CASE STUDIES & INSIGHTS

Impact at Hyperscale.

Deep dives into how we help enterprises transform their infrastructure, automate operations and secure their cloud-native systems.

Best MLOps Practices: A Real-World Case Study
MlOpsFeb 16, 2026

Best MLOps Practices: A Real-World Case Study

How we at Infivit transformed chaotic ML experiments into a production-ready system using modern MLOps practices The Hidden Crisis in Machine Learning Teams Machine learning was supposed to make our lives easier. The promise was simply to build smart models, deploy them, and watch as they solve complex problems automatically. But if you ve worked on Read more

Rupesh Patil
11 min
Reducing Client AWS Costs by 70% with LocalStack
CloudJan 21, 2026

Reducing Client AWS Costs by 70% with LocalStack

As a cloud consulting company, we ve seen our share of AWS bills. But when our client forwarded us their monthly statement with a concerned email, even we were surprised. $3,247 for the month. The breakdown was what really caught our attention: They were literally spending more on building the product than running it in production. Read more

Tushar D
10 min
From FTP Chaos to Zero-Trust Data Pipelines
SecurityJan 9, 2026

From FTP Chaos to Zero-Trust Data Pipelines

We helped an organization move from a messy and risky way of handling vendor files to a modern system that is secure, automated, and ready to scale.Using Azure Data Lake and Databricks, we designed the entire platform around the Medallion Architecture — a layered approach (Bronze, Silver, and Gold) that cleans and improves data step-by-step Read more

Om Golesar
4 min
Penetration Testing: First Line of Defence🛡️
SecurityDec 11, 2025

Penetration Testing: First Line of Defence🛡️

In today’s digital world, protecting an organisation’s data and systems is no longer just a technical task—it is a core business priority. Cyber threats are constantly evolving, and relying only on basic security measures is not enough. Organisations need proactive and continuous security checks to stay ahead of attackers. Penetration testing is one of the Read more

Om Golesar
4 min
Multi-Region GitLab Runners on AWS
CI/CDNov 21, 2025

Multi-Region GitLab Runners on AWS

Modern software development demands fast, scalable, and fault-tolerant CI/CD pipelines. To meet these needs, we’ve architected a GitLab CI/CD solution that combines custom GitLab Runners across multiple AWS regions with robust monitoring and deployment workflows. This article walks through two core components: Multi-Region GitLab Runner Architecture (High Availability) To ensure high availability and regional redundancy, Read more

Shivam
3 min
Multi-Account AWS Networking with Transit Gateway
NetworkingNov 17, 2025

Multi-Account AWS Networking with Transit Gateway

Learn how to automate secure, multi-account networking using AWS Transit Gateway — the backbone of enterprise cloud architectures. What You’ll Learn In this hands-on demo, we’ll explore: An AWS Transit Gateway (TGW) acts as a central hub to interconnect multiple Virtual Private Clouds (VPCs) and on-premises networks. As cloud environments expand across regions, inter-Region peering enables Transit Gateways to Read more

Sumit P
5 min
🚀 Accelerate Deployments with Argo CD Image Updater
CI/CDJul 10, 2025

🚀 Accelerate Deployments with Argo CD Image Updater

In the fast-moving world of software development, continuous integration and continuous delivery (CI/CD) have become essential for delivering quality features at speed. At Infivit, we recently streamlined CI/CD pipeline for one of our client by integrating GitHub Actions with Argo CD Image Updater, resulting in a significant boost in deployment automation, developer velocity, and operational Read more

Durgesh Dhamane
4 min
Code-to-Cloud : The Safe Way 🚀
SecurityJun 30, 2025

Code-to-Cloud : The Safe Way 🚀

🔍 Introduction As modern software development accelerates with DevOps and GitOps, security must be baked into every phase of the SDLC. Enter Cycode — a full-stack software supply chain security platform that unifies visibility and control across source code, pipelines, IaC, secrets, and more. Cycode doesn’t just scan code; it integrates security across your entire development ecosystem. Think Read more

Tushar D
3 min
Guarding Apps with Guardsquare
SecurityJun 26, 2025

Guarding Apps with Guardsquare

🛡 What is Guardsquare?Guardsquare is a security-focused company best known for tools like ProGuard, DexGuard, and AppSweep. These tools help Android/iOS developers obfuscate, optimize, and secure their apps against various forms of reverse engineering and runtime threats. ✳ Core Products: ⚙️ Why Use Guardsquare? 🔗 Integrating Guardsquare Tools into Android/iOS Projects 1. List Applications On Read more

Sumit P
8 min
Agentless | Effortless | Secure
SecurityJun 12, 2025

Agentless | Effortless | Secure

In today’s fast-paced digital environment, where organizations increasingly adopt cloud-native architectures, cloud security has become a core strategic priority—not just a technical concern. At Infivit Technologies, we continuously explore innovative tools that empower businesses to secure their infrastructure proactively. One such transformative solution we’ve integrated into our cloud security framework is Wiz. 🔍 What is Read more

Tushar D
3 min
Setting Up Twingate for Remote Access
UncategorizedJul 8, 2024

Setting Up Twingate for Remote Access

First, let s address the core challenge In today’s increasingly digital and remote work environment, having the ability to access office resources from anywhere is crucial. As a professional who often needs to work from home or while traveling, it became necessary for me to securely connect to my office network to access files, applications, and Read more

Tushar D
8 min
UncategorizedJun 14, 2024

Testing using behave framework

Introduction In the realm of cloud computing, security is paramount, and one crucial aspectis managing access to resources. Amazon Web Services (AWS) offers a robustIdentity and Access Management (IAM) system to control permissionseffectively. However, ensuring these permissions are correctly configuredrequires thorough testing. This document explores how the Behave frameworkcan be leveraged for testing AWS permissions, Read more

Sumit P
4 min
MetalLB Magic: Exposing On-Prem Kubernetes Services
UncategorizedMay 14, 2024

MetalLB Magic: Exposing On-Prem Kubernetes Services

Purpose: This guide will demonstrate the simplified process of exposing services in your on-premises Kubernetes cluster using an Ingress Controller MetalLB. Prerequisites: Components: Architecture: Instructions: Install MetalLB MetalLB is crucial in deploying a Kubernetes service of type LoadBalancer, seamlessly handling incoming traffic by utilizing an IP address pool configured earlier. To initiate the process, Read more

Abhijit D
6 min
GitOps Workflow with Argo CD
UncategorizedMar 28, 2024

GitOps Workflow with Argo CD

What is Argo CD and why should you use it for Kubernetes GitOps: Argo CD is a powerful and easy-to-use tool that facilitates the implementation of a GitOps workflow for your Kubernetes applications. GitOps is a paradigm that uses Git as the single source of truth for your infrastructure and application configuration. With GitOps, you can declaratively Read more

Tushar D
6 min