Intrusion Income After Taxes 2010-2024 | INTZ
Intrusion income after taxes from 2010 to 2024. Income after taxes can be defined as earnings or losses after income tax expense but before minority interest, extraordinary items, discontinued operations, preferred dividends and accounting changes have been accounted for.
Intrusion Annual Income After Taxes (Millions of US $) |
2023 |
$-14 |
2022 |
$-16 |
2021 |
$-19 |
2020 |
$-7 |
2019 |
$4 |
2018 |
$2 |
2017 |
$-0 |
2016 |
$-2 |
2015 |
$-1 |
2014 |
$-0 |
2013 |
$1 |
2012 |
$-0 |
2011 |
$-1 |
2010 |
$0 |
2009 |
$0 |
Intrusion Quarterly Income After Taxes (Millions of US $) |
2024-06-30 |
$-2 |
2024-03-31 |
$-2 |
2023-12-31 |
$-3 |
2023-09-30 |
$-3 |
2023-06-30 |
$-3 |
2023-03-31 |
$-5 |
2022-12-31 |
$-5 |
2022-09-30 |
$-3 |
2022-06-30 |
$-4 |
2022-03-31 |
$-4 |
2021-12-31 |
$-4 |
2021-09-30 |
$-6 |
2021-06-30 |
$-5 |
2021-03-31 |
$-4 |
2020-12-31 |
$-4 |
2020-09-30 |
$-1 |
2020-06-30 |
$-1 |
2020-03-31 |
$-0 |
2019-12-31 |
$0 |
2019-09-30 |
$1 |
2019-06-30 |
$2 |
2019-03-31 |
$1 |
2018-12-31 |
$1 |
2018-09-30 |
$1 |
2018-06-30 |
$0 |
2018-03-31 |
$0 |
2017-12-31 |
$0 |
2017-09-30 |
$1 |
2017-06-30 |
$-0 |
2017-03-31 |
$-0 |
2016-12-31 |
$-0 |
2016-09-30 |
$-0 |
2016-06-30 |
$-0 |
2016-03-31 |
$-1 |
2015-12-31 |
$-1 |
2015-09-30 |
$-0 |
2015-06-30 |
$-0 |
2015-03-31 |
$-0 |
2014-12-31 |
$-0 |
2014-09-30 |
$0 |
2014-06-30 |
$-0 |
2014-03-31 |
$-0 |
2013-12-31 |
$0 |
2013-09-30 |
$0 |
2013-06-30 |
$0 |
2013-03-31 |
$0 |
2012-12-31 |
$-0 |
2012-09-30 |
$0 |
2012-06-30 |
$0 |
2012-03-31 |
$-0 |
2011-12-31 |
$-0 |
2011-09-30 |
$0 |
2011-06-30 |
$-0 |
2011-03-31 |
$-0 |
2010-12-31 |
$-0 |
2010-09-30 |
$0 |
2010-06-30 |
$0 |
2010-03-31 |
$0 |
2009-12-31 |
$0 |
2009-09-30 |
$0 |
2009-06-30 |
$0 |
2009-03-31 |
$-0 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|