XML 17 R7.htm IDEA: XBRL DOCUMENT v3.20.2
1. Description of Business
9 Months Ended
Sep. 30, 2020
Organization, Consolidation and Presentation of Financial Statements [Abstract]  
Description of Business

1.Description of Business

 

We develop, market and support a family of entity identification, high speed data mining and cybersecurity solutions. Our products help detect, report and mitigate cybercrimes and advanced persistent threats. Intrusion’s products help protect critical information assets by quickly detecting, protecting, analyzing and reporting attacks or misuse of classified, private and regulated information for government and enterprise networks. Our product families include the following:

 

·TraceCop. Our TraceCop solution family includes a database of more than 400 terabytes of worldwide IP addresses, registrant information and their associations, along with a plurality of related IP information, some dating back nearly two decades. When combined with Intrusion’s multitude of cyber security ‘global threat feeds’, along with our TraceCop family of proprietary supporting tools, this vast and ever expanding capability is used in conjunction with our customer’s data to help identify areas of vulnerability and potential cyber security threats. In addition to its extensive capability, the TraceCop family includes analytical software with a GUI interface to assist the analysts in locating cybercriminals and other potential ‘bad actors’ or network anomalies.

 

·Savant. Savant is a high speed network data mining and analysis hardware and software solution that organizes the data into networks of relationships and associations. Its patented design exceeds performance expectations and ensures ‘deep dives’ into data-in-motion in order to quickly and accurately detect advanced persistent threats. Savant can operate on networks with data flows of over 20 gigabits per second, and still maintain a 100% inspection rate of all packets.

 

·INTRUSION Shield.  Intrusion Shield is designed as a next generation intrusion detection and protection solution.  After 20 years of providing research, analysis, and tools to the federal government and enterprise corporations, Intrusion possesses a comprehensive and proprietary database of Internet activity, including information about the activities of malicious online actors.  Intrusion’s Shield solution combines the comprehensive database with artificial intelligence (AI) and real-time process flow technology to provide businesses and government agencies with a unique and affordable tool to detect, identify, and neutralize malware. The Shield AI has been specifically trained to identify and stop ransomware, the most prolific and crippling form of malware. Shield is a combination of plug-and-play hardware, software, global data, and AI services providing organizations with aggressive protection against unaddressed information security threats and the most robust defense possible against cybercrime. Unlike traditional industry approaches that rely heavily on human resources, which malicious actors have learned to bypass, Intrusion Shield uses our extensive database together with real-time AI technology to prevent illicit behavior.  Shield’s proprietary architecture isolates and neutralizes malicious traffic and network flows that existing solutions cannot identify. Most breaches today are caused by malware free compromises that trigger no alarms in a firewall or endpoint solution. The common denominator is network communications, and Shield monitors and analyses all network traffic and communications allowing it to identify and stop malware-free attacks. Shield’s capabilities will continuously evolve based on real-time.

 

·Additional Shield Products In Development. In addition to INTRUSION Shield, we are developing complementary solutions to create a family of Shield offerings, including our first follow on offering, Shield CLOUD, which is targeted for use by businesses with a dedicated or hybrid Cloud network environment. We are in the process of Alpha testing Shield CLOUD, and we are developing additional solutions that will address cybersecurity needs in the areas of lateral traffic, remote employees, WiFi, and mobile devices.