In an era where AI can alter images, documents, and video without a trace, knowing whether a file has been tampered with is critical.
FileProvenance creates a cryptographic fingerprint the moment a file is born — locking its identity in time. Any subsequent change, however small, is instantly detectable.
FileProvenance generates a unique cryptographic fingerprint the instant a file is registered — capturing its exact state forever. Compare the fingerprint later to prove, conclusively, whether the file has been altered.
Works across whole files and specific content regions — a contract clause, a section of an image, or a clip of a video.
SHA-256 hash captured at origin. Any byte-level change — anywhere in the file — is immediately detectable.
Prove the integrity of a specific clause, image region, or video segment — not just the whole file.
One-click PDF reports formatted for GDPR, HIPAA, SEC, and legal discovery proceedings.
Instant alerts when re-verification reveals a hash mismatch — with a timestamped, signed evidence record.
Share a verifiable fingerprint with any counterparty. They independently confirm authenticity without access to the original.
Register a fingerprint at each deliberate version milestone. Prove not just that a file changed — but exactly when.
Legal, healthcare, finance, media, and government teams rely on FileProvenance to protect the authenticity of their most critical files.
Prove a signed agreement was never altered after execution. Admissible chain-of-authenticity for litigation and discovery.
Certify that patient records, imaging files, and clinical reports have not been modified since creation.
Meet SEC, SOX, and MAS audit requirements with tamper-evident financial document verification.
In an AI-driven world, prove a photo, video, or article is original and unmanipulated at publication.
Lock research data and submissions at completion — preventing any question of later manipulation.
Blockchain-anchored verification for public documents, ensuring transparency and resistance to falsification.
Works with 40+ tools including Google Drive, OneDrive, SharePoint, Slack, Jira, Okta, AWS S3, and more. No disruption to your existing workflows.
Join companies and governments who trust FileProvenance to prove file authenticity.
Everything your legal, compliance, and security teams need to verify and prove file authenticity.
SHA-256 & SHA-3 hashing at point of origin. Tamper-evident comparison reports and per-version integrity snapshots.
Prove the integrity of a specific clause, image region, or video segment. Ideal for large media assets where only a portion is in dispute.
One-click PDF export, court-ready formatting, custom branding, and bulk report generation for GDPR, HIPAA, SEC, SOX.
Slack, email & webhook alerts with configurable thresholds and ML anomaly detection for unexpected re-verification mismatches.
Share verifiable fingerprints with counterparties. They independently confirm authenticity — no access to originals needed.
Fingerprint at each deliberate version milestone. Side-by-side diff and per-user change attribution when versions diverge.
Start your free 14-day trial.
FileProvenance plugs directly into your existing cloud storage, productivity tools, and developer workflows.
Request an integration or build your own with our REST API.
Integrate file provenance directly into your own applications with our full REST API.
Full REST API with JSON, OAuth 2.0, and generous rate limits across all plans.
SDKs for Node.js, Python, and Go, plus a Postman collection.
Flexible plans for teams of every size. Contact us for a quote tailored to your needs.
Step-by-step video walkthroughs to get the most out of FileProvenance.
A 5-minute overview of how cryptographic fingerprinting works and why it matters in an age of AI manipulation.
Upload a file, generate a fingerprint, and receive your first integrity certificate — start to finish.
How to re-verify a file against its origin fingerprint and interpret the result report.
Select and fingerprint a specific region of a document, image, or video file — and prove that region is unaltered.
Export court-ready, one-click PDF reports for GDPR, HIPAA, and SEC audit requirements.
Connect Google Drive, OneDrive, Slack, and AWS S3 — fingerprint files automatically as they arrive.
Our support team is here to help.
Complete reference for every feature, API endpoint, and integration in FileProvenance.
Full REST API documentation with request/response schemas, authentication, and rate limits.
Understand SHA-256 and SHA-3 hashing, how partial content hashing works, and best practices for early registration.
Step-by-step configuration guides for all 40+ connectors — from Google Drive to AWS S3 to Okta SSO.
Technical details on our encryption model, zero-trust architecture, and how to satisfy GDPR, HIPAA, and SOX audits.
Schema reference and sample outputs for every compliance report type, including court-admissible PDF layouts.
Configure real-time webhook payloads for tamper events, verification results, and expiry notifications.
Let us know and we'll add it.
Get answers fast — through our help centre, community, or directly from our team.
Hundreds of articles covering setup, troubleshooting, integrations, and billing — searchable and always up to date.
Reach our support team at support@fileprovenance.com. Starter plans receive responses within 2 business days.
Professional and Enterprise plans include priority response times and access to dedicated support engineers.
Ask questions, share workflows, and connect with other FileProvenance users and partners in our community.
New Professional and Enterprise customers receive a guided onboarding session with a customer success engineer.
Report vulnerabilities to security@fileprovenance.com. We respond within 24 hours and operate a HackerOne programme.
FileProvenance provides a trusted, time-stamped third-party record of when the fingerprint was registered — making it independently verifiable and legally defensible. A hash you store yourself can be backdated.
All file types — PDF, DOCX, images (JPEG, PNG, TIFF), video (MP4, MOV), audio, ZIP archives, and raw binaries. Partial content verification is available for PDF, common image formats, and MP4 video.
No. By default, FileProvenance operates in a hash-only mode — only the cryptographic fingerprint (never the file content) is sent to our servers. The file itself stays where you store it.
Join our network of resellers, system integrators, and technology partners helping organisations prove file authenticity worldwide.
Add FileProvenance to your portfolio. Earn recurring margin on every seat, with co-marketing support and a dedicated partner manager.
Embed FileProvenance into client deployments. Access technical pre-sales support, sandbox environments, and joint delivery resources.
Build a certified integration between your platform and FileProvenance. Featured in our integration marketplace and co-marketed to our customer base.
Competitive recurring margins with tiered incentives as you grow your FileProvenance practice.
A named partner manager supports your pipeline, deals, and co-sell opportunities from day one.
Full access to sales materials, technical training, certification programmes, and deal registration.
Joint campaigns, case studies, event sponsorship, and listing in the FileProvenance partner directory.
Not-for-resale licences for internal use, demonstrations, and proof-of-concept deployments.
Dedicated technical support channel with SLA-backed response times for partner-led deployments.
Complete our partner application and we'll be in touch within 2 business days.
We started FileProvenance because a $4M contract dispute dragged on for 18 months — because no one could prove which document version was authentic.
8CloudSolutions Pte Ltd, trading as FileProvenance, was founded by security engineers, compliance lawyers, and enterprise software veterans in Singapore. Our platform gives organisations a simple, reliable way to prove that a file is exactly as it was when it left the creator's hands.
Security and integrity are the foundation — not features.
Every verification, report, and alert should be instant.
We publish our uptime, security practices, and pricing openly.
We build what compliance and security teams actually need.
We're hiring engineers, designers, and GTM professionals.
Here's exactly how we protect your files and data.
All data encrypted at rest. Keys managed via AWS KMS with automatic rotation.
HSTS enforced with 2-year max-age and preload list inclusion.
Annual third-party testing plus continuous HackerOne bug bounty.
Every service request authenticated. No implicit network trust.
Automated anomaly detection with an on-call security team.
Continuous backup across 3 AWS regions. 4hr RTO, 15min RPO.
Report to security@fileprovenance.com — we respond within 24 hours.
We ship fast. Here's everything we've built, fixed, and improved.
Fingerprints anchored to Ethereum/Polygon. ML-based anomaly detection for unusual verification patterns.
Parallel processing pipeline. Files up to 5GB verify in under 200ms.
Two new report templates for Sarbanes-Oxley and ISO 27001. Professional and Enterprise plans.
Fixed retry on 503. Corrected UTC offset in audit timestamps.
How we collect, use, and protect your information under Singapore's PDPA.
8CloudSolutions Pte Ltd is committed to protecting personal data in accordance with the Personal Data Protection Act 2012 (PDPA).
We collect data you provide directly and data generated through platform use, including audit logs, user identities, IP addresses, timestamps, and file metadata.
Under the PDPA you have access, correction, and withdrawal rights. Contact dpo@fileprovenance.com.
The terms governing your use of the FileProvenance platform.
By using the platform you agree to these Terms. Governed by Singapore law.
legal@fileprovenance.com
How we process personal data on your behalf.
This DPA applies where we process personal data as your data processor under PDPA and GDPR.
Email legal@fileprovenance.com.