Trusted by Companies & Governments Worldwide

Prove Any File Is Exactly As It Left You

In an era where AI can alter images, documents, and video without a trace, knowing whether a file has been tampered with is critical.

FileProvenance creates a cryptographic fingerprint the moment a file is born — locking its identity in time. Any subsequent change, however small, is instantly detectable.

Settlement_Agreement.pdf
PDF · 2.4 MB
Verified
Fingerprint (SHA-256) — Registered at Origin
a7f3b8c2d1e9f4a6…2b8c7d1e
Registered By
Williams & Partners Solicitors
Integrity Status
Fingerprinted — 12 Feb 2026, 09:14 UTC
Verified Intact — 18 Feb 2026, 14:02 UTC
No tampering detected — 100% match
Powered by FileProvenance
SOC 2 Type II
GDPR & HIPAA
PDPA Compliant
99.99% Uptime

Lock a File's Identity at the Moment It's Created

FileProvenance generates a unique cryptographic fingerprint the instant a file is registered — capturing its exact state forever. Compare the fingerprint later to prove, conclusively, whether the file has been altered.

Works across whole files and specific content regions — a contract clause, a section of an image, or a clip of a video.

1
FingerprintHash at point of origin
2
DistributeShare freely — protected
3
VerifyInstant integrity check
4
CertifyCourt-ready proof report

Everything you need to prove file integrity

Cryptographic Fingerprinting

SHA-256 hash captured at origin. Any byte-level change — anywhere in the file — is immediately detectable.

Partial Content Verification

Prove the integrity of a specific clause, image region, or video segment — not just the whole file.

Compliance Reports

One-click PDF reports formatted for GDPR, HIPAA, SEC, and legal discovery proceedings.

Tamper Evidence

Instant alerts when re-verification reveals a hash mismatch — with a timestamped, signed evidence record.

Multi-Party Verification

Share a verifiable fingerprint with any counterparty. They independently confirm authenticity without access to the original.

Version Snapshots

Register a fingerprint at each deliberate version milestone. Prove not just that a file changed — but exactly when.

Trusted across industries

Legal, healthcare, finance, media, and government teams rely on FileProvenance to protect the authenticity of their most critical files.

Legal & Contracts

Prove a signed agreement was never altered after execution. Admissible chain-of-authenticity for litigation and discovery.

Healthcare & HIPAA

Certify that patient records, imaging files, and clinical reports have not been modified since creation.

Finance & Compliance

Meet SEC, SOX, and MAS audit requirements with tamper-evident financial document verification.

Media & Content Authenticity

In an AI-driven world, prove a photo, video, or article is original and unmanipulated at publication.

Research & Academic Integrity

Lock research data and submissions at completion — preventing any question of later manipulation.

Government & Public Records

Blockchain-anchored verification for public documents, ensuring transparency and resistance to falsification.

Seamless Integration With Your Stack

Works with 40+ tools including Google Drive, OneDrive, SharePoint, Slack, Jira, Okta, AWS S3, and more. No disruption to your existing workflows.

Drive
OneDrive
Slack
AWS S3
FP
Okta
Jira
Zapier
SharePoint

Ready to protect your documents?

Join companies and governments who trust FileProvenance to prove file authenticity.

Core Platform

Powerful Features Built for Trust

Everything your legal, compliance, and security teams need to verify and prove file authenticity.

Built for the modern document workflow

Cryptographic File Fingerprinting

SHA-256 & SHA-3 hashing at point of origin. Tamper-evident comparison reports and per-version integrity snapshots.

Partial Content Verification

Prove the integrity of a specific clause, image region, or video segment. Ideal for large media assets where only a portion is in dispute.

Compliance Report Generator

One-click PDF export, court-ready formatting, custom branding, and bulk report generation for GDPR, HIPAA, SEC, SOX.

Tamper Evidence Alerts

Slack, email & webhook alerts with configurable thresholds and ML anomaly detection for unexpected re-verification mismatches.

Multi-Party Verification

Share verifiable fingerprints with counterparties. They independently confirm authenticity — no access to originals needed.

Version Snapshots & Diff

Fingerprint at each deliberate version milestone. Side-by-side diff and per-user change attribution when versions diverge.

See every feature in action

Start your free 14-day trial.

40+ Integrations

Connect Everything You Already Use

FileProvenance plugs directly into your existing cloud storage, productivity tools, and developer workflows.

Storage & File Platforms

Google Drive
Cloud Storage
● Live
OneDrive
Cloud Storage
● Live
Dropbox
Cloud Storage
● Live
SharePoint
Enterprise
● Live
AWS S3
Object Storage
● Live
Azure Blob
Object Storage
● Live

Team & Workflow Tools

Slack
Notifications
● Live
Teams
Notifications
● Live
Jira
Project Mgmt
● Live
Zapier
Automation
● Live
Okta SSO
Identity
● Live
Make
Automation
● Live

Don't see your tool?

Request an integration or build your own with our REST API.

Developer Platform

API & Webhooks

Integrate file provenance directly into your own applications with our full REST API.

Simple, predictable endpoints

Full REST API with JSON, OAuth 2.0, and generous rate limits across all plans.

POST/v1/files/registerFingerprint at origin
GET/v1/files/{id}/verifyCheck integrity
GET/v1/files/{id}/auditFetch audit trail
POST/v1/files/{id}/acknowledgeRequest ack
GET/v1/reports/{id}Compliance report

Get started in minutes

// Register a file fingerprint at origin

const res = await fetch('https://api.fileprovenance.com/v1/files/register', {
  method: 'POST',
  headers: {
    'Authorization': 'Bearer YOUR_API_KEY',
    'Content-Type': 'application/json'
  },
  body: JSON.stringify({
    file_url: 's3://bucket/contract.pdf',
    metadata: { owner: 'legal@acme.com' }
  })
});

Start building with FileProvenance

SDKs for Node.js, Python, and Go, plus a Postman collection.

Pricing

Simple, Transparent Pricing

Flexible plans for teams of every size. Contact us for a quote tailored to your needs.

Starter
Free to get started
No credit card required
  • Up to 100 files / month
  • Basic integrity checks
  • 7-day verification history
  • Email support
Enterprise
Custom agreement
Volume · multi-year options
  • Unlimited everything
  • Blockchain anchoring
  • SSO / SAML 2.0
  • Dedicated CSM
  • SLA guarantees
Resources

Video Guides

Step-by-step video walkthroughs to get the most out of FileProvenance.

Start here

Introduction to FileProvenance

A 5-minute overview of how cryptographic fingerprinting works and why it matters in an age of AI manipulation.

5 min

Registering Your First File

Upload a file, generate a fingerprint, and receive your first integrity certificate — start to finish.

8 min

Verifying File Integrity

How to re-verify a file against its origin fingerprint and interpret the result report.

6 min

Go deeper

Partial Content Verification

Select and fingerprint a specific region of a document, image, or video file — and prove that region is unaltered.

10 min

Generating Compliance Reports

Export court-ready, one-click PDF reports for GDPR, HIPAA, and SEC audit requirements.

7 min

Setting Up Integrations

Connect Google Drive, OneDrive, Slack, and AWS S3 — fingerprint files automatically as they arrive.

12 min

Can't find what you need?

Our support team is here to help.

Resources

Platform Documentation

Complete reference for every feature, API endpoint, and integration in FileProvenance.

Find what you need fast

API Reference

Full REST API documentation with request/response schemas, authentication, and rate limits.

Fingerprinting Guide

Understand SHA-256 and SHA-3 hashing, how partial content hashing works, and best practices for early registration.

Integration Setup

Step-by-step configuration guides for all 40+ connectors — from Google Drive to AWS S3 to Okta SSO.

Security & Compliance

Technical details on our encryption model, zero-trust architecture, and how to satisfy GDPR, HIPAA, and SOX audits.

Report Formats

Schema reference and sample outputs for every compliance report type, including court-admissible PDF layouts.

Webhooks & Alerts

Configure real-time webhook payloads for tamper events, verification results, and expiry notifications.

Something missing from the docs?

Let us know and we'll add it.

Support

We're Here to Help

Get answers fast — through our help centre, community, or directly from our team.

Choose how you want help

Help Centre

Hundreds of articles covering setup, troubleshooting, integrations, and billing — searchable and always up to date.

Email Support

Reach our support team at support@fileprovenance.com. Starter plans receive responses within 2 business days.

Priority Support

Professional and Enterprise plans include priority response times and access to dedicated support engineers.

Community Forum

Ask questions, share workflows, and connect with other FileProvenance users and partners in our community.

Live Onboarding

New Professional and Enterprise customers receive a guided onboarding session with a customer success engineer.

Security Issues

Report vulnerabilities to security@fileprovenance.com. We respond within 24 hours and operate a HackerOne programme.

Common questions

How is this different from just storing a hash myself?

FileProvenance provides a trusted, time-stamped third-party record of when the fingerprint was registered — making it independently verifiable and legally defensible. A hash you store yourself can be backdated.

What file types are supported?

All file types — PDF, DOCX, images (JPEG, PNG, TIFF), video (MP4, MOV), audio, ZIP archives, and raw binaries. Partial content verification is available for PDF, common image formats, and MP4 video.

Does the file leave my servers?

No. By default, FileProvenance operates in a hash-only mode — only the cryptographic fingerprint (never the file content) is sent to our servers. The file itself stays where you store it.

Partner Ecosystem

Grow Together with FileProvenance

Join our network of resellers, system integrators, and technology partners helping organisations prove file authenticity worldwide.

Find the right fit for your business

Reseller Partners

Add FileProvenance to your portfolio. Earn recurring margin on every seat, with co-marketing support and a dedicated partner manager.

System Integrators

Embed FileProvenance into client deployments. Access technical pre-sales support, sandbox environments, and joint delivery resources.

Technology Partners

Build a certified integration between your platform and FileProvenance. Featured in our integration marketplace and co-marketed to our customer base.

What you get

Revenue Share

Competitive recurring margins with tiered incentives as you grow your FileProvenance practice.

Dedicated Partner Manager

A named partner manager supports your pipeline, deals, and co-sell opportunities from day one.

Partner Portal & Training

Full access to sales materials, technical training, certification programmes, and deal registration.

Co-Marketing

Joint campaigns, case studies, event sponsorship, and listing in the FileProvenance partner directory.

NFR Licences

Not-for-resale licences for internal use, demonstrations, and proof-of-concept deployments.

Priority Support

Dedicated technical support channel with SLA-backed response times for partner-led deployments.

Ready to become a partner?

Complete our partner application and we'll be in touch within 2 business days.

Our Story

Building the Trust Layer for Documents

We started FileProvenance because a $4M contract dispute dragged on for 18 months — because no one could prove which document version was authentic.

A world where no file's authenticity is ever in doubt

8CloudSolutions Pte Ltd, trading as FileProvenance, was founded by security engineers, compliance lawyers, and enterprise software veterans in Singapore. Our platform gives organisations a simple, reliable way to prove that a file is exactly as it was when it left the creator's hands.

What drives us

Trust by Default

Security and integrity are the foundation — not features.

Speed Matters

Every verification, report, and alert should be instant.

Radical Transparency

We publish our uptime, security practices, and pricing openly.

Customer Obsession

We build what compliance and security teams actually need.

Want to join our team?

We're hiring engineers, designers, and GTM professionals.

Security First

Enterprise-Grade Security

Here's exactly how we protect your files and data.

Independently verified

SOC 2 Type II
Annual independent audit
PDPA
Singapore PDPA 2012
GDPR
Full DPA available
HIPAA
BAA available
ISO 27001
ISMS certified

How we protect your data

AES-256 Encryption

All data encrypted at rest. Keys managed via AWS KMS with automatic rotation.

TLS 1.3 in Transit

HSTS enforced with 2-year max-age and preload list inclusion.

Penetration Testing

Annual third-party testing plus continuous HackerOne bug bounty.

Zero-Trust Architecture

Every service request authenticated. No implicit network trust.

24/7 SIEM Monitoring

Automated anomaly detection with an on-call security team.

Multi-Region Backups

Continuous backup across 3 AWS regions. 4hr RTO, 15min RPO.

Have a security concern?

Report to security@fileprovenance.com — we respond within 24 hours.

Release Notes

What's New

We ship fast. Here's everything we've built, fixed, and improved.

v3.4.0 · Feb 20, 2026

Blockchain Anchoring & ML Anomaly Detection

Fingerprints anchored to Ethereum/Polygon. ML-based anomaly detection for unusual verification patterns.

NewSecurity
v3.3.2 · Feb 6, 2026

40% Faster Hash Verification

Parallel processing pipeline. Files up to 5GB verify in under 200ms.

Improvement
v3.3.0 · Jan 22, 2026

SOX & ISO 27001 Compliance Templates

Two new report templates for Sarbanes-Oxley and ISO 27001. Professional and Enterprise plans.

NewImprovement
v3.2.1 · Jan 10, 2026

Webhook & Date Formatting Fixes

Fixed retry on 503. Corrected UTC offset in audit timestamps.

Bug Fix

Privacy Policy

How we collect, use, and protect your information under Singapore's PDPA.

Last updated: February 1, 2026

1. About This Policy

8CloudSolutions Pte Ltd is committed to protecting personal data in accordance with the Personal Data Protection Act 2012 (PDPA).

2. Data We Collect

We collect data you provide directly and data generated through platform use, including audit logs, user identities, IP addresses, timestamps, and file metadata.

3. Your Rights

Under the PDPA you have access, correction, and withdrawal rights. Contact dpo@fileprovenance.com.

Terms of Service

The terms governing your use of the FileProvenance platform.

Last updated: January 15, 2026

1. Acceptance

By using the platform you agree to these Terms. Governed by Singapore law.

2. Contact

legal@fileprovenance.com

Data Processing Agreement

How we process personal data on your behalf.

Version 2.1 — Effective January 1, 2026

1. Purpose

This DPA applies where we process personal data as your data processor under PDPA and GDPR.

2. Request a Signed DPA

Email legal@fileprovenance.com.