Trility offers expertise in Software Design & Development, Cloud Engineering and DevOps. Read select project summaries about problems we've helped clients solve, and filter by the type of experience that is relevant to your needs.
Trility helped a Fortune 100 insurance company pursue a secure serverless enterprise environment to bootstrap the design, implementation, and operational evolution of AWS. Our team also implemented a data storage solution using CloudFormation for a secured enterprise framework.
Trility helped this client achieve cost reporting, enforce organizational tagging requirements, and leverage a third-party security scanning tool, Prisma, to auto-remediate issues discovered in AWS accounts. Trility built a tiered solution that managed security levels to meet the client’s requirements for government contracts.
Trility helped this client leverage the features and functionality of Vault Enterprise through an upgrade and implementation where Trility's team worked with the client’s team members to ensure a seamless handoff and viable long-term maintenance and adoption of the HashiCorp product.
Trility completed a discovery process for a sports performance video-based app to help them understand current logging and monitoring capabilities, provide a recommended path to mature those capabilities, and enable automated responses when possible – making it easier to meet customer security requirements.
In Phase II of this project, Trility helped this client meet the security requirements mandated by a key customer with an automated Policy as Code solution that tests, validates, and provides evidential proof.
In Phase I of this project, Trility helped a client pursue an automated Policy as Code solution for NIST 800-171 controls. Once controls were assessed and validated, Trility helped translate the controls into executable statements.
Trility was hired to expedite upgrades to Terraform to increase security and ensure parity across the enterprise. While completing this project, the team identified issues with the client’s authentication tool and was asked to implement the recommendations that resulted in cost savings and increased security posture.