Overview
Interested in discounted pricing? Contact sales@cloudstoragesec.com for a Private Offer.
Cloud Storage Security Antivirus scans files before they are trusted, processed, shared, or stored long term. Built for AWS storage, it protects Amazon S3, EBS, EFS, and FSx with real time, scheduled, on demand, retroactive, and API based scanning before write. The solution runs inside your AWS account to maintain data control and reduce scanning work.
Security teams can automate detection and response with tagging, quarantine, delete actions, alerts, and enforcement workflows. Sophos, CSS Premium, and CSS Secure engines can be used individually or together to balance accuracy, performance, and file type coverage.
SUPPORTED AWS STORAGE
Protect Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx across object, block, and file storage, including data lakes, file transfers, applications, migrations, backups, and ingestion pipelines.
SCANNING MODELS
Event Based Scanning Scan new or modified objects in real time when uploaded. Ideal for user uploads, partner uploads, data lakes, ingestion pipelines, and application workflows.
Retroactive Scanning Scan existing objects on demand or on schedule for malware sweeps, baselining, storage hygiene, compliance audits, and audit readiness.
API Based Scanning Scan objects inside or outside AWS through a REST API before they are written to storage. Ideal for migrations, file intake, application builds, and workflows where scan results decide whether a file is accepted, rejected, tagged, quarantined, or deleted.
MALWARE ENGINES
Use Sophos, CSS Premium, or CSS Secure individually or simultaneously to optimize detection accuracy, performance, and operational fit across workloads and risk profiles.
AUTOMATED RESPONSE
When a problem file is found, Cloud Storage Security can quarantine, tag, or delete it. Scan results and object tags can support alerts, policy decisions, workflow automation, and downstream enforcement.
ANALYSIS AND VISIBILITY
Perform static analysis without file execution or detonate files in a sandbox using SophosLabs Intelix™. Files are segmented by bucket and account for traceability and forensic review. A dashboard helps identify secure and insecure bucket permission policies across accounts, regions, and buckets.
IN TENANT ARCHITECTURE
Cloud Storage Security installs and operates inside your AWS account. Data never leaves your environment or region, helping support privacy, data sovereignty, internal security requirements, and regulated workloads. Deployment options include centralized security services accounts, linked account management, and private VPC endpoints.
LARGE FILE AND FILE TYPE SUPPORT
Cloud Storage Security supports broad file types and large files across enterprise storage, data lakes, file shares, backups, uploads, media workflows, and migrations. With CSS Premium, teams get virtually no file size or file type restrictions, subject to AWS limits.
FAST DEPLOYMENT
Deploy through AWS CloudFormation or Terraform in less than 10 minutes. Initial bucket protection takes less than 5 minutes.
Getting Started Guide: https://help.cloudstoragesec.com/getting-started/summary/
CASE STUDIES
See how organizations use Cloud Storage Security: https://cloudstoragesec.com/case-studies
CORE CAPABILITIES AND USE CASES
Real time, on demand, scheduled, retroactive, and API based scanning Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx support Sophos, CSS Premium, and CSS Secure engines Static, dynamic, and forensic analysis Dashboards, reporting, and centralized management Automatic discovery and scaling across accounts and regions Large file and broad file type support with CSS Premium Quarantine, tag, and delete remediation Object tagging for downstream decisions Bucket configuration and permission visibility Linked account management and private VPC endpoints Integrations with Slack, Teams, Amazon Chime, SIEM platforms, Amazon SNS, AWS Security Hub, AWS CloudTrail, AWS Control Tower, AWS Transfer Family, and ticketing systems Data lake protection Secure file uploads Partner and customer file intake Application workflow protection Data ingestion pipeline security Cloud migration scanning High volume storage scanning Multi account AWS storage security Compliance audits and audit readiness
FLEXIBLE PRICING
Choose pay as you go pricing based on scan volume or tiered plans with unlimited scanning. Unlimited scanning helps protect large or growing AWS storage environments with more predictable costs. Private offers and prepaid discounts are available.
NOT TO MISS ARTICLES ON AWS
Highlights
- In tenant malware scanning for Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx. Keep files inside your AWS account and region with no external file transfer.
- Use multiple malware engines, including Sophos, CSS Premium, and CSS Secure. Scan on upload, at rest, on demand, on schedule, or before write through API based scanning.
- Protect data lakes, file uploads, ingestion pipelines, and application workflows with automated tagging, quarantine, delete actions, large file support, and unlimited scanning plans.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/GB |
|---|---|---|
FreeTrial Usage | FreeTrial Usage | $0.00 |
Monthly Subscription - includes 100GB of premium engine scanning | Monthly Subscription - includes 100GB of premium engine scanning | $99.00 |
Scan 101-500GB per month | Scan 101-500GB per month | $0.80 |
Scan 501-1500GB per month | Scan 501-1500GB per month | $0.80 |
Scan 1501-3000GB per month | Scan 1501-3000GB per month | $0.80 |
Scan >=3001GB per month | Scan >=3001GB per month | $0.80 |
Scan pre-existing objects | Scan pre-existing objects | $0.80 |
Premium Engine per GB Add-on - pre-existing objects - Sophos | Premium Engine per GB Add-on - pre-existing objects - Sophos | $0.10 |
Premium Engine per GB Add-on - Sophos | Premium Engine per GB Add-on - Sophos | $0.10 |
Cloud Detonation - Static Analysis (Per File) | Cloud Detonation - Static Analysis (Per File) | $0.05 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Console Deployment and Permission Setup
- Amazon ECS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Additional details
Usage instructions
Subscribing to this product will take you through the sign-up and deployment process. Deployment consists of launching a CloudFormation Template provided to you on the last configuration page of signup (also located in the Help Docs). Once Stack creation is completed, look to the Stack Outputs for the Console access URL and open that in your browser. Any additional deployment and management tasks are performed from within the Console.
For detailed steps on how to subscribe, deploy and use the product, please review: http://help.cloudstoragesec.com/getting-started/how-to-subscribe/
Resources
Vendor resources
Support
Vendor support
If you need help during your 30-day free trial, we are happy to provide email support via support@cloudstoragesec.com . We respond to support requests via email during your 30-day free trial within 24 hours Monday through Friday. We can also provide more in-depth support via phone and web meetings for Proof of Concept (POC) engagements. If you would like more information about initiating a POC, please contact one of our experts at https://cloudstoragesec.com/contact . Cloud Storage Security also offers Premium Support and Professional Service plans for purchase in AWS Marketplace
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Automated malware scanning has strengthened student file security and streamlined compliance
What is our primary use case?
Our main use case for Antivirus for Amazon S3 is to automatically scan and secure files uploaded to S3 buckets. This ensures that all student projects, faculty documents, and shared resources stored in AWS remain free from any type of malware, ransomware, or Trojan. It adds a critical layer of trust and compliance to our cloud storage workflows.
During exam season, hundreds of students upload project reports and code files to shared S3 buckets. We have configured an AWS Lambda function that triggers antivirus scanning every time a new file is uploaded. If the file is clean, then it is stored normally, and if malware is detected, the file is automatically quarantined and an alert is sent via CloudWatch to the faculty team.
Automated malware scanning of uploaded files with student project submissions as the practical example has improved security, efficiency, and compliance while reducing IT overhead.
What is most valuable?
The alerting and integration with AWS services are particularly valuable. Multiple features stand out, including real-time scanning of uploaded files, automated quarantine for infected objects, integration with AWS services, scalability across millions of files and multiple regions, and compliance support for HIPAA, GDPR, and ISO 27001.
Performance and features have become increasingly important to us. The ease of integration, automation, workflow efficiency, performance impact, and scalability make Antivirus for Amazon S3 stand out beyond just security. It is easy to integrate, runs efficiently without slowing workflows, and scales efficiently.
The solution has reduced IT overhead by thirty to forty percent since manual file checks are no longer needed. It has also improved our compliance posture, making audits smoother, and increased trust among faculty and students when sharing files. Antivirus for Amazon S3 has prevented potential breaches that could have cost one to two lakh rupees in downtime and recovery.
For improved compliance and audit improvements, we now have automated proof of security where every file uploaded to S3 is scanned automatically and logs are generated. We have achieved reduced manual effort since previously our team had to manually verify files before sharing them. With Antivirus for Amazon S3, this process is now automated. Clear reporting has been established in which alerts and quarantine actions are logged in CloudWatch. Faculty and IT staff no longer spend hours compiling the evidence of security checks.
What needs improvement?
There are areas that should be improved, such as user interface and visibility. Currently, most workflows rely on CloudWatch logs and Lambda triggers, which are technical. A more user-friendly dashboard showing scan results, quarantined files, and compliance status would make monitoring easier for non-technical staff. Additionally, performance metrics should be enhanced. While scanning is efficient, there is limited visibility into scan times, throughput, and resource usage. Adding performance analytics would help our teams optimize workflows and prove efficiency during audits.
Granular controls represent another area for improvement. The current scanning policies apply bucket-wide. More fine-grained controls, such as scanning only certain file types, prefixes, or user uploads, would reduce unnecessary scans and improve efficiency. Performance visibility should also be enhanced. While scanning is stable, there is limited visibility into scan times, throughput, and resource usage. Adding performance analytics would help optimize workflows and prove efficiency during audits.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for approximately one year in our academic and faculty projects.
What do I think about the stability of the solution?
Antivirus for Amazon S3 is very stable, and I have not experienced any downtime and reliability issues. It is very reliable and stable to use.
What do I think about the scalability of the solution?
Antivirus for Amazon S3 is very scalable. We have tested it with hundreds of students' project uploads during exam session. The scanning process remained consistent with no noticeable delays, even when handling thousands of files in a short time window. In multi-region deployment, we store files across multiple AWS regions for redundancy and accessibility. Antivirus scanning worked seamlessly across these regions with alerts and quarantine actions delivered reliably.
How are customer service and support?
Customer support for Antivirus for Amazon S3 is accessible through AWS Marketplace support channels and integrates with standard AWS support tiers. We contacted support once during initial setup to clarify Lambda configuration for scanning triggers. The support team provided clear documentation links and step-by-step guidance which resolved the issue quickly.
Which solution did I use previously and why did I switch?
Before adopting Antivirus for Amazon S3, we relied on manual file scanning with traditional endpoint antivirus tools. Files were scanned before being uploaded to S3 buckets. The challenges with the old approach included manual effort, human error, scalability issues, and audit burden. We switched to Antivirus for Amazon S3, which provided us with automation, scalability, audit-ready logs, cost-effectiveness, and reliability.
What was our ROI?
We have seen a clear return on investment after adopting Antivirus for Amazon S3 in our academic and faculty projects.
What's my experience with pricing, setup cost, and licensing?
Antivirus for Amazon S3 follows AWS's pay-as-you-go model, which means cost scales with usage. For our academic workload, the pricing has been cost-effective since we only pay for the file scan and Lambda execution time. Compared to traditional endpoint antivirus licensing, this approach saved us fifty thousand rupees annually in overhead. There were no upfront hardware costs because everything runs in the AWS public cloud. We purchased Antivirus for Amazon S3 through AWS Marketplace , which simplified the licensing and billing.
Which other solutions did I evaluate?
Before adopting Antivirus for Amazon S3, we evaluated several alternatives. Traditional endpoint antivirus tools were initially considered where we had the choice of continuing with local antivirus software installed on faculty and IT systems. These tools required manual scanning before uploads, which was inefficient and error-prone. Third-party cloud security gateways were also examined, where we looked at external cloud security solutions that offered malware scanning for storage. These alternatives were expensive, added complexity, and required additional licensing outside AWS.
What other advice do I have?
I would give others the following advice: start with automation, plan for compliance, think about scalability, and do not just test with small workloads. Upload large batches of files to confirm the solution scales well in your environment. Budget wisely and integrate with security workflows. Keep it simple by leveraging automation, planning for compliance, validating scalability, and monitoring costs.
Antivirus for Amazon S3 is very reliable and cloud-native, and it is the best fit for cloud workloads. If your organization relies heavily on Amazon S3 for storage, this solution is a natural fit. I would rate this solution a nine out of ten based on its overall performance and value.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated scans have kept my cloud storage clean and provide secure file management
What is our primary use case?
I am using Antivirus for Amazon S3 to scan all the files in my S3 bucket. This helps me save my S3 bucket from viruses and infected files. Using Antivirus for Amazon S3 , I am able to remove the affected virus-infected files from my S3 bucket.
I have integrated Antivirus for Amazon S3 with my S3 so that it will scan and inform me if files are infected, and auto-remove functionality is also available. If I want auto-remove enabled, it will automatically remove the infected files.
What is most valuable?
The best feature of Antivirus for Amazon S3 is that it will not affect my directory and will remove all the viruses from the system.
It will help me ensure that viruses are not present, which allows me to work in a secure environment. Having no viruses and no affected files makes it very helpful for me to maintain secure file storage.
I received security from Antivirus for Amazon S3, which is the main relevant benefit.
If you want your S3 bucket to be secure, you can perfectly rely on Antivirus for Amazon S3. It will delete all the affected files and scan on a regular basis, which will be very helpful for you.
If you want your S3 bucket to be secure and virus-free, you can use Antivirus for Amazon S3. It will be very fast in scanning your files and will give alerts if any issues arise, and it will delete the viruses and clean them from your bucket.
What needs improvement?
Antivirus for Amazon S3 is very stable now, and I do not want any changes.
I did not want anything to be improved regarding Antivirus for Amazon S3.
I did not want anything to be changed with Antivirus for Amazon S3. Everything is very good.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for one year.
What do I think about the stability of the solution?
Antivirus for Amazon S3 is stable.
How are customer service and support?
Antivirus for Amazon S3 has very good customer support.
I am rating the customer support of Antivirus for Amazon S3 at 10 out of 10 because they are helping very well.
Which solution did I use previously and why did I switch?
I did not use any other solution before Antivirus for Amazon S3.
What's my experience with pricing, setup cost, and licensing?
Pricing for Antivirus for Amazon S3 is very good. Pricing is handled by another team.
Which other solutions did I evaluate?
I did not evaluate another option because I am using S3, which is the reason I started using Antivirus for Amazon S3.
What other advice do I have?
I do not want anything else about the features.
I do not have any additional thoughts about Antivirus for Amazon S3 before we wrap up.
I give Antivirus for Amazon S3 an overall rating of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automation has improved threat detection and reduced manual checks but pricing still needs work
What is our primary use case?
My main use case for Antivirus for Amazon S3 is to secure my S3 buckets in Amazon, which can easily be hacked. I want to secure it from malicious injections.
How has it helped my organization?
Antivirus for Amazon S3 has positively impacted my organization by reducing the number of people who need to monitor threats or malicious code injections. This solution replaces that manual monitoring and only sends alerts, so we do not need to wait or check every time if it is safe or if it is getting hacked.
It has saved one or two people and saved almost 10% to 30% of the time. It also improved efficiency by almost 70%.
What is most valuable?
The best features Antivirus for Amazon S3 offers are zero maintenance, zero server maintenance, and the alerts. If you are a small company or small organization, you can also get a good file size. The setup time is very low compared to other solutions, which can take 15 minutes to half an hour, but it takes under one minute.
It can easily be integrated with AWS . The alerts help my team because if something unusual occurs in our bucket or something happens that could not happen in the bucket, it will observe and understand the patterns sometimes and send us email alerts so that we can take a quick look at it and fix it immediately. The quick setup improves our workflow significantly.
The integration of Antivirus for Amazon S3 is very good and easily integrated with Amazon AWS because it is an Amazon AWS product.
What needs improvement?
Antivirus for Amazon S3 can be improved by implementing multiple buckets into one guard, enabling TBAC which can be automatically configured by Amazon GuardDuty, and adding multi-engine scanning.
Regarding needed improvements, I think pricing is a bit higher for people who are using it very low and for small organizations. Large organizations who will use it more will benefit from the price, but small organizations will face significant monetary loss. I think they should reduce the pricing and put event-based pricing related to the organization size or the usage. I understand it is pay-per-use, but sometimes it does not make sense.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for the last six to eight months.
What other advice do I have?
My advice to others looking into using Antivirus for Amazon S3 is that this is good for medium and large-sized organizations, considering the price and what it offers. It can reduce some people, but for small organizations, I think people should be there sometimes to monitor it to save money. The people who do multitasking should be the ones who monitor as well to reduce more costs rather than relying only on GuardDuty. I give this product a rating of 8.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated quarantine has reduced security risks and has removed manual incident handling
What is our primary use case?
My main use case for Antivirus for Amazon S3 is quarantine.
A specific example of how I use Antivirus for Amazon S3 for quarantine is that we use it from the black box that can recognize viruses immediately.
How has it helped my organization?
Antivirus for Amazon S3 has positively impacted my organization as it has reduced time to market and secured our operations.
There are no special specific improvements in my secure operations resulting from the reduction of time to market.
What is most valuable?
The best features Antivirus for Amazon S3 offers are advanced automatization and isolated quarantine bucket.
The advanced automatization and the isolated quarantine bucket have helped my workflow and security because I do not need to write my own scripts on Python and Lambda to operate with incidents, which saves us a lot of costs.
I think it is excluding the human factor of failure.
What needs improvement?
I think there is a problem with pricing while scaling, and it is a blocker for big corporations as there is a subscription for the instance plus volume of scanning.
It would be great to have more understandable billing dashboards.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for more than five years.
How are customer service and support?
I rate customer service as 3 out of 10.
What other advice do I have?
My advice to others looking into using Antivirus for Amazon S3 is to connect it immediately without hesitation. I rate this review as 9 out of 10.
Cloud storage security has improved and reporting and automated quarantine still need work
What is our primary use case?
Our main use case for Antivirus for Amazon S3 is to protect the workloads. We put endpoint protection around CrowdStrike and a few other things, though newer solutions like Bucket AV are coming up. The main use case would be to protect the workloads running in EC2 and the containers running on EKS. Generally, the control plane is managed by AWS , but the application plane or the application clusters, we have to protect them. In S3 , it is mostly object storage. The files or the objects that are stored there have to be protected from DDoS attacks and we need to secure the endpoints through which those objects are accessed in the S3 bucket.
Generally what we do is we apply separate bucket level policies and object level policies, and we use signed URLs. That is one way we protect the objects. We apply antivirus where we have to when on the code that is used to access those endpoints. It is not just one layer of antivirus, but a combination of antivirus and also the bucket policies. That is how we do it. This is a fairly common use case across the industry.
What is most valuable?
Antivirus for Amazon S3 offers best features such as endpoint protection, object level protection, bucket level protection, and the ability to protect objects using signed URLs for each and every object within it. We have the logs and can actually set up certain alerts. In case something untoward happens, we can create logs of which object was used or accessed rather. That way we can create traceability through CloudTrail . We can control who has access to those objects and buckets within the S3 bucket.
Out of those features, I find bucket level policy, static, dynamic and forensic analysis, configuration visibility across buckets, and the ability to make all those things with minimal operational overhead most valuable in my day-to-day work. That is very critical. One of the things that AWS has is that it is not very costly, which makes a lot of difference because we have to protect data lakes and ingestion pipelines and application workflows. For example, we have a database where we take the backups in an S3. This is a real use case. Our application is protected but if the backup is not protected, then we have a security issue or a compliance issue. These antivirus products are very useful to do flexible scanning models. Security infrastructure is built in S3 bucket in this case. We can even bring in our own antivirus products from the marketplace that applies on the S3. That makes it very flexible. It adds a lot on cloud storage security in that sense. The final point is the built-in and native to cloud native malware scanning for S3 or even EBS and EFS and SFFS. These are the new features on Antivirus for Amazon S3 and that we believe is very critical.
Multi-engine virus detection is a unique thing that is coming up with Antivirus for Amazon S3. We could actually use multiple antivirus products. It is as if we have multiple algorithms working to find the vulnerability so we can tell what protection we can add. We can have Sophos, CSS Premium and other things. We can have event-based scanning module, retroactive scanning, or even API scanning models, which is endpoint protection in a way. These can all be done on real-time and on-demand scanning. It is not necessarily a secluded one-time scan but we can actually trigger it as and when we want on the different types of workloads and objects.
The best thing to say about Antivirus for Amazon S3's impact on our organization is that we have never been flagged for any major data leakage and every scan that we do comes up green, which means we have been able to protect our data in line with the guidelines of the organization and the regulatory authorities. That is the biggest outcome. Security is a thing that we do to make sure nothing happens. By not having that vulnerability in the system is the key differentiator, rather than having a vulnerability and then fixing it using Antivirus for Amazon S3. We would rather be trying to be proactive about it and ensure that we do not have an incident in the first place.
We do have periodic scans on the buckets and generally all over the codebase and all the cloud infrastructure that we give and take to do. There are certain classifications of vulnerabilities such as high, medium, low and then what is the threat vector or risk vector there we try to quantify as per the cloud architecture baseline that we have. We try to measure where we land with this. Generally, there is a risk assurance program process which is very strict. Having these controls helps us navigate through those processes and the ideal goal post is we should not have more than 10, I mean 10 is just a number, it could be even five, but generally we try not to have high vulnerability exposures in the solution and that typically is the measure of the positive impact. We do track these compliance metrics or vulnerability metrics.
What needs improvement?
I think typically on the signed URLs, if they can do something such as when someone puts an object into the bucket, they can immediately do a scan of that object without the user or the organization having to ask for a scan. That will be very useful for any specific case, it could be a virus in itself or a trojan or any of those things. If it can immediately block that storage or immediately create an alert that they are quarantining it, that would be another great feature. If they can put a quarantine for any object that can be a little dodgy or can be a suspicious object being stored in that bucket, that could be a great feature to have.
I think reporting does exist already with Antivirus for Amazon S3. We can generate those reports via CloudTrail but if they are integrated with the antivirus itself without us having to create specific reports every time would be better. In some cases generating those logs can be a little tedious. If they can be made easy and probably with some drag and drop feature, that will be really useful.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 as part of our cloud security for more than five years now.
What do I think about the stability of the solution?
Antivirus for Amazon S3 is stable.
What do I think about the scalability of the solution?
I have never seen any issue with the scalability of any AWS service.
How are customer service and support?
I have never come across any specific issue with customer support for Antivirus for Amazon S3. Generally they respond within the SLA timeframes so we are happy.
Which solution did I use previously and why did I switch?
Before choosing Antivirus for Amazon S3, we mostly evaluated Sophos antivirus and then a few more that we do have, but that was one of the requirements from the organization to evaluate a couple of those, so which we did. Generally that is what we use. We also use Fortinet, but that is more on the firewall side.
How was the initial setup?
We started this solution with a cloud native approach. However, it was not on Kubernetes so it was our first deployment on EKS, Elastic Kubernetes Service on AWS. Previously it was just an EC2 and VM based system. That was the major differentiator and that is the reason we switched because we wanted to take the benefit of Kubernetes.
What was our ROI?
I can tell you about AWS but not necessarily on Antivirus for Amazon S3 as such. There was a major volume shrinkage on AWS which they did not directly tell us but we realized that one of the critical applications released all the pod volumes and pod storages. When the system recovered, meaning AWS recovered and they provided the space that is needed to run the application, all those volumes came back except the data volume which we had to fix with the help of AWS support. If it was not a Kubernetes managed platform, then it will not be able to recover that way, it will crash very badly and we would have business data loss. That was a great return on investment where something absolutely extreme happens and even though AWS does take care of the things very well but accidents do happen. In this case, we really recovered very quickly. It happened across all seven environments. All seven environments recovered without us having to do anything. That is a great outcome.
What's my experience with pricing, setup cost, and licensing?
Generally, the setup is pretty easy. We have an agreement with Amazon so that is taken care of through that channel and we never had any issue. We can have our enterprise agreement on the pricing. Generally in this case, the more we consume, the better the pricing gets with time. We are fairly good on the pricing on Amazon side on that.
Which other solutions did I evaluate?
Please do look at the roadmap of the product that you are evaluating and if that aligns with the specific organization that you are part of. Because if the organization wants a different software, such as Palo Alto or Symantec or any or Norton, Fortra, all of these things, make sure we do that because sometimes what can happen is an existing antivirus for other workloads may be able to do for S3 as well and we may be able to save heaps of licensing fee on that instead of having too many different firewalls. At the same time, there can be a counter argument to that, which is that sometimes it is good to have multiple antivirus doing various things because if the budget permits, it can be very useful to have different antivirus trying to do different parts of the overall landscape. Because if some algorithm cannot pick up one type of vulnerability, some other antivirus will. It is a mix and match situation.
What other advice do I have?
On a scale of one to ten, I would rate Antivirus for Amazon S3 overall as seven. I rate it seven out of ten because if they can add the improvements that I suggested, then I will rate it higher obviously. It is not that bad that I have to give it less than seven. I think it does some of the things but it has to improve as well. I believe this is the right rating for now. Antivirus for Amazon S3 is mostly public cloud but the tenancy is managed by us, so it is more like private cloud.
Mostly we use AWS and there are a few things that run on Azure , for example, Active Directory. My overall rating for Antivirus for Amazon S3 is seven out of ten.