Intrusion Net Income 2010-2024 | INTZ
Intrusion net income from 2010 to 2024. Net income can be defined as company's net profit or loss after all revenues, income items, and expenses have been accounted for.
Intrusion Annual Net Income (Millions of US $) |
2023 |
$-14 |
2022 |
$-16 |
2021 |
$-19 |
2020 |
$-7 |
2019 |
$4 |
2018 |
$2 |
2017 |
$-0 |
2016 |
$-2 |
2015 |
$-1 |
2014 |
$-0 |
2013 |
$0 |
2012 |
$-0 |
2011 |
$-1 |
2010 |
$0 |
2009 |
$0 |
Intrusion Quarterly Net Income (Millions of US $) |
2024-09-30 |
$-2 |
2024-06-30 |
$-2 |
2024-03-31 |
$-2 |
2023-12-31 |
$-3 |
2023-09-30 |
$-3 |
2023-06-30 |
$-3 |
2023-03-31 |
$-5 |
2022-12-31 |
$-5 |
2022-09-30 |
$-3 |
2022-06-30 |
$-4 |
2022-03-31 |
$-4 |
2021-12-31 |
$-4 |
2021-09-30 |
$-6 |
2021-06-30 |
$-5 |
2021-03-31 |
$-4 |
2020-12-31 |
$-4 |
2020-09-30 |
$-1 |
2020-06-30 |
$-1 |
2020-03-31 |
$-0 |
2019-12-31 |
$0 |
2019-09-30 |
$1 |
2019-06-30 |
$2 |
2019-03-31 |
$1 |
2018-12-31 |
$1 |
2018-09-30 |
$1 |
2018-06-30 |
$0 |
2018-03-31 |
$0 |
2017-12-31 |
$0 |
2017-09-30 |
$1 |
2017-06-30 |
$-0 |
2017-03-31 |
$-0 |
2016-12-31 |
$-0 |
2016-09-30 |
$-0 |
2016-06-30 |
$-0 |
2016-03-31 |
$-1 |
2015-12-31 |
$-1 |
2015-09-30 |
$-0 |
2015-06-30 |
$-0 |
2015-03-31 |
$-0 |
2014-12-31 |
$-0 |
2014-09-30 |
$0 |
2014-06-30 |
$-0 |
2014-03-31 |
$-0 |
2013-12-31 |
$0 |
2013-09-30 |
$0 |
2013-06-30 |
$0 |
2013-03-31 |
$0 |
2012-12-31 |
$-0 |
2012-09-30 |
$0 |
2012-06-30 |
$0 |
2012-03-31 |
$-0 |
2011-12-31 |
$-0 |
2011-09-30 |
$0 |
2011-06-30 |
$-1 |
2011-03-31 |
$-0 |
2010-12-31 |
$-0 |
2010-09-30 |
$0 |
2010-06-30 |
$0 |
2010-03-31 |
$0 |
2009-12-31 |
$0 |
2009-09-30 |
$0 |
2009-06-30 |
$0 |
2009-03-31 |
$-0 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|