Blogs



Title Written by View
Learning Management Systems And It’s Need For Security By George John. T | Posted on May 18, 2010 View
Redefining The Digital Dilemma Of Securing Data: No Locks, No Break-Ins By George John. T | Posted on September 11, 2009 View
Trinity’s New Product Launch : D-Vault By George John. T | Posted on March 5, 2009 View
Data Security Is Top Priority. By George John. T | Posted on March 4, 2009 View
Data Security: Lowering The Data Leakage Risk Of USB Usage By George John. T | Posted on February 17, 2009 View
Data Security – Technology Breakthrough By George John. T | Posted on February 13, 2009 View
Combating Digital IP Theft Web Content Is Amongst The Simplest To Copy And Transmit By George John. T | Posted on February 13, 2009 View
Middle East Companies At Greater Risk Of Data Theft By Employees By George John. T | Posted on February 13, 2009 View
Thought Leadership
  • Customer Testimonial

  • First up, I'd like to congratulate Trinity team for successfully delivering the encryption solution requested by HeyMath! . I have to make special mention of the effort put in by the Trinity team to finish this project.There were occasions when I had requested for some fixes in the app which were attended to on holidays. I am truly impressed by the promptness shown by Trinity team. Working with Trinity over the duration of the projects, I have learned a lot of new things.
  • Anjan, Heymath!
  • more testimonials