Hero image

Verisys FIM

Simple, specialized file integrity monitoring for Windows, Linux & network devices

Download Trial

File Integrity Monitoring

Detects and notifies of changes, meeting PCI DSS requirements 10.5.5 & 11.5, as well as applying to SOX, FISMA, HIPAA, NERC CIP, CoCo and more


Get started in minutes with our operating system and application templates for common system configurations

Change Control

Automate integrity checks that notify, report and respond when discrepancies are detected


How many endpoints do you need to monitor?
Network Devices
Per Server/Workstation
Per Nework Device
Get In Touch To Purchase
Please contact us for larger volumes

File Integrity Monitoring

Verisys FIM gives you the ability to detect changes to system objects and network device configuration, ensuring your systems remain in a known and trusted state.

  • Detect Changes

    Detect changes to Windows and Linux files, Windows registry objects and network device configurations

  • Alert and Respond

    Automated alerting means your key personnel will be rapidly alerted when discrepancies are discovered

  • Reporting

    Clear, concise reports at different detail levels in a variety of formats. See a sample

Reduce Risk

Unmonitored systems may be at risk from unauthorized changes - resulting in operational downtime, security or confidentiality infringements or compliance violations. By implementing Verisys FIM, you can be confident that your systems are in a known and trusted state. The Verisys Console and Agents enable widespread monitoring and reporting of your business systems so that, in the event of discrepancy detection, you can act quickly to analyze and rectify the situation.

Process overview

By implementing Verisys FIM, you can be confident that your systems are in a known and trusted state

Detect Unauthorized Changes

File integrity monitoring is significant to many regulatory compliance requirements, for example the PCI Data Security Standard (PCI DSS). Even if your business is not covered by such regulation, file integrity monitoring is good business practice as part of a comprehensive data security policy.

NIST SP800-171 Compliance
PCI DSS Compliance

“Great product - really helped with our PCI compliance"

Alerting methods

Respond Rapidly with Automated Alerts

When suspicious activity is detected it is crucial that you are able to identify the key information and respond rapidly. With automated alerts, Verisys FIM will provide clear, concise reports and notifications showing exactly what has changed.

Verisys FIM also integrates with top SIEM solutions, seamlessly coming together with your existing security infrastructure.

Integrates with Splunk
Integrates with ArcSight

Simplified Management

A key component of Verisys FIM is the central administration console, which allows you to configure and control all of the Verisys FIM agents deployed across your enterprise. The central console simplifies the management of large or distributed agent deployments and enables centralized integrity checks, reporting and licensing administration.

Rulesets to monitor servers, workstations and network devices can be configured and published to any number of agents using the Verisys console, which reduces errors and rollout time, and simplifies the implementation of compliance procedures.

Centralized administration

Central Administration

Automated integrity checks can be scheduled from the central administration console including the ability to configure responsive actions to take once an integrity check has identified discrepancies. Integrity checks can also be initiated on an ad-hoc basis, giving you complete control over the integrity of your servers, workstations and network devices.

The console also provides a central point for all your reporting requirements. Using the intuitive interface you can generate reports in a number of formats based on your desired search criteria.

How it Works

A baseline snapshot of the current system state is taken and, according to your configuration, Verisys FIM will automatically compare the system against this baseline to detect any changes. Using the console, you can also start an integrity check manually at any time.

In addition to assessing object properties, Verisys FIM also performs a cryptographic hashing algorithm on the actual data contained within each file - if files are altered in any way, Verisys will detect it.

If files are altered in any way, Verisys FIM will detect it

Product Comparison

  Verisys Integrity Suite Verisys FIM
File Integrity Monitoring
Real-Time Change Detection
SIEM & Log Management Integration
ServiceNow Integration
Noise Reduction
Threat Hunting
Planned Changes
Automated Change Approval
Automated Compliance Tagging
RBAC (Role-Based Access Control)
Enterprise-Scale Deployment

Templates for Rapid Deployment

Verisys FIM includes a library of operating system and application templates for common system configurations, so you can get started quickly and easily.

  • Microsoft Windows Server Editions
  • Microsoft Windows Desktop Editions
  • Linux
  • Microsoft SQL Server
  • Microsoft IIS
  • Apache HTTP Server
  • Cisco IOS
  • Cisco IOS-XR
  • Cisco ASA
  • Juniper Junos
  • Palo Alto PAN-OS