as planned. Be sure to actively check access logs on a weekly basis.
Servers and Physical Storage: must be situated in a secure environment to ensure application
availability.
Take Time to Select the Right Solution: employees must be comfortable with the solution. It
must also reflect the right amount of information you want to store and exchange with clients,
partners, or other users.
Consider Outside Assistance: If you don’t have internal IT skills, hire a reputable IT service
provider who can help with set-up, hosting and on-going support.
Monitor the Solution: monitoring can be done both internally (through employee survey) and
externally (through client feedback). Also, review adoption rates and application performance
on a regular basis.
Review the Solution: after a few months, conduct a formal review to see how much money
the system has saved your organization. It is also important to consider intangible benefits like
increased customer satisfaction.
If It’s Not Working, Don’t Use It: don’t waste time trying to force a fit for all stakeholders.
You can always add functionality or sections for stakeholder groups on an incremental basis.
Current solutions may need to be replaced with more user-friendly or secure applications.
Don’t Put Everything In: too much information in your extranet can make it more difficult
for users to find what they are looking for. Create a homepage that lists the most commonly
searched for information, to facilitate user adoption rates and experience.
1 Requirements
Define your Requirements
7 Implementation
8 Launch
9 Training
VIEW RESOURCE
10 Review
1 Requirements
Goals and Objectives
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Select Target Audience
3 Target
Audience
that all key requirements can
be delivered.
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Content
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
User Access Controls
5 Control
Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Create Role Based
Functionality
2 Goals
Address roles in your
organizations (administration,
Target
3 Audience
client, employee,
management) and assign
features and functions to
roles.
4 Content
Training and on-going support
must also be addressed, when
Control determining maintenance
5 Access processes.
6 Based on
Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Implement your Solution
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Go Live
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Conduct User Training
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
1 Requirements
Review and Monitor
4 Content
Control
5 Access
6 Based on Roles
7 Implementation
8 Launch
9 Training
10 Review
Our analysts identify best practices from fast-growing companies and build
Playbooks & Toolkits, Guides & Reports, Training Courses, and Project
Templates to help you optimize your processes, add structure to your depart-
ment, and get your team punching above their weight class.
Manage your work visually with our easy-to-use platform, built for small
marketing teams by design. See what your team is working on at a glance
so you can spend less time managing projects and more time knocking
stuff off your list.
Through strategic partnerships with the AMA, ANA, and AIPMM, our
1,000+ time-saving tools & resources have become the industry standard.
Don’t start from scratch!
LEARN MORE