Product Expertise

B. Travis Wright, MPS brings enterprise-level product expertise across cloud, network, and identity platforms—including Microsoft 365, Cisco Meraki, and Cloudflare—integrating them into defensible environments aligned with CMMC and NIST SP 800-171 requirements.

B. Travis Wright, MPS architects and hardens cloud and hybrid environments designed to withstand independent assessment under NIST SP 800-171, CMMC Level 2, and SOC 2. His work centers on clearly defined CUI assessment boundaries, technical control stability, and executive-level risk visibility—ensuring that compliance is not theoretical, but defensible under formal review.

Most recently, he served as accountable program lead for a CMMC Level 2 readiness initiative culminating in an independent C3PAO assessment in which all 110 NIST SP 800-171 requirements were validated with zero Plans of Action and Milestones (POA&Ms). That outcome preserved the organization’s eligibility for federal contracts valued in the hundreds of millions of dollars and avoided the operational disruption and reputational exposure that accompany conditional findings.

Rather than deploying products in isolation, he integrates collaboration platforms, network architecture, identity governance, and storage systems into cohesive, auditable environments engineered to maintain contract eligibility and reduce enterprise risk.

Representative Platforms Within Compliance Boundaries:

  • Microsoft 365 — CUI enclave configuration, conditional access architecture, Exchange and SharePoint governance, audit logging, retention enforcement, and insider-risk controls aligned with access control and accountability requirements.
  • Cisco Meraki — Network segmentation, secure SD-WAN design, infrastructure visibility, and role-based access enforcement supporting boundary protection and system integrity controls.
  • Cloudflare — Zero Trust access enforcement, DNS-layer protection, DDoS mitigation, and edge-layer inspection aligned with 3.13 and related control families.
  • VMware and Hyper-V — Virtualized workload isolation, privileged access restriction, logging integration, and administrative control segregation.
  • HPE Nimble Storage — Encrypted storage architecture, replication integrity, backup validation, and disaster recovery planning aligned with contingency planning requirements.
  • WordPress — Hardened public-facing infrastructure with controlled administrative workflows, patch governance, perimeter protection, and audit visibility.

Each environment is structured to support policy-to-implementation traceability, evidence retention, and executive oversight—reducing the likelihood of remediation cycles that delay bidding windows or jeopardize revenue continuity.

B. Travis Wright, MPS background image