Unrivaled Intelligence for Cyber Defense Teams

Intrusion Overview

First Quarter 2023 Update

1

Safe Harbor Statement

This presentation has been prepared by Intrusion Inc. (the "Company") solely for informational purposes based on its own information, as well as information from public sources. This presentation has been prepared to assist interested parties in making their own evaluation of the Company and does not propose to contain all of the information that may be relevant. In all cases, interested parties should conduct their own investigation and analysis of the Company and the data set forth in the presentation and any other information provided by or on behalf of the Company. This presentation does not constitute an offer to sell, nor a solicitation of an offer to buy, any securities of the Company by any person in any jurisdiction in which it is unlawful for such person to make such an offering or solicitation. Neither the Securities and Exchange Commission nor any other regulatory body has approved or disapproved of the securities of the Company or passed upon the accuracy or adequacy of this presentation. Any representation to the contrary is a criminal offense.

Except as otherwise indicated, this presentation speaks as of the date hereof. The delivery of this presentation shall not, under any circumstances, create any implication that there has been no change in the affairs of the Company after the date hereof.

Certain of the information contained herein may be derived from information provided by industry sources. The Company believes that such information is accurate and that the sources from which it has been obtained are reliable. The Company cannot guarantee the accuracy of such information and has not independently verified such information.

This presentation contains forward-looking statements within the meaning of the federal securities laws. These forward-looking statements can be identified by the use of forward-looking terminology, including the terms "believe," "estimate," "project," "anticipate," "expect," "seek," "predict," "continue," "possible," "intend," "may," "might," "will," "could," would" or "should" or, in each case, their negative, or other variations or comparable terminology. These forward-looking statements include all matters that are not historical facts. They appear in a number of places throughout this presentation and include statements regarding our intentions, beliefs or current expectations concerning, among other things, the performance of our products in the marketplace, the current technological, network, and communication platforms our products operate on and with; our ability to stay current and competitive in our research and development efforts; our ability to protect and enforce our intellectual property rights, the success of our commercialization objectives, and our customer marketing and sales initiatives. We derive many of our forward-looking statements from our operating budgets and forecasts, which are based upon many detailed assumptions. While we believe that our assumptions are reasonable, we caution that it is very difficult to predict the impact of known factors, and, of course, it is impossible for us to anticipate all factors that could affect our actual results. Forward-looking statements should not be read as a guarantee of future performance or results and may not be accurate indications of when such performance or results will be achieved. In light of these risks and uncertainties, the forward-looking events and circumstances discussed in this presentation may not occur and actual results could differ materially from those anticipated or implied in the forward-looking statements. A number of important factors could cause our actual results to differ materially from those indicated in these forward-looking statements, including risks and uncertainties related to product performance, rapidly changing technologies, and the success of our sales and marketing efforts, as well as those set forth in the Company's filings with the Securities and Exchange Commission under the heading "Risk Factors."

2

What We Do…

Protect against threats that are leaking through or evading other parts of the cybersecurity stack already in place

Identify threats relevant to the customer's environment in real time

Block malicious connections automatically - and without creating false alerts

Analyze BOTH incoming and outgoing traffic

3

A Cyber Threat Intelligence Engine 30 Years in the Making

Proprietary Threat Intelligence

from decades of networking and government cyber threat consulting

Patented Data Mining and Network Flow Analysis

allows near 100% packet capture at high speeds

Unique Risk Assessment

based on a combination of reputation, behavior, manual analysis, and historical records

Largest Known

IP-Related Database

with historical data on over 8.5 billion IPs

8.5+ billion IPs

Proprietary database with history and intel on billions of IPs and hostnames

Competitors

4

Intrusion Milestones

Intrusion

Beginning of Categorized and

Tony Scott Joins

Founded

Recorded Internet Traffic

Intrusion as CEO

1983

1996

2021

2022

Government Threat

Launch of First Commercial

Intrusion Shield Cloud and

Intelligence Consulting

Product, Shield Appliance

Endpoint Solutions Released

30 years

of securing networks,

threat hunting, and analysis expertise

5

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Intrusion Inc. published this content on 26 June 2023 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 26 June 2023 20:36:07 UTC.