The platform

Four jobs. One operating layer. Every call.

Identity-verified callers. Live business context. Authorized action. Operator-grade control. The platform that runs every Trillet call.

Verify
Ground
Act
Control
LayersOn every call
Verify
01
Identity-aware from the first second of the call
Ground
02
Live business context, not stale exports
Act
03
Authorized action, per-deployment scope
Control
04
Operator-grade testing, observability, audit

Architecture

How the layers fit.

Four jobs running on every call. Each layer has its own responsibility. Together they are the operating layer.

The system, top-to-bottom.

Three active layers handle the call. A fourth wraps them in operator-grade control. Below, the voice & telephony foundation — a layer we abstract from the call.

Wrap·Observes, audits, bounds the three below
Active·Runs the job on the call
Foundation·Abstracted — not your concern

Wrap · Operator-grade control

Act
01

Routing, summaries, CRM updates, owner alerts, escalations, follow-through — authorized action per deployment.

Ground
02

Live business context retrieval — CRM, calendar, identity, knowledge base, account state.

Verify
03

Identity verification gates the call — caller authenticated before any account-touching action.

Foundation · abstracted

Voice + telephony foundation
04

STT + TTS + LLM + telephony providers — abstracted from the call.

Verify

Identity-aware from the first second.

The agent verifies the caller before any account-touching action. Verification mode is configured per deployment. The same agent can use different verification modes for different call paths.

Cell-phone 2FA
Live

SMS or voice-channel one-time code, configurable per deployment.

Voice biometrics
Enterprise

Voice-pattern verification against an enrolled voice print. Available on enterprise engagement.

Knowledge-based verification
Live

Account-specific challenge questions, configured per deployment.

Custom / regulated
Regulated

Higher-standard verification per regulated requirement — banking-grade identity check, HIPAA-compliant identity confirmation.

Verify in progress · Live
Verifying
  1. Step 01
    Caller dials in
    +1 (XXX) XXX · 0482
    IDENTIFIED · phone match · CRM record found
  2. Step 02
    2FA code sent to verified mobile
    SENT · code: ***
  3. Step 03
    Caller speaks code
    VERIFIED · authentication passed
  4. Step 04
    Account-touching action authorized
    READY · agent proceeds with account changes
Verification mode configured per deployment per call path. Failed verification routes per your escalation policy.

Ground

Reads your live systems. Writes to them too.

The agent works against the same business state your team works against — not a periodic export, not a cached snapshot.

CRM

Read account history, contact record, open tickets. Write call summary, next-step, status updates.

SalesforceHubSpotZohoPipedriveCustom API
READ history, contact · WRITE summary, next-step
Calendar + booking

Read availability per resource. Write bookings, reschedules, cancellations.

Google CalendarOutlookCal.comCustom API
READ availability · WRITE bookings, reschedules
Identity

Verify caller against your identity provider. Read role + permissions for in-call authorization.

OktaAuth0Azure ADCustom SSO
READ identity, roles · VERIFY at call start
Knowledge base

Read live knowledge articles, intake rules, escalation paths. Per-deployment KB scope.

NotionConfluenceCustom API
READ articles, rules, escalation paths
1 of 4

Act

Authorized action. Per-deployment scope.

What the agent can do is configured per deployment. Authorized scope per call path. Human-in-the-loop where the call requires one.

Routing
Live

Route the call to the right team, queue, or human based on verified intent and account state.

Summaries
Live

Generate the call summary against your fields. Push to CRM, knowledge base, or downstream workflow.

CRM updates
Live

Write next-step, status, sentiment, intent into CRM during or after the call.

Owner alerts
Live

Notify the account owner via email, SMS, Slack, or webhook based on call outcome.

Escalations
Live

Escalate per policy: high-value deal, regulatory flag, sentiment threshold, agent-confidence threshold.

Follow-through
Live

Post-call workflow: SMS confirmation, email summary, calendar invite, follow-up call queued, ticket created.

Control

Operator-grade control.

Testing, observability, access controls, deployment boundaries. The platform behaves the way enterprise environments require.

Testing

Per-call test mode. Replay flagged calls in evaluation environment. A/B test prompts and routing logic on production traffic with controlled exposure.

Observability

Continuous metrics on call outcome, latency, sub-processor performance, intent classification accuracy. Configurable alerting per deployment.

Access controls

Role-scoped access to operator console, audit logs, configuration. Single-sign-on integration per deployment.

Deployment boundaries

Authorized scope per deployment per call path. What the agent can do is bounded, not open-ended.

One call, end to end

Watch a single call go the distance.

Most voice agents stop at the conversation. Trillet runs on your live business systems — verifying, grounding, acting, and following through on every call.

Verify (01)·
Ground (02)·
Act (03)·
Follow-through (04)
01Verify·no action before identity

Before anything else happens, the caller is who they say they are.

Before anything else happens, the caller is who they say they are. Trillet authenticates against your CRM record — 2FA out of band, voice biometrics, or whatever your compliance layer requires. No account-touching action begins until verification completes.

Identity challenge · retail-banking-v3
  • CRM record matched · account #8842 · (00:04)
  • 2FA code sent to mobile ending 4217 · (00:09)
  • Code: 638012
  • Code confirmed · identity verified · (00:31)
02Ground·on your live systems

The agent reads your systems the way a good rep would — live, not from a stale extract.

The agent reads your systems the way a good rep would — live, not from a stale extract. Account history, open tickets, per-product rules, calendar availability. Trillet grounds the conversation in whatever your business already runs, so the answers match what your CRM says right now.

Live context · read4 sources · 120ms
  • CRM · account tier · platinum · 6y customer
  • Auth policy · password reset · requires recent 2FA ✓
  • Ticket history · 0 open · last issue resolved 2 weeks ago
  • Fraud signal · clean · device + number match on file

Where most voice agents stop

The conversation ends. Nothing is written, scheduled, or routed. A human picks up the work after the call.

03Act·inside your systems, with scope

Trillet takes the action the caller asked for — on your systems, inside the scope you granted.

Trillet takes the action the caller asked for — on your systems, inside the scope you granted. Password reset issued, calendar event booked, ticket created, CRM updated. Every action runs against your live backend with an auditable trail, not an export.

Actions executed3 actions · all succeeded
  • Password reset · email + SMS sent · POST /accounts/8842/reset · 200 OK
  • CRM summary written · interaction logged · PATCH /contacts/c-8842/interactions · 201 Created
  • Fraud alert suppressed · signal clean · POST /risk/review/skip · 200 OK
04Follow-through·what happens after the call ends

The call wraps, and the work keeps moving — on its own.

The call wraps, and the work keeps moving — on its own. Confirmation queued. Next-best-action written into the CRM. Escalation routed to the right human if something needs one. The post-call layer is where most voice products quietly hand the work back to your team. Trillet doesn't.

Post-call queue04 items · all dispatched
  • Email summary · sent to customer · "Your password has been reset. Full interaction log attached."
  • CRM next-step · 30-day check-in scheduled · assigned to account owner Rachel L.
  • SMS confirmation · queued for 09:00 tomorrow · "Your account is secure. Anything else we can help with?"
  • Escalation · none required · intent satisfied · confidence 0.97 · no hot signal flagged

Call wrapped. All four post-call actions dispatched. Customer notified.

04:23 · END

Evaluate the platform

Map your call paths. Map the platform underneath.

We review your call-path mix, identity requirements, business systems, action authorization, and deployment shape. End with a real plan for what the platform looks like running in your environment.

Evaluation agenda · 3 weeks

  1. 01Call-path reviewWeek 1
  2. 02Identity & auth mappingWeek 1
  3. 03Systems integration planWeek 2
  4. 04Action scope & guardrailsWeek 2
  5. 05Deployment proposalWeek 3