Lister Technologies

About Us


About Us: We make your applications work 'smarter'
It is about leveraging platforms, technologies, processes and people expertise to create solutions and applications that are faster and smarter.

Lister Technologies provides creative, cutting-edge technology solutions, enabling customers to make their enterprises adaptable, integral and efficient.

We have built software solutions across varied industry verticals including manufacturing, healthcare, publishing, internet and ecommerce, telecom and education. Our service offerings include Data Warehousing and Business Intelligence, E-Business, Customer Relationship Management, KPO including Revenue Cycle Management and E-Publishing.

Lister’s ability to deliver leading-edge solutions is in bringing together highly talented people who are able to challenge conventional thoughts, offer different perspectives and innovative ideas. Our experts are updated with the latest technology development in the software domain and build futuristic software applications.

  • Market-defining business and technology solutions provider since 2001
  • Founders are technocrats from India’s premier institutions with rich professional experience
  • Reliable Offshore Service Provider with major clients in the US and Europe
  • Superior quality to deliver reliable and error-free software solutions on time
  • Adoption of flexible execution methodology directed at quality delivery and faster ROI

Information Security Policy

Lister Technologies Private Limited is committed to enhance the value to its customers by delivering Software related services in compliance with the principles of Information security maintaining Confidentiality, Integrity and Availability

We recognize the fact that Information is one of our most important assets and we shall protect the same by ensuring that,

  • Information Security Training will be imparted to all staff in the organization.
  • Procedures and policies are in place to support the ISMS polices.
  • Security measures are taken after detailed Risk Assessment based on the business value and the risk of exposure of the assets.
  • All Information Security breaches are reported and investigated.
  • Business Continuity Management requirements are identified and appropriate procedures and measures are taken.
  • Incident Management process is in place.
  • Disciplinary actions are formulated and taken against those who violate organization’s Information Security Policy.
  • All applicable Legal, Regulatory, Statutory, Contractual requirements are considered in ISMS.
  • Information Security Forum has the overall responsibility of implementation and maintenance of ISMS.
  • All employees will be committed to this policy and shall follow the practices mentioned in the ISMS.
  • The continual implementation and effectiveness of this policy is ensured via regular reviews and audits.