Intrusion Research and Development Expenses 2010-2024 | INTZ
Intrusion research and development expenses from 2010 to 2024. Research and development expenses can be defined as an expense arising from studies and product development processes.
Intrusion Annual Research and Development Expenses (Millions of US $) |
2023 |
$6 |
2022 |
$6 |
2021 |
$6 |
2020 |
$4 |
2019 |
$1 |
2018 |
$1 |
2017 |
$2 |
2016 |
$2 |
2015 |
$2 |
2014 |
$2 |
2013 |
$2 |
2012 |
$2 |
2011 |
$2 |
2010 |
$1 |
2009 |
$1 |
Intrusion Quarterly Research and Development Expenses (Millions of US $) |
2024-06-30 |
$1 |
2024-03-31 |
$1 |
2023-12-31 |
$1 |
2023-09-30 |
$1 |
2023-06-30 |
$1 |
2023-03-31 |
$2 |
2022-12-31 |
$2 |
2022-09-30 |
$1 |
2022-06-30 |
$1 |
2022-03-31 |
$2 |
2021-12-31 |
$1 |
2021-09-30 |
$2 |
2021-06-30 |
$2 |
2021-03-31 |
$1 |
2020-12-31 |
$1 |
2020-09-30 |
$1 |
2020-06-30 |
$1 |
2020-03-31 |
$1 |
2019-12-31 |
$1 |
2019-09-30 |
$0 |
2019-06-30 |
$0 |
2019-03-31 |
$0 |
2018-12-31 |
$0 |
2018-09-30 |
$0 |
2018-06-30 |
$0 |
2018-03-31 |
$0 |
2017-12-31 |
$0 |
2017-09-30 |
$1 |
2017-06-30 |
$1 |
2017-03-31 |
$1 |
2016-12-31 |
$1 |
2016-09-30 |
$1 |
2016-06-30 |
$1 |
2016-03-31 |
$1 |
2015-12-31 |
$1 |
2015-09-30 |
$1 |
2015-06-30 |
$1 |
2015-03-31 |
$1 |
2014-12-31 |
$0 |
2014-09-30 |
$0 |
2014-06-30 |
$1 |
2014-03-31 |
$0 |
2013-12-31 |
$0 |
2013-09-30 |
$0 |
2013-06-30 |
$0 |
2013-03-31 |
$0 |
2012-12-31 |
$1 |
2012-09-30 |
$0 |
2012-06-30 |
$0 |
2012-03-31 |
$0 |
2011-12-31 |
$0 |
2011-09-30 |
$0 |
2011-06-30 |
$0 |
2011-03-31 |
$0 |
2010-12-31 |
$0 |
2010-09-30 |
$0 |
2010-06-30 |
$0 |
2010-03-31 |
$0 |
2009-12-31 |
$0 |
2009-09-30 |
$0 |
2009-06-30 |
$0 |
2009-03-31 |
$0 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|