Veracity is a general purpose commercial data integrity tool that
uses cryptographic hashes to detect changes in files. Veracity is
a computer program that detects changes in directory trees. The
user instructs this software to write a snapshot of a directory
tree to a snapshot file. The snapshot file contains the names and
signatures of each of the files in the tree, and is usually about
1/200th of the size of the tree.
Veracity scans a directory tree and generates a small snapshot file
containing the names and cryptographic hashes of the files in a
tree. This snapshot file can then later be used by this program
to generate a list of files that have been created, deleted, or
modified. If so much as a single bit in a single file in the directory
tree has changed, Veracity will detect it.
Veracity can also be run as a client and server over the Internet,
allowing it to monitor the integrity of hundreds of computers from
a single point. For more information , see the web site at http://www.veracity.com/
Veracity represents a whole new approach to data protection. Until
Veracity, the only way to preserve data was to take regular backups
and hope that any unwanted changes that occurred would be major,
obvious ones (such as loss of the disk). This approach meant trusting
all the software to which the data was exposed: operating systems,
backup software, communications software, compression software,
encryption software, and archiving software. Unfortunately, each
of these systems is highly complex and can inflict all kinds of
damage on the data, much of the damage undetectable to humans who
aren't actively using the data at the time.
The Veracity approach is to keep an eye on the data itself, detecting
even the change of a single bit. If a change is detected, the corrupted
data can be restored from backups. This approach provides far more
assurance than the traditional approach, and represents a quiet
revolution in the management of data. Veracity's applications include:
Preservation: Detect corruptions of online data.
Security: Detect changes made by intruders.
Sealing: Cryptographically seal critical files.
Transfers: Verify file transfers between different operating systems.
Notarizing: Prove that documents existed at a particular time.
Backups: Verify restored backups to ensure that backups are sound.
Veracity subproducts are : Veracity Enterprise Monitor and Veracity
Veracity Enterprise Monitor provides an interface with the data
integrity program and uses a system called snaplets, which contain
all the basic requirements for Veracity to check any computer on
any network. Using this information Veracity will connect to the
specified computer, and check the file structure specified. Each
snaplet uses a clipfile that specifies which files and attributes
of the files you wish to monitor.
Snaplets are virtual processes that sit in an endless loop and wake
up at regular intervals and perform a check. Snaplets have a collection
of attributes that Veracity uses to determine which directory structure
on which computer needs to be verified and how often it is required
to be done. Each snaplet also contains information on how many reports
to archive and who to inform when changes do occur. There are two
types of snaplets.
A Veracity Agent is required to be installed on any computer you
wish to have monitored by the Veracity Enterprise Monitor. The Veracity
Enterprise Monitor will then connect to that agent to verify the
integrity of its host computer.
Veracity consists of three main components:
set of shell commands: These commands accept arguments and perform
all the "real" work in the same way that commands in most
shells or command interpreters do.
A shell: The Veracity shell encloses the commands and provides a
command-line interface to them. This allows command scripts to be
An operating system interface: The Veracity shell is presented at
the operating system command interpreter level, allowing Veracity
shell commands to be executed directly from the operating system
by placing them on the operating system command line after the Veracity
interface allows the user to:
•Execute a single Veracity shell command from the operating
•Invoke an interactive session of the Veracity shell.
•Execute a file of Veracity shell commands from either the
shell or the Veracity shell.
Enterprise Network Security
• Embedded Enterprise
• Firewall Integrity Monitoring
• Web Server Integrity
• File Transfer Verification
• Backup Verification
• CD-ROM Verification
• Monitoring On-Disk data
• Comparing Online/Offline
• Comparing Remote File
• Auditing Installed Software
• Document Archiving
• Document Timestamping
• Auditing Preinstalled Software
Veracity is available on a wide variety of platforms. If your desired
platform is not on this list, please contact us with your requested
platform. We have the ability to port Veracity to new platforms
Mac OS X
Compaq Himalaya OSS
IBM AIX 4.1, 4.3
Progressive Technical Solutions as the Veracity support has a services
program to compliment the emphasis on the support of Veracity is
summarized as follows:
Ease of installation and implementation with a rapid deployment
Simplicity and streamlining of training
- Minimal ongoing support overheads
- Minimal disruption with new updates to the product
Veracity has been developed to allow enterprises to deploy the Veracity
software easiy and take advantage of its capabilities with a minimum
of fuss. Unlike products that propose a three-ring consulting circus,
and the associated costs with that approach, Veracity can be installed
and implemented quickly, simply and effectively.
Progressive Technical Solutions provides the following services:
o Training and Education
o Ongoing Support
o Ask an Expert
Implementation Services - Rapid Deployment
Progressive Technical Solutions has an implementation methodology
and process to minimize the amount of time to install and implement
Veracity. Using the resources of a Veracity Partner and/or the Veracity
Rapid Deployment Guide Web, you can install and deploy Veracity
in a matter of hours. (We are developing even faster implementation
technologies that will streamline this process further!).
The process of installation and implementation follows a logical
process of installing the software, configuring and scheduling the
devices and files to be monitored. Then the reports are configured
and you are up and running.
Veracity has been designed for fast and simple implementation so
you can be up and running in next to no time.
Training and Education
Progressive Technical Solutions as Rocksoft partner is near completion
of a new nline eLearning program whereby any Veracity customer,
can learn all about the products and their installation, implementation
options, troubleshooting, ongoing management, upgrades and reporting,
and is accredited as a Certified Veracity Consultant.
You can purchase the Veracity AIMS (Annual Improvements Maintenance
and Support) program with your Veracity license. The AIMS program
Telephone support to us as your Veracity Partner
o Access to all upgrades to the Veracity Product
o Access to all documentation upgrades
o Access to new features of Veracity
Veracity Support Service
Veracity is supported on several levels. Firstly your trusted Veracity
partner will provide you with day to day support whenever you have
a problem or need assistance.
In turn, Progressive Technical Solutions as the Veracity Partner
is supported by their regional Rocksoft office and its technical
The Rocksoft regional offices are then supported by the head office
Research, Development, Production and Support teams.
Ask an Expert
Partners and customers can ask any question relating to Veracity
technical issues by simply emailing the form below to AskTheExperts@rocksoft.com
A Veracity expert will attempt to get back to you within 24 hours,
with either a response or an answer to the question.