XML 17 R7.htm IDEA: XBRL DOCUMENT v3.20.2
Note 1 - Description of Business
6 Months Ended
Jun. 30, 2020
Notes to Financial Statements  
Nature of Operations [Text Block]
1.
Description of Business
 
We develop, market and support a family of entity identification, high speed data mining and cybersecurity solutions. Our products help detect, report and mitigate cybercrimes and advanced persistent threats.
 
Our product families include:
 
 
TraceCop for entity identification, cybercrime detection and disclosure, and;
 
Savant for high speed data mining, analytics, detection, reporting and mitigation of cybersecurity threats.
 
Our products in development include:
 
 
Intrusion Shield
 
        We are in the process of developing a new product offering, Intrusion Shield, that is designed to be a next generation intrusion detection and protection solution.  After
20
years of providing research, analysis, and tools to the federal government and enterprise corporations, Intrusion possesses a comprehensive and proprietary database of Internet activity, including information about the activities of malicious online actors.  Intrusion's Shield product will combine that comprehensive database with artificial intelligence (AI) and real-time process flow technology to provide businesses and government agencies with a unique and affordable tool to detect, identify, and prevent cyber-crimes. 
 
Shield is a combination of plug-and-play hardware, software, global data, and AI services providing organizations with aggressive protection against unaddressed information security threats and the most robust defense possible against cybercrime. Unlike traditional industry approaches that rely heavily on human resources, which malicious actors have learned to bypass, Intrusion Shield uses our extensive database together with real-time AI technology to prevent illicit behavior.  Shield's proprietary architecture isolates and neutralizes malicious traffic and network flows that existing solutions cannot identify or even characterize. Most breaches today are caused by malware free compromises that trigger
no
alarms in a firewall or endpoint solution. The common denominator is network communications, and Shield monitors and analyses all network traffic and communications allowing it to identify and stop malware-free attacks. Shield's capabilities will continuously evolve based on real-time updates originating from our worldwide installations and growing TraceCop database identifying new dangers.
 
Shield does
not
seek to displace existing solutions, instead providing a new, and additional layer of cybersecurity for enterprises.  According to SBA
2019,
the U.S. enterprise market consists of
30.7
million businesses, of which
70%
are characterized as small and medium sized businesses.  While the company believes that many large enterprises will recognize the need this product addresses and will be incentivized to purchase Shield, the enterprise market has many decision makers for new security product purchases; therefore, the sale cycle
may
be longer for this product than our current product offerings.  We have identified businesses with from
100
to
1,000
users as our initial target market, as we believe this market segment has the most pressing need for the enhanced protection that the Intrusion Shield will offer.  We intend to leverage existing and new channel partners, such as value added resellers and systems integrators, to market Shield to this target market.
 
Shield has experienced positive progress during Alpha testing and the Company has identified
twelve
companies for the Beta release anticipated to begin in
September.
The configuration of hardware is a single Dell network appliance installed inline inside of the customer's firewall. The size of the network appliance will vary depending on the number of workstations and the size of the customer's internet connection be that
1Gb,
10Gb
or
100
Gb.
 
Intrusion's products help protect critical information assets by quickly detecting, protecting, analyzing and reporting attacks or misuse of classified, private and regulated information for government and enterprise networks.
 
We market and distribute our products through a direct sales force to:
 
  end-users, and
  value-added resellers.
 
Our end-user customers include:
 
 
U.S. federal government entities,
 
state and local government entities,
 
large and diverse conglomerates,
 
manufacturing entities, and
 
other customers.
 
We were organized in Texas in
September 1983
and reincorporated in Delaware in
October 1995.
Our principal executive offices are located at
1101
East Arapaho Road, Suite
200,
Richardson, Texas
75081,
and our telephone number is (
972
)
234
-
6400.
Our website URL is www.intrusion.com. References to the “Company”, “we”, “us”, “our”, “Intrusion” or “Intrusion Inc.” refer to Intrusion Inc. and its subsidiaries. Trademarks of Intrusion include:
 
 
INTRUSION SHIELD
 
PROCESS FLOW TECHNOLOGY
 
INTRUSION SAVANT
 
BRINGING SCIENCE INTO DECISION MAKING
 
TRACECOP
 
INTRUSION PROTECT EVERYTHING. TRUST NOTHING
 
PROTECT EVERYTHING. TRUST NOTHING.