A Typical Set-to-Post Scenario with Silverstack and Pomfort SealVerify

In this article you will learn about a typical set-to-post scenario with Pomfort’s Silverstack and Pomfort SealVerify. The products are designed to work hand in hand to deliver a secure and optimized copy chain.

About the Workflow

Copying data with Silverstack secures a consistent copy through the use of different hash algorithms. In addition to that, the sealing functionality in Silverstack allows to also verify the completeness of the data copied to the drive. You can think of the seal as a complete inventory list of the drive. After any further copy step, for example in post production, Pomfort SealVerify enables the verification of the intended content.

Due to the Pomfort Seal that is copied along with the data you will always be able to verify if the content of the drive is identical to the initial state when it was sealed. Even after insecure copy steps e.g. with Windows Explorer or Finder verification will be possible.


Fig. 1: A typical set-to-post scenario.

Fig. 1: A typical set-to-post scenario.


Fig. 1 shows a typical set-to-post workflow. The initial copy process from the camera source is made with Silverstack. Before sending the drive to the post production facility Silverstack seals the drive. This process secures consistency and completeness of the media data. When the drive arrives at the post house it is copied to the in-house infrastructure. Because of the seal that is carried along, the content can then be verified with one-click by Pomfort SealVerify.

Pomfort SealVerify marks the end point to a maximum secure copy process initialized with Silverstack.

Learn about verifying sealed drives or folders in Pomfort SealVerify from the article Verifying Sealed Drives in Pomfort SealVerify. Get an overview about the application in the article Pomfort SealVerify – Getting Started.