Intrusion Total Liabilities and Share Holders Equity 2010-2024 | INTZ
Intrusion total liabilities and share holders equity from 2010 to 2024. Total liabilities and share holders equity can be defined as the total of all liabilities and shareholders' equity.
Intrusion Annual Total Liabilities and Share Holders Equity (Millions of US $) |
2023 |
$6 |
2022 |
$9 |
2021 |
$9 |
2020 |
$20 |
2019 |
$7 |
2018 |
$4 |
2017 |
$1 |
2016 |
$1 |
2015 |
$1 |
2014 |
$2 |
2013 |
$2 |
2012 |
$1 |
2011 |
$1 |
2010 |
$1 |
2009 |
$1 |
Intrusion Quarterly Total Liabilities and Share Holders Equity (Millions of US $) |
2024-09-30 |
$7 |
2024-06-30 |
$7 |
2024-03-31 |
$6 |
2023-12-31 |
$6 |
2023-09-30 |
$5 |
2023-06-30 |
$5 |
2023-03-31 |
$5 |
2022-12-31 |
$9 |
2022-09-30 |
$14 |
2022-06-30 |
$13 |
2022-03-31 |
$11 |
2021-12-31 |
$9 |
2021-09-30 |
$13 |
2021-06-30 |
$14 |
2021-03-31 |
$17 |
2020-12-31 |
$20 |
2020-09-30 |
$5 |
2020-06-30 |
$6 |
2020-03-31 |
$6 |
2019-12-31 |
$7 |
2019-09-30 |
$7 |
2019-06-30 |
$6 |
2019-03-31 |
$5 |
2018-12-31 |
$4 |
2018-09-30 |
$3 |
2018-06-30 |
$2 |
2018-03-31 |
$2 |
2017-12-31 |
$1 |
2017-09-30 |
$1 |
2017-06-30 |
$1 |
2017-03-31 |
$1 |
2016-12-31 |
$1 |
2016-09-30 |
$1 |
2016-06-30 |
$2 |
2016-03-31 |
$2 |
2015-12-31 |
$1 |
2015-09-30 |
$2 |
2015-06-30 |
$3 |
2015-03-31 |
$2 |
2014-12-31 |
$2 |
2014-09-30 |
$3 |
2014-06-30 |
$2 |
2014-03-31 |
$2 |
2013-12-31 |
$2 |
2013-09-30 |
$3 |
2013-06-30 |
$2 |
2013-03-31 |
$2 |
2012-12-31 |
$1 |
2012-09-30 |
$1 |
2012-06-30 |
$2 |
2012-03-31 |
$1 |
2011-12-31 |
$1 |
2011-09-30 |
$1 |
2011-06-30 |
$1 |
2011-03-31 |
$1 |
2010-12-31 |
$1 |
2010-09-30 |
$1 |
2010-06-30 |
$1 |
2010-03-31 |
$1 |
2009-12-31 |
$1 |
2009-09-30 |
$1 |
2009-06-30 |
$1 |
2009-03-31 |
$1 |
Sector |
Industry |
Market Cap |
Revenue |
Computer and Technology |
Computer Networks |
$0.005B |
$0.006B |
Intrusion Inc. is a leading global provider of enterprise security solutions for the information-driven economy. Intrusion Inc.'s suite of security products help businesses protect critical information assets by quickly detecting, analyzing and responding to network- and host-based attacks.
|