The accumulated potential of the businesses INVL Technology owns –their knowledge and experience and synergy-based business model– opens the way not just for undertaking ICT projects of exceptional scale and complexity, but also for working on a global scale.
Brands owned by INVL Technology companies:
DeepEye, Cyber Defence East Africa, Banktron, ERS Etronika.
Focused on global business expansion, the group’s companies have developed sales partnerships in South Asia (in Bangladesh, Bhutan and Cambodia) and Eastern and Southern Africa (Tanzania, Burundi, the Kingdom of Lesotho, Uganda and Rwanda) as well as in Mauritius and in Europe (Estonia, Norway, Denmark, Latvia, Moldova and elsewhere).
INVL Technology’s businesses belong to a variety of associations and have strategic partnerships with organisations including: FIRST, the Center for Internet Security, Vilnius University, Kaunas University of Technology, Infobalt, ISACA, Uganda Technology and Management University (UTAMU), NORAD, GIEK, Norwegian embassies, national and government CERTs, the FinTech community, and NITA-U, FK Norway. They also have technology partnerships with Microsoft, Oracle, IBM, Cisco, Dell and others.
Clients of INVL Technology’s businesses:
- National institutions: ministries of justice, economics, finance and internal affairs, centres of registers, courts, communications regulators, state providers of ICT services, national CERTs, tax inspectorates, and others.
- Central and commercial banks;
- Law enforcement structures: cybersecurity and digital forensic centres;
- Digital and economic intelligence agencies, cybercrime police;
- Large public and private sector institutions.
- A consultative national cyber defence system for Tanzania was developed together with ISACA Tanzania Chapter
- Insights on the Relevance of World Bank Doing Business Reports and Recommendations for Improvement was prepared together with Uganda Technology and Management University.
- Co-authorship of “Romania’s ‘Tipping Point’: Advancing the Rule of Law, Governance and Public Leadership”, published by the Center for European Policy Analysis (CEPA) in July 2014.
- Responding to Targeted Cyberattacks, ISACA, ISBN 978-1-60420-337-3, May 2013;
- Transforming Cybersecurity Using COBIT 5, ISACA, ISBN: 978-1-60420-342-4, June 2013;
- Advanced Persistent Threats: How to Manage the Risk to Your Business, ISACA, October 2013;
- COBIT 5 and 4.1 Lithuanian, ISACA, November 2013;
- Advanced Persistent Threats: How To Manage The Risk To Your Business, ISACA, ISBN: 978-1-60420-348-6, November 2013;
- Risk Scenarios Using COBIT 5 for Risk, ISACA, ISBN: 978-1-60420-468-1, September, 2014;
- European Cybersecurity Implementation Series, ISACA, August 2014;
- Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce, Council on Cybersecurity, October 2014;