Intrusion Revenue 2010-2024 | INTZ
Intrusion revenue from 2010 to 2024. Revenue can be defined as the amount of money a company receives from its customers in exchange for the sales of goods or services. Revenue is the top line item on an income statement from which all costs and expenses are subtracted to arrive at net income.
Intrusion Annual Revenue (Millions of US $) |
2023 |
$6 |
2022 |
$8 |
2021 |
$7 |
2020 |
$7 |
2019 |
$14 |
2018 |
$10 |
2017 |
$7 |
2016 |
$6 |
2015 |
$7 |
2014 |
$7 |
2013 |
$8 |
2012 |
$7 |
2011 |
$5 |
2010 |
$6 |
2009 |
$5 |
Intrusion Quarterly Revenue (Millions of US $) |
2024-09-30 |
$2 |
2024-06-30 |
$1 |
2024-03-31 |
$1 |
2023-12-31 |
$1 |
2023-09-30 |
$1 |
2023-06-30 |
$1 |
2023-03-31 |
$1 |
2022-12-31 |
$1 |
2022-09-30 |
$2 |
2022-06-30 |
$2 |
2022-03-31 |
$2 |
2021-12-31 |
$2 |
2021-09-30 |
$2 |
2021-06-30 |
$2 |
2021-03-31 |
$2 |
2020-12-31 |
$2 |
2020-09-30 |
$2 |
2020-06-30 |
$2 |
2020-03-31 |
$2 |
2019-12-31 |
$3 |
2019-09-30 |
$4 |
2019-06-30 |
$4 |
2019-03-31 |
$3 |
2018-12-31 |
$3 |
2018-09-30 |
$3 |
2018-06-30 |
$2 |
2018-03-31 |
$2 |
2017-12-31 |
$2 |
2017-09-30 |
$2 |
2017-06-30 |
$2 |
2017-03-31 |
$2 |
2016-12-31 |
$1 |
2016-09-30 |
$2 |
2016-06-30 |
$2 |
2016-03-31 |
$2 |
2015-12-31 |
$1 |
2015-09-30 |
$2 |
2015-06-30 |
$2 |
2015-03-31 |
$2 |
2014-12-31 |
$2 |
2014-09-30 |
$2 |
2014-06-30 |
$2 |
2014-03-31 |
$2 |
2013-12-31 |
$2 |
2013-09-30 |
$2 |
2013-06-30 |
$2 |
2013-03-31 |
$2 |
2012-12-31 |
$1 |
2012-09-30 |
$2 |
2012-06-30 |
$2 |
2012-03-31 |
$1 |
2011-12-31 |
$1 |
2011-09-30 |
$2 |
2011-06-30 |
$1 |
2011-03-31 |
$1 |
2010-12-31 |
$1 |
2010-09-30 |
$2 |
2010-06-30 |
$2 |
2010-03-31 |
$2 |
2009-12-31 |
$2 |
2009-09-30 |
$1 |
2009-06-30 |
$1 |
2009-03-31 |
$1 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|