SignaCert® Integrity™

SignaCert® Integrity™: The gold standard for IT infrastructure integrity validation.


SignaCert® Integrity™ continuously verifies IT infrastructure integrity to automate problem identification, accelerate recovery, and eliminate fire drills.

“The Power of Being Correct™” is the core philosophy behind every use case of SignaCert® Integrity™. “The Power of Being Correct” captures our fundamental belief that correctly configured infrastructure elements—servers, workstations, network devices, Point of Sales terminals, control systems, etc.—lead to:

  • Peak performance
  • Highest up-time
  • Longest asset life
  • Optimal security
  • Continuous compliance
  • Lowest total cost
  • Fewer, and easier to quickly resolve, IT fire drills

That is why we created SignaCert Integrity: to continuously validate that infrastructure elements match the standards and gold images that maximize business value. By only alerting on deviations from correct states, SignaCert Integrity automates problem identification, accelerates recovery, and eliminates fire drills.

SignaCert Integrity’s IT infrastructure integrity validation solves the major problems with traditional change and file integrity monitoring (FIM 1.0) solutions.

  • FIM 1.0 has always been focused on detecting change, and FIM 1.0 products do not differentiate between authorized and unauthorized changes, so they blind administrators with thousands of alerts.
  • SignaCert Integrity focuses on verifying and maintaining correctness, and its FIM 2.0 approach dramatically reduces noise and provides the most actionable data by only alerting on deviations from correct states.

You really owe it to yourself to learn more about SignaCert Integrity in a live consultation, but here is a closer look at some of the solution’s IT infrastructure integrity validation capabilities.

FIM 2.0

SignaCert Integrity validates that you have correctly deployed and configured infrastructure elements, and only alerts on deviations from correct states that need immediate attention.

Compliance automation

SignaCert Integrity includes out-of-the-box policies that you can use to ensure compliance with (just to name a few) NIST 800-53, SOX, PCI DSS, HIPAA, NERC and FDCC. We add policies frequently.

Simple, powerful reporting

SignaCert Integrity’s ready-to-run reports provide proof of continuous compliance with regulatory and internal standards. SignaCert Integrity also provides historical trends and analysis and drill-down capabilities that you can define.

Security Content Automation Protocol (SCAP)

SignaCert Integrity includes a NIST-validated, SCAP-authenticated configuration scanner, an authenticated vulnerability and patch scanner, and an FDCC scanner.


You can combine multiple reports into concise, at-a-glance views of the current and historical state of managed systems and business services.

Automated vulnerability assessment

SignaCert Integrity incorporates OVAL-compliant feed subscriptions to ensure immediate detection and reporting of vulnerable systems.


Each SignaCert Integrity manager scales up to 10,000 monitored devices.

Device support

SignaCert Integrity allows you to verify the integrity of a range of devices including servers, desktops, network devices, databases, storage systems, virtualization infrastructures and mobile devices.

IT maturity in a box

SignaCert Integrity enables organizations to achieve high IT maturity without significant manpower investments.

Policy builder

SignaCert Integrity’s intuitive, graphical policy builder enables rapid creation and duplication of assessment policies.

Open architecture

SignaCert Integrity incorporates industry standard formats, protocols and web services to enable rapid integration with enterprise-specific processes, products and workflows.

The Global Trust Repository™ (GTR)

SignaCert Integrity is the only IT infrastructure integrity validation solution powered by its own enormous file and application whitelist database, the Global Trust Repository™ (GTR).

SignaCert Integrity utilizes the GTRto ensure bona fide software exists across the enterprise and establishes the legitimacy of that software.

Learn More