- The report contains detailed information about Intrusion Inc. that gives an unrivalled in-depth knowledge about internal business-environment of the company: data about the owners, senior executives, locations, subsidiaries, markets, products, and company history.
- Another part of the report is a SWOT-analysis carried out for Intrusion Inc.. It involves specifying the objective of the company's business and identifies the different factors that are favorable and unfavorable to achieving that objective. SWOT-analysis helps to understand company’s strengths, weaknesses, opportunities, and possible threats against it.
- The Intrusion Inc. financial analysis covers the income statement and ratio trend-charts with balance sheets and cash flows presented on an annual and quarterly basis. The report outlines the main financial ratios pertaining to profitability, margin analysis, asset turnover, credit ratios, and company’s long-term solvency. This sort of company's information will assist and strengthen your company’s decision-making processes.
- In the part that describes Intrusion Inc. competitors and the industry in whole, the information about company's financial ratios is compared to those of its competitors and to the industry. The unique analysis of the market and company’s competitors along with detailed information about the internal and external factors affecting the relevant industry will help to manage your business environment. Your company’s business and sales activities will be boosted by gaining an insight into your competitors’ businesses.
- Also the report provides relevant news, an analysis of PR-activity, and stock price movements. The latter are correlated with pertinent news and press releases, and annual and quarterly forecasts are given by a variety of experts and market research firms. Such information creates your awareness about principal trends of Intrusion Inc. business.
About Intrusion Inc.
Intrusion, Inc. engages in the development, marketing, and support of entity identification, regulated information compliance, data privacy protection, and network intrusion prevention/detection products in the United States and internationally.
The companys product families include TraceCop for identity discovery and disclosure; Savant for network data mining; Compliance Commander for regulated information and data privacy protection; and SecureNet for network intrusion prevention and detection. Its products help protect critical information assets by detecting, protecting, analyzing, and reporting attacks or misuse of classified, private and regulated information for government and enterprise networks.
The companys TraceCop product family includes a database of worldwide IP addresses which are regularly updated. In addition, other information and analysis results, such as geo-location data may also be included. Customers use the TraceCop data to aid in the identification and location of individuals involved in cyber crime. In addition to the IP database, the TraceCop family includes analysis software and a GUI interface to assist analysts in locating the bad guys. The company sells the license fee and maintenance for the TraceCop database and either install and service the database at the Intrusion facility or install the TraceCop database on a customer server onsite.
Savant is a high-speed network data mining product, which organizes the data into networks of relationships. Savant operates on networks with data flows of approximately 20 gigabits (10 gigabits at full duplex). Savant can read and record approximately 20 gigabits without dropping packets. Uses include building persona and Internet habits of the customers network users. Savant provides deep inspection of network traffic recording interesting data and relationships. Savant is a software product which the company licenses to its customers and sells maintenance and upgrades. The company also re-sells the server required to implement Savant into the customers network.
Compliance Commander is the companys data leak prevention product family. Compliance Commander is a software product, which operates on a standard computer or server and connects in-line to the customers network. It licenses the Compliance Commander software to its customers and sell them software maintenance and upgrades. The company also resells standard computers for implementation of the software.
SecureNet is the companys Network Intrusion/Detection Product family. SecureNet is a software product, which operates on a standard computer or server and connects inline to the customers network. It licenses the SecureNet software to its customers and additionally sells software maintenance and upgrades. It also resells standard computers for implementation of the software. SecureNet provides network monitoring and analysis functions with the added ability to block malicious network traffic for up to two gigabit data flows. SecureNet products provide user customizable, protocol decode detection technology. The companys SecureNet sensors have their own Web browser interface for simplified configuration.
The company resells standard commercially available computers and servers from various vendors which it integrates with its different software products for implementation into its customer networks.
In addition to offering its network security products, the company also offers a range of services, including design and configuration, project planning, training, installation, and maintenance.
The companys end-user customers include the U.S. federal government entities; foreign government entities; local government entities; banks; credit unions; other financial institutions; and hospitals and other healthcare providers.
The company conducts sales and marketing efforts from its principal office in Richardson (Dallas), Texas. In addition, it has sales personnel, sales engineers or sales representatives located in California, Europe and Asia.
In data mining market, the company competes with small companies, including Niksun and NetScout. Its competitors in the regulated information compliance market include Vontu (Symantec), Port Authority (Websense), Vericept, Reconnex (McAfee Inc.), and Tablus (RSA Security). Its principal competitors in the network intrusion prevention and detection market include Internet Security Systems, Inc.(IBM), Cisco Systems, Inc., Symantec, Inc., Netscreen (Juniper Networks, Inc.), McAfee Inc., Tipping Point Technologies, a division of 3Com Corporation, and NFR Security (Checkpoint).
The company was founded in 1983. It was formerly known as ODS Networks, Inc. and changed its name to Intrusion.com, Inc. in 2000 and to Intrusion, Inc. in 2001.
The above Company Fundamental Report is a half-ready report and contents are subject to change.
It means that we have all necessary data in our database to prepare the report but need 2-3 days to complete it. During this time we are also updating the report with respect to the current moment. So, you can get all the most recent data available for the same price. Please note that preparation of additional types of analyses requires extra time.
1. INTRUSION INC. COMPANY PROFILE
1.2. Financial Performance
1.3. Key Executives
1.4. Ownership and Major Holders
1.5. Company History
2. INTRUSION INC. BUSINESS OVERVIEW
2.2. Major Products and Services
2.3. Markets and Sales Activities
2.4. Locations, Subsidiaries, Operating Units
3. INTRUSION INC. SWOT ANALYSIS
4. INTRUSION INC. FINANCIAL ANALYSIS
4.1.1. Income Statement
4.1.2. Balance Sheet
4.1.3. Cash Flow
4.2. Financial Ratios
4.2.2. Margin Analysis
4.2.3. Asset Turnover
4.2.4. Credit Ratios
4.2.5. Long-Term Solvency
4.2.6. Growth Over Prior Year
4.2.7. Financial Ratios Charts
4.3. Stock Market Snapshot
5. INTRUSION INC. COMPETITORS AND INDUSTRY ANALYSIS
5.1. Intrusion Inc. Direct Competitors
5.2. Comparison of Intrusion Inc. and Direct Competitors Financial Ratios
5.3. Comparison of Intrusion Inc. and Direct Competitors Stock Charts
5.4. Intrusion Inc. Industry Analysis
5.4.1. Software and Technology Services Industry Snapshot
5.4.2. Intrusion Inc. Industry Position Analysis
6. INTRUSION INC. NEWS & EVENTS
6.1. News & PR Activity Analysis
6.2. IR Corporate News
6.3. Marketing News
6.4. Corporate Events
7. INTRUSION INC. EXPERTS REVIEW1
7.1. Experts Opinion
7.2. Experts Estimates
8. INTRUSION INC. ENHANCED SWOT ANALYSIS2
9. UNITED STATES PESTEL ANALYSIS2
9.2. Economic Factors
9.3. Social Factors
9.4. Technological Factors
9.5. Environmental Factors
9.6. Legal Factors
10. INTRUSION INC. IFE, EFE, IE MATRICES2
10.2. External Factor Evaluation Matrix
10.3. Internal External Matrix
11. INTRUSION INC. PORTER FIVE FORCES ANALYSIS2
12. INTRUSION INC. VRIO ANALYSIS2
APPENDIX: RATIO DEFINITIONS
LIST OF TABLES
Intrusion Inc. Key Facts
Income Statement Key Figures
Balance Sheet Key Figures
Cash Flow Statement Key Figures
Financial Performance Abbreviation Guide
Intrusion Inc. Key Executives
Key Executives Biographies1
Key Executives Compensations1
Intrusion Inc. Major Shareholders
Intrusion Inc. History
Intrusion Inc. Products
Revenues by Segment
Revenues by Region
Intrusion Inc. Offices and Representations
Intrusion Inc. SWOT Analysis
Yearly Income Statement Including Trends
Income Statement Latest 4 Quarters Including Trends
Yearly Balance Sheet Including Trends
Balance Sheet Latest 4 Quarters Including Trends
Yearly Cash Flow Including Trends
Cash Flow Latest 4 Quarters Including Trends
Intrusion Inc. Profitability Ratios
Margin Analysis Ratios
Asset Turnover Ratios
Long-Term Solvency Ratios
Financial Ratios Growth Over Prior Year
Intrusion Inc. Capital Market Snapshot
Intrusion Inc. Direct Competitors Key Facts
Direct Competitors Profitability Ratios
Direct Competitors Margin Analysis Ratios
Direct Competitors Asset Turnover Ratios
Direct Competitors Credit Ratios
Direct Competitors Long-Term Solvency Ratios
Software and Technology Services Industry Statistics
Intrusion Inc. Industry Position
Company vs. Industry Income Statement Analysis
Company vs. Industry Balance Sheet Analysis
Company vs. Industry Cash Flow Analysis
Company vs. Industry Ratios Comparison
Intrusion Inc. Consensus Recommendations1
Analyst Recommendation Summary1
Price Target Summary1
Experts Recommendation Trends1
Revenue Estimates Analysis1
Earnings Estimates Analysis1
Revenue Estimates Trend1
Earnings Estimates Trend1
LIST OF FIGURES
Intrusion Inc. Annual Revenues in Comparison with Cost of Goods Sold and Gross Profit
Profit Margin Chart
Operating Margin Chart
Return on Equity (ROE) Chart
Return on Assets (ROA) Chart
Debt to Equity Chart
Current Ratio Chart
Intrusion Inc. 1-year Stock Charts
Intrusion Inc. 5-year Stock Charts
Intrusion Inc. vs. Main Indexes 1-year Stock Chart
Intrusion Inc. vs. Direct Competitors 1-year Stock Charts
Intrusion Inc. Article Density Chart
2 – These sections are available only when you purchase a report with appropriate additional types of analyses.
The complete financial data is available for publicly traded companies.
Enhanced SWOT Analysis
- How to use the strengths to take advantage of the opportunities?
- How to use the strengths to reduce likelihood and impact of the threats?
- How to overcome the weaknesses that obstruct taking advantage of the opportunities?
- How to overcome the weaknesses that can make the threats a reality?
Key Factors Examined by PESTEL Analysis:
- Legal – What laws and legislation will exert influence on the style the business is carried out?
IFE, EFE, IE Matrices
Porter Five Forces Analysis
- What composes a threat of substitute products and services?
- Is there a threat of new competitors entering the market?
- What is the intensity of competitive rivalry?
- How big is the bargaining power of buyers?
- How significant is the bargaining power of suppliers?
- Tangible resources
- Intangible resources
- Innovation and Creativity
- Organizational capabilities
- Costly to imitate?
- Organized properly?