Backup & Transfer Verification

Stop guessing if your
file copy actually worked.

Compare source and destination folders by file count, size, and SHA-256 hash. Get a timestamped evidence pack proving your backup or transfer completed correctly — or showing exactly what failed.

SHA-256 Verification
Fully Offline
Evidence Pack Output
Handles 500K+ Files

You ran the backup. But did it actually work?

Robocopy logs don't verify

Robocopy tells you it finished. It doesn't tell you if the files are actually identical. Bit rot, interrupted writes, and drive errors happen silently.

TeraCopy locks up on large sets

50,000 files? TeraCopy chokes. You need a verification tool that handles enterprise-scale file sets without hanging.

No audit-ready output

Your auditor asks "prove the backup worked." Robocopy logs, TeraCopy screenshots, and manual spot-checks aren't evidence. You need a clean, timestamped evidence pack.

Manual hash tools are slow

HashMyFiles works for 10 files. Running it across 200GB of data? You'll be there all day with no batch reporting and no summary output.

Your evidence pack

Every run produces a timestamped folder with everything your auditor needs. Human-readable summaries, CSV details, machine-readable JSON.

IntegritySystems Backup & Transfer Verifier — Verification Summary ────────────────────────────────────────────────────────── ToolVersion: 1.0.0 License: Professional — Acme Corp IT RunId: 20260415_143022 Status: ✓ VERIFIED — All files match Source: \\NAS01\Backups\Q1-2026 Files: 47,832 Destination: D:\Archives\Q1-2026 Size: 186.4 GB Hash Mode: SHA-256 Time: 4m 12s Artifacts written to: C:\Output\20260415_143022\ ├── verification_summary.txt ├── verification_errors.csv (0 errors) └── run.json

What it detects

Missing files

Files that exist in source but not in destination. The silent failure that Robocopy logs won't catch.

Extra files

Files in the destination that shouldn't be there. Leftover artifacts from previous jobs, or files that shouldn't have been copied.

Size mismatches

Files where the byte count differs between source and destination. Truncated writes, partial copies, or corruption.

Hash mismatches

SHA-256 verification catches bit-level corruption that size comparison misses. The gold standard for data integrity verification. (Pro+)

Questions

Does it require an internet connection?
No. The tool runs entirely offline. License validation is cryptographic — no phone-home, no telemetry, no network calls. Runs on air-gapped machines.
How large of a file set can it handle?
Tested and verified on file sets exceeding 500,000 files and 1TB+. Progress events keep you informed during long runs. The tool uses constant memory regardless of file set size.
What happens when my license expires?
Your license is perpetual for the version you purchased. Expiration only prevents activation of future updates. You can use the current version forever, even after expiration.
Can I automate verification runs?
Yes — Pro+ includes a full command-line interface. Schedule verification runs via Windows Task Scheduler, integrate into scripts, or run from CI/CD pipelines. JSON output for machine-readable results.
What's the difference between Pro and Pro+?
Pro gives you the full desktop GUI tool with SHA-256 hash verification and clean evidence packs. Pro+ adds command-line interface, batch jobs, JSON output, manifest generation/verification, and job file support. Choose Pro if you run verifications manually. Choose Pro+ if you need automation.

Try it free. Buy when you're ready.

Download the trial — up to 500 files, no registration. When you need unlimited files and SHA-256 verification, upgrade to Pro.