Intrusion Total Current Liabilities 2010-2024 | INTZ
Intrusion total current liabilities from 2010 to 2024. Total current liabilities can be defined as the sum of all liabilities classified as current for having maturities of less than one year.
Intrusion Annual Total Current Liabilities (Millions of US $) |
2023 |
$14 |
2022 |
$13 |
2021 |
$3 |
2020 |
$2 |
2019 |
$2 |
2018 |
$3 |
2017 |
$2 |
2016 |
$2 |
2015 |
$2 |
2014 |
$1 |
2013 |
$2 |
2012 |
$1 |
2011 |
$1 |
2010 |
$2 |
2009 |
$1 |
Intrusion Quarterly Total Current Liabilities (Millions of US $) |
2024-09-30 |
$3 |
2024-06-30 |
$3 |
2024-03-31 |
$5 |
2023-12-31 |
$14 |
2023-09-30 |
$16 |
2023-06-30 |
$15 |
2023-03-31 |
$14 |
2022-12-31 |
$13 |
2022-09-30 |
$14 |
2022-06-30 |
$10 |
2022-03-31 |
$7 |
2021-12-31 |
$3 |
2021-09-30 |
$4 |
2021-06-30 |
$4 |
2021-03-31 |
$3 |
2020-12-31 |
$2 |
2020-09-30 |
$2 |
2020-06-30 |
$2 |
2020-03-31 |
$2 |
2019-12-31 |
$2 |
2019-09-30 |
$2 |
2019-06-30 |
$3 |
2019-03-31 |
$2 |
2018-12-31 |
$3 |
2018-09-30 |
$3 |
2018-06-30 |
$3 |
2018-03-31 |
$2 |
2017-12-31 |
$2 |
2017-09-30 |
$2 |
2017-06-30 |
$2 |
2017-03-31 |
$1 |
2016-12-31 |
$2 |
2016-09-30 |
$2 |
2016-06-30 |
$2 |
2016-03-31 |
$2 |
2015-12-31 |
$2 |
2015-09-30 |
$4 |
2015-06-30 |
$4 |
2015-03-31 |
$3 |
2014-12-31 |
$1 |
2014-09-30 |
$4 |
2014-06-30 |
$3 |
2014-03-31 |
$3 |
2013-12-31 |
$2 |
2013-09-30 |
$4 |
2013-06-30 |
$3 |
2013-03-31 |
$4 |
2012-12-31 |
$1 |
2012-09-30 |
$3 |
2012-06-30 |
$3 |
2012-03-31 |
$3 |
2011-12-31 |
$1 |
2011-09-30 |
$2 |
2011-06-30 |
$2 |
2011-03-31 |
$2 |
2010-12-31 |
$2 |
2010-09-30 |
$1 |
2010-06-30 |
$2 |
2010-03-31 |
$2 |
2009-12-31 |
$1 |
2009-09-30 |
$2 |
2009-06-30 |
$2 |
2009-03-31 |
$2 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|