How Serpentua Cloud Works (For IT Professionals)

System Architecture for IT Professioanals

beginnerFebruary 25, 2026
On-Premise — Files never leave this zone
🗄️
Step 01
Attached Storage
Raw file storage connected to the server appliance
💾 SAN Storage Area Network
📦 NAS Network Attached Storage
🔲 JBOD Just a Bunch of Disks
🖥️
Step 02
Storage Server Appliance
Host server with direct access to attached storage
🐧 Ubuntu / Linux 🪟 Windows Server 😈 FreeBSD 🍎 macOS 😈 OpenBSD / NetBSD
⚙️
Step 03
Serpentua Agent
Installed on the server. Runs on a schedule, traverses all mounted storage and computes a cryptographic hash for every file. No file data ever leaves the machine.
<200MB installed Scheduled scans Background operation SHA-256 SHA-512 MD5 Zero file transfer
🔒 TLS 1.3 · Certificate Pinning · API Key Auth
📤 Outbound payload: SHA-256 SHA-512 MD5
☁️ Serpentua Cloud · 99.99% Uptime
📡
Step 04
API Server — Ingestion
Receives the encrypted hash payload. Authenticates the agent via API key and validates the transmission.
RESTful API API key auth Unlimited concurrent agents
Step 05
Validation Engine
Compares incoming hashes against stored baseline records. Detects file corruption, unexpected modifications, new files, and deletions.
Baseline comparison SHA-256 · SHA-512 · MD5 Corruption detection NIST IR 8387 compliant
🗃️
Step 06
Record Storage & Audit Ledger
All validation results are written to a tamper-evident cloud ledger — a permanent, time-stamped record of every file's integrity state.
Tamper-evident ledger Historical records Configurable retention Indefinite storage available
📤 Secure report delivery — on demand or scheduled
👤 Client Access — View from anywhere
🌐
Step 07
Client Dashboard & Reports
Access validation results, alerts, and downloadable reports from any browser — no software required.
📊 Live Dashboard Real-time metrics, agent health, file integrity status
🔔 Alerts Instant email or webhook on corruption or anomaly
📥 Download Reports PDF · CSV audit trails for compliance & legal review
On-premise — no file transfer
Hash computation only
Encrypted transmission & cloud
Client access & reports