What Is Veracity?

Veracity is a general purpose commercial data integrity tool that uses cryptographic hashes to detect changes in files. Veracity is a computer program that detects changes in directory trees. The user instructs this software to write a snapshot of a directory tree to a snapshot file. The snapshot file contains the names and signatures of each of the files in the tree, and is usually about 1/200th of the size of the tree.
Veracity scans a directory tree and generates a small snapshot file containing the names and cryptographic hashes of the files in a tree. This snapshot file can then later be used by this program to generate a list of files that have been created, deleted, or modified. If so much as a single bit in a single file in the directory tree has changed, Veracity will detect it.
Veracity can also be run as a client and server over the Internet, allowing it to monitor the integrity of hundreds of computers from a single point. For more information , see the web site at
Veracity represents a whole new approach to data protection. Until Veracity, the only way to preserve data was to take regular backups and hope that any unwanted changes that occurred would be major, obvious ones (such as loss of the disk). This approach meant trusting all the software to which the data was exposed: operating systems, backup software, communications software, compression software, encryption software, and archiving software. Unfortunately, each of these systems is highly complex and can inflict all kinds of damage on the data, much of the damage undetectable to humans who aren't actively using the data at the time.
The Veracity approach is to keep an eye on the data itself, detecting even the change of a single bit. If a change is detected, the corrupted data can be restored from backups. This approach provides far more assurance than the traditional approach, and represents a quiet revolution in the management of data. Veracity's applications include:
Preservation: Detect corruptions of online data.
Security: Detect changes made by intruders.
Sealing: Cryptographically seal critical files.
Transfers: Verify file transfers between different operating systems.
Notarizing: Prove that documents existed at a particular time.
Backups: Verify restored backups to ensure that backups are sound.

The Veracity subproducts are : Veracity Enterprise Monitor and Veracity Agent.

The Veracity Enterprise Monitor provides an interface with the data integrity program and uses a system called snaplets, which contain all the basic requirements for Veracity to check any computer on any network. Using this information Veracity will connect to the specified computer, and check the file structure specified. Each snaplet uses a clipfile that specifies which files and attributes of the files you wish to monitor.
Snaplets are virtual processes that sit in an endless loop and wake up at regular intervals and perform a check. Snaplets have a collection of attributes that Veracity uses to determine which directory structure on which computer needs to be verified and how often it is required to be done. Each snaplet also contains information on how many reports to archive and who to inform when changes do occur. There are two types of snaplets.
A Veracity Agent is required to be installed on any computer you wish to have monitored by the Veracity Enterprise Monitor. The Veracity Enterprise Monitor will then connect to that agent to verify the integrity of its host computer.

Veracity consists of three main components:

A set of shell commands: These commands accept arguments and perform all the "real" work in the same way that commands in most shells or command interpreters do.
A shell: The Veracity shell encloses the commands and provides a command-line interface to them. This allows command scripts to be executed.
An operating system interface: The Veracity shell is presented at the operating system command interpreter level, allowing Veracity shell commands to be executed directly from the operating system by placing them on the operating system command line after the Veracity command.

This interface allows the user to:
•Execute a single Veracity shell command from the operating system shell.
•Invoke an interactive session of the Veracity shell.
•Execute a file of Veracity shell commands from either the operating system
shell or the Veracity shell.


• Enterprise Network Security
• Embedded Enterprise
• Firewall Integrity Monitoring
• Web Server Integrity
• File Transfer Verification
• Backup Verification
• CD-ROM Verification
• Monitoring On-Disk data
• Comparing Online/Offline
• Comparing Remote File
• Auditing Installed Software
• Document Archiving
• Document Timestamping
• Auditing Preinstalled Software


Veracity is available on a wide variety of platforms. If your desired platform is not on this list, please contact us with your requested platform. We have the ability to port Veracity to new platforms very quickly.

Windows 95/98/ME
Windows NT4/2000
Mac OS X
Solaris (SPARC)
Solaris (386)
Compaq Himalaya OSS
Tru64 Unix
OpenVMS (Alpha)
IBM AIX 4.1, 4.3
HP-UX 11.0
Linux (386)
NetBSD (386)


Progressive Technical Solutions as the Veracity support has a services program to compliment the emphasis on the support of Veracity is summarized as follows:

- Ease of installation and implementation with a rapid deployment plan
Simplicity and streamlining of training
- Minimal ongoing support overheads
- Minimal disruption with new updates to the product

Veracity has been developed to allow enterprises to deploy the Veracity software easiy and take advantage of its capabilities with a minimum of fuss. Unlike products that propose a three-ring consulting circus, and the associated costs with that approach, Veracity can be installed and implemented quickly, simply and effectively.

Progressive Technical Solutions provides the following services:

o Implementation Services
o Training and Education
o Ongoing Support
o Ask an Expert

Implementation Services - Rapid Deployment

Progressive Technical Solutions has an implementation methodology and process to minimize the amount of time to install and implement Veracity. Using the resources of a Veracity Partner and/or the Veracity Rapid Deployment Guide Web, you can install and deploy Veracity in a matter of hours. (We are developing even faster implementation technologies that will streamline this process further!).
The process of installation and implementation follows a logical process of installing the software, configuring and scheduling the devices and files to be monitored. Then the reports are configured and you are up and running.
Veracity has been designed for fast and simple implementation so you can be up and running in next to no time.

Training and Education

Progressive Technical Solutions as Rocksoft partner is near completion of a new nline eLearning program whereby any Veracity customer, can learn all about the products and their installation, implementation options, troubleshooting, ongoing management, upgrades and reporting, and is accredited as a Certified Veracity Consultant.

Ongoing Support

AIMS Program

You can purchase the Veracity AIMS (Annual Improvements Maintenance and Support) program with your Veracity license. The AIMS program covers your:

o Telephone support to us as your Veracity Partner
o Access to all upgrades to the Veracity Product
o Access to all documentation upgrades
o Access to new features of Veracity

Veracity Support Service

Veracity is supported on several levels. Firstly your trusted Veracity partner will provide you with day to day support whenever you have a problem or need assistance.
In turn, Progressive Technical Solutions as the Veracity Partner is supported by their regional Rocksoft office and its technical team.
The Rocksoft regional offices are then supported by the head office Research, Development, Production and Support teams.

Ask an Expert

Partners and customers can ask any question relating to Veracity technical issues by simply emailing the form below to
A Veracity expert will attempt to get back to you within 24 hours, with either a response or an answer to the question.