Stealth Technology
Stealth Technology
background

Top Stealth Technology Companies

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Filter

Locations


Result types


Type of company


Industries


Company status

Number of employees

to

Founding year

to


Lock keywords

Exclude keywords

Optional keywords

Clear filters

101 companies for Stealth Technology

Stealth Software Technologies's Logo

Los Angeles, United States

11-50 Employees

2006

Our mission is to bring the latest techniques in cryptography research to software products, helping organizations to maximize the utility of their data while mitigating security and privacy risks. We develop cutting-edge software products for applied cryptography and cybersecurity. We develop privacy-enhancing technologies and support research advances in the areas of secure multiparty computation (for example to perform secure federated learning), zero-knowledge proofs, zero-trust networking, searchable encryption, secure cloud storage, authentication, secure blockchain (for example for supply-chain management), and secure and resilient communication. Stealth was founded in 2006 by Distinguished UCLA professor Rafail Ostrovsky and a team of cryptography researchers and software developers. By leveraging our expertise in the latest theoretical advances in the field — many of which are pioneered by our own research efforts — we are able to build software solutions that provide unparalleled security, grounded in rigorous scientific proof, without compromising on performance and functionality requirements. Stealth is a non-traditional cybersecurity company, and our approach to the above problems is fundamentally different. By using sophisticated data protection techniques, we are able to secure data in a way that does not require exceptions to be made when permitted usage is undertaken. Achieving these outcomes is a challenge when any requisite data is held by another company that is willing to work with you to extract the value of joint data, but can’t share their unencrypted data without revealing confidential information.

+

Featured

Core business
Image for Stealth Software Technologies

Stealth Software Technologies

... Stealth Software Technologies ...

Stealth Technologies Pty Ltd's Logo

Perth, Australia

1-10 Employees

2018

We are actively seeking out research and advisory collaborators in the following technical disciplines:. Using a multi-disciplinary approach, we are able to develop purpose built autonomous vehicles, powered by artificial intelligence, computer vision and purpose built robotics. Amazon Web Services offers reliable, scalable, and inexpensive cloud computing services. Built to withstand harsh climate conditions, whether that’s heat, rain, dust and wind. The ASV delivers autonomous security patrol and surveillance capabilities, together with perimeter intrusion integrity and sensor testing for critical physical infrastructure. Built to withstand Australia’s harshest climate conditions, whether that’s extreme heat, rain, dust and wind. Stealth Technologies is a wholly owned subsidiary of Strategic Elements.

+

Featured

Core business
Image for Stealth Technologies

Stealth Technologies

... Stealth Technologies adds drone tech to ...

Stealth Grid's Logo

Escondido, United States

1-10 Employees

2011

Our mission is to enable and empower them to harness the full potential of the Cloud. Stealth Grid is a trailblazer providing quantum cyber security solutions across diverse industry sectors, encompassing blockchain, banking, government technology, IoT, manufacturing, encrypted unified communications, cloud, and mobile. Going beyond the horizon, we are actively developing the Quantum Secure Digital Identity (QSDI) global ecosystem, surpassing existing ID systems with unparalleled global reach, steadfast privacy, and on-demand accessibility. Our foundation is built on exceptional technical expertise and unparalleled market knowledge, with two-thirds of our dedicated workforce actively engaged in R&D. With an international team of security experts and renowned cryptographers, we take immense pride in fortifying your digital world like no other. Our cutting-edge technology positions us as the leading Cyber Security Specialists for the Internet of Things. Every aspect of our work is meticulously crafted to safeguard your privacy and deliver the most robust cyber security worldwide.

+

Featured

Core business
Image for STEALTH GRID TECHNOLOGIES: THE QUANTUM MESH NETWORK OF THE FUTURE

STEALTH GRID TECHNOLOGIES: THE QUANTUM MESH NETWORK OF THE FUTURE

... STEALTH GRID TECHNOLOGIES: THE QUANTUM MESH NETWORK OF THE ...

Owley's Logo

Labège, France

1-10 Employees

2021

Owley in field tools are designed to minimise time spent by operators on the field to recover assets and maximise the recovery rate. Owley Cloud provides a simple mean to support and monitor in-field operations, coordinate researches and manage asset recovery tasks and activities. Our products operate independently of infrastructure, providing versatility and optimizing rescue detection range for both indoor and outdoor scenarios. Combination of Owley with a cellular or an IoT network allow an outstanding recovery rate of at a minimum time-to-recover, even across the borders.

+

Featured

Core business
Image for Front Page - Owley

Front Page - Owley

... "Owley works where other geolocation and communication means don't, such as cellular, GPS, ... " CELLULAR and GPS Jamming RESISTANT WORKS IN NON COVERED AREAS WORKS IN CONFINED ENVIRONEMENT stealth TECHNOLOGY contact […] ...

Strategic Elements's Logo

1-10 Employees

2006

Our goal is to create large tax-free ASX-listed capital gains. Strategic Elements operates as a venture builder where it generates ventures and projects from combining teams of leading scientists or innovators in the technology or resources sectors. Strategic Elements operates as a registered Pooled Development Fund (PDF) on the Australian Stock Exchange under the code ‘SOR’. Strategic Elements operates as a registered Pooled Development Fund (PDF) on the Australian Stock Exchange under the code ‘SOR’. We have a focus on technology and resources. Today, Strategic Elements continues to explore new fields of innovation that can offer investors high growth potential. In doing so, Strategic Elements empowers Australia’s most innovative SME’s not just with funding, but with intellectual property protection, company formation, incubation, scale-up and partnering. The Energy Ink technology is a liquid ink based on graphene oxide that is able to harvest energy from the humidity in the air or skin surface to produce electrical energy.

+

Featured

Core business
Image for Strategic Elements

Strategic Elements

... Stealth Technologies ...

Niagara Conservation's Logo

Flower Mound, United States

51-100 Employees

1977

Our founder, Bill Cutler, is what you could call an obsessive tinkerer. As a champion of water conservation long before it was cool, that obsession often turned to the showerhead. “Why should something so simple be so wasteful?”. That curiosity soon grew into an all-consuming quest to build the greatest water-saving product in history. Bill quickly began to accumulate dozens, even hundreds, of showerheads in his home garage to explore their inner-workings. All that tinkering paid off in 1974, when he developed the first Niagara showerhead—a watershed moment in every day conservation.

+

Featured

Product
Image for Stealth Technology by Niagara

Stealth Technology by Niagara

... Stealth Technology by ...

CMN NAVAL's Logo

Paris, France

501-1000 Employees

We are committed to innovation and expanding our product range and solutions to meet our customer’s unique needs. CMN NAVAL is a world-renowned expert in designing, engineering and constructing top-of-the-line naval vessels, commercial vessels, and mega yachts. CMN NAVAL is a trusted partner for returning customers with a proven track record of providing vessels and support to over 48 navies worldwide, including those of NATO countries. CMN NAVAL’s design and engineering team have more than 70 years of experience in military and commercial ships building . CMN NAVAL has delivered more than 3,500 vessels and provided support to 48 navies around the world. Products range from 15-meter high-speed interceptors to frigates. CMN NAVAL has always been known for its innovative approach to shipbuilding. We not only build ships, but also trusted partnerships with our customers by carefully listening to their individual needs and requirements.

+

Featured

Service
Image for Logistics Support, Management Systems & Transfer of Technology | CMN NAVAL

Logistics Support, Management Systems & Transfer of Technology | CMN NAVAL

... Stealth Technology ...

LUBA DISTRIBUTION LTD's Logo

Nottingham, United Kingdom

1-10 Employees

Home made beef jerky is not just easy to make, but is a great source of protein. The Brod & Taylor folding proofer provides reliable and precise temperatures needed for the production of yeast dough, sour dough, yogurt, kefir and many probiotic and vegan foods. If you are looking for product information, direct sale or after sales support, step right in.

+

Featured

Product
Image for STEALTH TECHNOLOGY

STEALTH TECHNOLOGY

... STEALTH TECHNOLOGY ...

Intelligent Traffic Systems's Logo

Brisbane City, Australia

11-50 Employees

2012

In today’s traffic environment, static road signs are no longer enough to provide motorists with all the information they require in a relevant and timely manner, this is where Intelligent Traffic Systems (iTS) road management solutions can in consultation with all stakeholders tailor a solution for you. We pride ourselves on delivering road management solutions and intelligent traffic systems that provide relevant and timely information or messages to motorists to inform them of the traffic environment ahead of them so that they can make informed decisions ahead of time. Aldridge is an Australian-owned and operated company that is at the forefront of the Intelligent Transportation Systems industry.

+

Featured

Product
Image for SP-3248V Trailer Mounted Speed Indication Device - Intelligent Traffic Systems

SP-3248V Trailer Mounted Speed Indication Device - Intelligent Traffic Systems

... SP-3248V features a state of the art Houston doppler radar, V-Touch SP controller and Stealth Technology. Our speed indication device is designed to display real time speed information (k/ph) and feedback messages to the motoring public, reducing speeds and providing a safer environment. The ...

Gsl Technology, Inc.'s Logo

United States

1-10 Employees

1992

From our products to our employees, we aim to reach the highest standards in production. For over 30 years GSL has continued to lead the charge on product design, engineering, and patents – all while continuing to manufacture high-end suppression devices for the industry at large. GSL Technology manufactures all of our products in the U.S. Our facility is a full-capacity, true precision machine shop. In the case of a defect, GSL offers a Lifetime Warranty against manufacturing defects in workmanship – regardless of the owner or form 3/4/5 status of the suppressor. GSL Technology offers a wide range of in-house talent and technology to provide you with a broad range of design and engineering services. Our in-house engineering services has more specialized experience with design and manufacturing of suppressor technology than any other entity in the industry. All designs are created with a sharp focus on product innovation while also taking into consideration cost effectiveness.

+

Featured

Product
Image for Stealth – GSL Technology, Inc.

Stealth – GSL Technology, Inc.

... Stealth – GSL Technology, Inc. ...


Related searches for Stealth Technology

Technologies which have been searched by others and may be interesting for you:

Facts about those Stealth Technology Results

Some interesting numbers and facts about the results you have just received for Stealth Technology

Country with most fitting companiesUnited Kingdom
Amount of fitting manufacturers68
Amount of suitable service providers36
Average amount of employees1-10
Oldest suiting company1977
Youngest suiting company2021

Geographic distribution of results





20%

40%

60%

80%

Things to know about Stealth Technology

What is Stealth Technology?

Stealth technology, often synonymous with low observable technology, refers to a set of methods and materials designed to make military vehicles, such as aircraft, ships, submarines, and missiles, less detectable to radar, infrared, sonar, and other detection systems. This innovative technology employs a combination of techniques to reduce the reflection/emission of radar waves, infrared signatures, and other detection methods back to the source. It encompasses a wide range of practices, including the application of radar-absorbent material, shaping vehicles to have a minimal radar cross-section, and using electronic methods to scramble or mislead radar tracking systems. The impact of stealth technology within military applications has been profound, fundamentally altering the tactics and strategies of modern warfare. By making vehicles harder to detect, it allows for a greater element of surprise in attacks, significantly increases the survival chances of stealth vehicles in hostile environments, and enhances the effectiveness of intelligence gathering operations. As a result, stealth technology has become a critical component in the design and development of advanced military hardware, pushing the boundaries of what is achievable in covert operations and aerial combat strategies. Its continued evolution and implementation signify a shift towards more sophisticated and less detectable warfare technologies, underscoring its pivotal role in modern military capabilities.


Advantages of Stealth Technology

1. Reduced Radar Signature
Stealth technology significantly diminishes the radar cross-section of a vehicle, making it less detectable by radar systems. This reduction in visibility enables aircraft, ships, and other vehicles to operate much closer to enemy forces without being detected, providing a strategic advantage in combat situations.

2. Increased Survival Rate
By minimizing the electromagnetic footprint, stealth technology enhances the survivability of military assets in hostile environments. It allows for the execution of critical missions with a lower risk of being intercepted or shot down, thereby preserving valuable resources and personnel.

3. Enhanced Operational Effectiveness
The element of surprise is a critical component in military strategy. Stealth technology facilitates this by allowing vehicles to penetrate deep into enemy territory undetected, enabling more effective reconnaissance, intelligence gathering, and targeted strikes against adversaries without prior warning.

4. Improved Tactical Flexibility
The ability to operate invisibly expands the tactical options available to military commanders. Stealth technology permits forces to choose from a wider range of routes and strategies, adapting to dynamic battlefield conditions with greater agility and unpredictability.


How to select right Stealth Technology supplier?

While evaluating the different suppliers make sure to check the following criteria:

1. Technical Expertise and Innovation
Ensure the supplier has a strong track record of innovation in stealth technology, including patents and proprietary methodologies.

2. Compliance with Global Standards
Check if the supplier adheres to international standards and regulations governing stealth technology and defense materials.

3. Material Quality and Sourcing
Assess the quality, durability, and source of materials used in their stealth technology products, ensuring they meet your specific requirements.

4. Customization Capabilities
Determine the supplier's ability to customize stealth solutions to fit your project's unique needs and specifications.

5. Cost-Effectiveness
Analyze the cost-benefit ratio, ensuring the supplier offers competitive pricing without compromising on the quality and effectiveness of the stealth technology.

6. After-Sales Support and Training
Evaluate the extent and quality of after-sales support, including training, maintenance, and upgrades, to ensure long-term reliability and performance.


What are common B2B Use-Cases for Stealth Technology?

Stealth technology, widely recognized for its military applications, has increasingly found its way into various B2B sectors, offering unique advantages. In the aerospace industry, companies utilize stealth technology to develop aircraft and drones that are less detectable by radar and infrared sensors. This innovation not only enhances security but also opens new possibilities for surveillance and reconnaissance operations for businesses requiring discreet data collection. The maritime sector also benefits from stealth technology, particularly in the design of ships and submarines. By minimizing the vessels' radar cross-section, businesses can ensure safer and more covert transportation of goods. This application is crucial for companies operating in geopolitically sensitive regions or those transporting high-value assets. In the realm of cybersecurity, stealth technology plays a pivotal role in developing advanced security systems. Businesses leverage stealth mechanisms to shield their digital infrastructure from unauthorized detection and access, thereby safeguarding sensitive information from cyber threats. This use case is particularly relevant for industries dealing with large volumes of personal data or proprietary information. Moreover, the automotive industry is exploring stealth technology to reduce vehicle detectability to radar and other sensors, a feature that's becoming increasingly important with the rise of automated driving systems. This application not only improves safety by reducing the likelihood of detection by malicious entities but also enhances the effectiveness of the vehicle's own sensing systems by minimizing interference.


Current Technology Readiness Level (TLR) of Stealth Technology

Stealth technology, designed to make aircraft, ships, submarines, and missiles less visible to radar, infrared, sonar, and other detection methods, currently operates at a high Technology Readiness Level (TRL), typically around TRL 9. This advanced stage indicates that stealth technologies are not only well-developed but also fully integrated and operational in military applications globally. The attainment of such a high TRL is attributed to extensive research, development, and testing that spans decades, leading to a deep understanding of radar cross-section reduction, heat signature minimization, and acoustic quieting techniques. Innovations in materials science have played a pivotal role, with the development of radar-absorbent materials and coatings that can significantly reduce detection ranges. Furthermore, the geometric design of stealth vehicles, which involves shaping surfaces to avoid reflecting radar waves back to the source, has been refined through computer simulations and real-world testing. These technical advancements, combined with successful deployment in various conflict scenarios, validate the effectiveness and reliability of stealth technology in contemporary military operations.


What is the Technology Forecast of Stealth Technology?

In the Short-Term, advancements in stealth technology are expected to focus on enhancing material capabilities and radar absorbance techniques. Researchers are developing new composite materials that are lighter yet more effective at absorbing radar waves, thereby reducing the radar cross-section of stealth vehicles. Additionally, improvements in adaptive camouflage that can dynamically change to match the surrounding environment are anticipated, making stealth vehicles harder to detect visually. The Mid-Term phase is likely to see the integration of artificial intelligence (AI) and machine learning algorithms to optimize the stealth capabilities of various platforms. This includes AI systems that can automatically adjust the shape and surface characteristics of a vehicle in real-time to minimize detection. Furthermore, advancements in quantum radar technology may challenge current stealth techniques, prompting a parallel development of countermeasures to maintain the effectiveness of stealth technology against this emerging threat. Looking into the Long-Term, the evolution of stealth technology is expected to transcend traditional domains. Innovations may include the development of stealth for individual soldiers through advanced materials science, making ground troops less detectable to infrared and other surveillance technologies. In aerospace, concepts such as plasma stealth, which involves generating a plasma field around a vehicle to refract or absorb radar signals, could revolutionize the field. These advancements will significantly broaden the applicability and effectiveness of stealth technology across military and possibly civilian applications.


Frequently asked questions (FAQ) about Stealth Technology Companies

Some interesting questions that has been asked about the results you have just received for Stealth Technology

Based on our calculations related technologies to Stealth Technology are Space Technologies, Military, Commercial Aviation, Airport Security

Start-Ups who are working in Stealth Technology are Owley

The most represented industries which are working in Stealth Technology are Commerce and Shopping, Others, Information Technology, Retail Trade, Transportation

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Related categories of Stealth Technology