Intrusion Other Long-Term Assets 2010-2024 | INTZ
Intrusion other long-term assets from 2010 to 2024. Other long-term assets can be defined as field containing the sum of all non-current assets that cannot be standardized into another field as well as those that are aggregated by the company because materially, they are too small to list separately.
Intrusion Annual Other Long-Term Assets (Millions of US $) |
2023 |
$0 |
2022 |
$0 |
2021 |
$0 |
2020 |
$0 |
2019 |
$0 |
2018 |
$0 |
2017 |
$0 |
2016 |
$0 |
2015 |
$0 |
2014 |
$0 |
2013 |
$0 |
2012 |
$0 |
2011 |
$0 |
2010 |
$0 |
2009 |
$0 |
Intrusion Quarterly Other Long-Term Assets (Millions of US $) |
2024-09-30 |
$0 |
2024-06-30 |
$0 |
2024-03-31 |
$0 |
2023-12-31 |
$0 |
2023-09-30 |
$0 |
2023-06-30 |
$0 |
2023-03-31 |
$0 |
2022-12-31 |
$0 |
2022-09-30 |
$0 |
2022-06-30 |
$0 |
2022-03-31 |
$0 |
2021-12-31 |
$0 |
2021-09-30 |
$0 |
2021-06-30 |
$0 |
2021-03-31 |
$0 |
2020-12-31 |
$0 |
2020-09-30 |
$0 |
2020-06-30 |
$0 |
2020-03-31 |
$0 |
2019-12-31 |
$0 |
2019-09-30 |
$0 |
2019-06-30 |
$0 |
2019-03-31 |
$0 |
2018-12-31 |
$0 |
2018-09-30 |
$0 |
2018-06-30 |
$0 |
2018-03-31 |
$0 |
2017-12-31 |
$0 |
2017-09-30 |
$0 |
2017-06-30 |
$0 |
2017-03-31 |
$0 |
2016-12-31 |
$0 |
2016-09-30 |
$0 |
2016-06-30 |
$0 |
2016-03-31 |
$0 |
2015-12-31 |
$0 |
2015-09-30 |
$0 |
2015-06-30 |
$0 |
2015-03-31 |
$0 |
2014-12-31 |
$0 |
2014-09-30 |
$0 |
2014-06-30 |
$0 |
2014-03-31 |
$0 |
2013-12-31 |
$0 |
2013-09-30 |
$0 |
2013-06-30 |
$0 |
2013-03-31 |
$0 |
2012-12-31 |
$0 |
2012-09-30 |
$0 |
2012-06-30 |
$0 |
2012-03-31 |
$0 |
2011-12-31 |
$0 |
2011-09-30 |
$0 |
2011-06-30 |
$0 |
2011-03-31 |
$0 |
2010-12-31 |
$0 |
2010-09-30 |
$0 |
2010-06-30 |
$0 |
2010-03-31 |
$0 |
2009-12-31 |
$0 |
2009-09-30 |
$0 |
2009-06-30 |
$0 |
2009-03-31 |
$0 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|