How it Works

Built using SignaCert's patented technology, SignaCert Verify™ tells you if your servers are deployed as intended. SC Verify compares what is actually present on your servers with a reference that you specify for devices of that type. This allows Verify to confirm that devices are configured exactly as you specified down to the file level, or tell you explicitly what the discrepancies are, added, modified or removed.

The verification methodology provides an independent check of your existing IT processes, ensuring they produce the correct results and improving your overall control. Should systems drift, Verify provides an early alert, typically prior to failure. In the event of a failure, the solution helps answer the question, “what changed?” and allow you to get systems back online quickly.

The process:

1.

Customer specifies a reference device and defines a policy of what to scan, where and which types. The reference machine is scanned per the policy and a snapshot captured and stored for comparison.

2.

Customer specifies which policy to use to scan target devices. Target devices are scanned per the policy and what is actually found is sent to Verify for comparison with the snapshot.

3.

Verify compares the specified reference snapshot with what was actually found to identify any deviations. Verify can identify new files that have been added to the system, files that have been modified, and files that have been removed.

4.

Customer views reports or receive alerts indicating for the status of their devices.

5.

With found deviations, the customer assess which is the appropriate action to take. Devices are typically remediated for unexpected deviations. Deviations associated with intended changes require an update to the reference snapshot. Deviations associates with dynamic files (log files, tmp files, etc.) require policy updates to ignore them.

Customers can choose to receive reports indicating that devices match exactly or only when deviations are detected. Additionally, SignaCert Verify can be configured to provide alerts via email, SNMP or event or syslogs.

Figure 1. Example of summary verification results allow
drill down to show the specific details.

Reports in ETS Management Console provide summary verification information and allow customers to take appropriate action to manage their IT systems.

Figure 2. Summary of deviations shown in ETS Management Console


Figure 3. Drill-down reveals specific details

Typical Uses

1. Keep a single server in control.

This use ensures that a single server doesn’t change in unexpected ways. A reference is captured from Server A and is used to compare with itself at a later period in time to detect any deviations from the reference.

2. Keep a cluster of servers synchronized.

Similar to the case above the reference is used to ensure that a collection of devices that are supposed to be identical actually are and stay that way. The reference catpured from Server A is compared to each of the servers (A, B, and C) at a defined interval. Since there is a single, well-defined reference any deviations between them can be clearly identified and the servers can be brought into alignment with one another.

3. Prove application deployment.

In some cases the servers themselves are allowed to be different but the applications or other software running on them must be identical. A reference of the software or application is captured and stored in Verify. Each of the servers is scanned to look for the complete presence of the referenced item, down to the file level. For each server, Verify will return information about any added, modified or removed files. This reveals any application discrepancies across the servers allowing them to be quickly brought back into alignment.

4. Monitoring critical files.

Like the case above, sometimes only specific configuration files or other critical files require verification. A reference of the specific file(s) is captured and stored in Verify. Each of the servers is scanned to look for the reference file(s). For each server, Verify will return information about any files that were modified or removed allowing them to be quickly brought back into alignment.

From the typical uses described you can see how SignaCert Verify provides a wealth of information that provides significantly improved contorl over your IT environment.

SignaCert Verify

Next Steps

Sign up today for a
FREE 30 day trial

888-961-9922

Contact us if you
have any additional questions

download

More information is available in this datasheet

Contact Us

We can help you improve your IT reliability and availability. Contact us today.