Overview
Interested in discounted pricing? Contact sales@cloudstoragesec.com for a Private Offer.
Protect data lakes, ingestion pipelines, and application workflows built on AWS storage by scanning for viruses, ransomware, trojans, and other malicious payloads before they propagate downstream.
WHY THIS SOLUTION IS DIFFERENT
- Support for Multiple Data Sources
- Purpose-built for AWS storage
- In-tenant, security-first architecture
- Flexible scanning models
- Static, Dynamic & Forensic Analysis
- Configuration visibility across buckets
- Rapid deployment with minimal operational overhead
SUPPORTED AWS STORAGE Built for AWS storage services including:
- Amazon S3
- Amazon EBS
- Amazon EFS
- Amazon FSx
Engines Identify malware at petabyte scale across all buckets by leveraging the power of Sophos, CSS Premium, or CSS Secure. Engines may be used simultaneously to optimize accuracy and performance.
Scanning Models Integrate the method that fits your needs to minimize process interruptions and eliminate service disruptions. Choose from:
- Event-Based Scanning Scan new or modified objects in real time when uploaded. (easy to integrate into workflows because low or no code changes are needed)
- Retroactive Scanning Scan existing objects on demand or on schedule for baselining and compliance audits.
- API-Based Scanning Scan objects inside or outside of AWS in real time via a REST API before they are written to storage. Ideal for migrations, new application builds, or workflows where scan results determine whether an object is accepted.
Analysis Perform static analysis without execution or detonate files in a sandbox using SophosLabs Intelix™. Files are segmented by bucket and account to support traceability and forensic investigation.
Configurations Identify buckets with secure and insecure permission policies through a unified dashboard to improve visibility into storage misconfigurations.
Setup Deploy via AWS CloudFormation or Terraform in less than 10 minutes. Initial bucket protection and scanning configuration takes less than 5 minutes.
Follow the Getting Started Guide: https://help.cloudstoragesec.com/getting-started/summary/
Security First The solution installs and operates entirely within your AWS account. Data never leaves your environment or region. Optional deployment models include centralized security services accounts, linked account management, and private VPC endpoints.
Case Studies https://cloudstoragesec.com/case-studies
Core Capabilities
- Automated serverless architecture
- Real-time & on-demand scanning
- Centralized management console with dashboards and detailed reporting
- Automatic discovery & scaling across multiple accounts & regions
- No file size or type limitations with CSS Premium
- Problem file remediation (Quarantine, Tag, Delete)
- Notifications and integrations with third-party ticketing systems, Slack, Microsoft Teams, Amazon Chime, SIEM platforms, Amazon SNS, AWS Security Hub, AWS CloudTrail, AWS Control Tower, AWS Transfer Family, and more
Flexible Pricing Choose between pay-as-you-go pricing based on scan volume or tiered plans with unlimited scanning. Private offers and prepaid discounts are available.
NOT TO MISS ARTICLES ON AWS https://aws.amazon.com/blogs/apn/integrating-amazon-s3-malware-scanning-into-your-application-workflow-with-cloud-storage-security/
Highlights
- In-tenant, cloud-native malware scanning for Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx with no external file transfer.
- Multi-engine virus detection using Sophos, CSS Premium, and CSS Secure with event-based, retroactive, and API scanning models.
- Protect data lakes and application workflows with real-time and on-demand scanning that scales across multi-account AWS environments.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/GB |
|---|---|---|
FreeTrial Usage | FreeTrial Usage | $0.00 |
Monthly Subscription - includes 100GB of premium engine scanning | Monthly Subscription - includes 100GB of premium engine scanning | $99.00 |
Scan 101-500GB per month | Scan 101-500GB per month | $0.80 |
Scan 501-1500GB per month | Scan 501-1500GB per month | $0.80 |
Scan 1501-3000GB per month | Scan 1501-3000GB per month | $0.80 |
Scan >=3001GB per month | Scan >=3001GB per month | $0.80 |
Scan pre-existing objects | Scan pre-existing objects | $0.80 |
Premium Engine per GB Add-on - pre-existing objects - Sophos | Premium Engine per GB Add-on - pre-existing objects - Sophos | $0.10 |
Premium Engine per GB Add-on - Sophos | Premium Engine per GB Add-on - Sophos | $0.10 |
Cloud Detonation - Static Analysis (Per File) | Cloud Detonation - Static Analysis (Per File) | $0.05 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Console Deployment and Permission Setup
- Amazon ECS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Additional details
Usage instructions
Subscribing to this product will take you through the sign-up and deployment process. Deployment consists of launching a CloudFormation Template provided to you on the last configuration page of signup (also located in the Help Docs). Once Stack creation is completed, look to the Stack Outputs for the Console access URL and open that in your browser. Any additional deployment and management tasks are performed from within the Console.
For detailed steps on how to subscribe, deploy and use the product, please review: http://help.cloudstoragesec.com/getting-started/how-to-subscribe/
Resources
Vendor resources
Support
Vendor support
If you need help during your 30-day free trial, we are happy to provide email support via support@cloudstoragesec.com . We respond to support requests via email during your 30-day free trial within 24 hours Monday through Friday. We can also provide more in-depth support via phone and web meetings for Proof of Concept (POC) engagements. If you would like more information about initiating a POC, please contact one of our experts at https://cloudstoragesec.com/contact . Cloud Storage Security also offers Premium Support and Professional Service plans for purchase in AWS Marketplace
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Automated file scanning has reduced malware risk and protects our cloud document workflows
What is our primary use case?
My main use case for Antivirus for Amazon S3 is to protect the S3 storage buckets used for file uploads, document exchange, and backups, as well as web application content. I mainly use it for scanning user-uploaded files to S3, detecting malware in stored objects, protecting web application uploads, preventing infected files from reaching users, alerting SOC teams to suspicious uploads, and supporting cloud security compliance controls.
A quick specific example of how I use Antivirus for Amazon S3 day-to-day involves a customer portal where end users can upload documents for verification. Files are stored in Amazon S3, and there was concern that someone could upload a malicious document disguised as a normal file. After enabling Antivirus for Amazon S3 scanning, suspicious uploads are automatically flagged before being consumed by downstream systems. In one case, a file exhibiting malicious macro behavior indicators was quarantined for review, which significantly reduces the risk for internal users and the application's workflow.
For monitoring, I use Antivirus for Amazon S3 to review malware detections, manage the quarantine workflow, validate bucket coverages, integrate alerts with SOC tools, and support a secure file upload process. I utilize all of these features on a day-to-day basis.
What is most valuable?
The best features Antivirus for Amazon S3 offers include quarantining, which is very useful for a SOC team, alerting features, and a user-friendly AWS workflow. It even integrates with S3 events and automation flows to allow for automated scanning, eliminating the need for manual checks. It is crucial for checking the automated processes and protecting cloud storage uploads, especially when users upload files, thereby enhancing compliance posture.
Automation and integration with S3 events make my workflow easier and more efficient because it stops suspicious files immediately and notifies the security team. In one case, when a malicious or suspicious file was uploaded to an S3 bucket, instead of allowing the file to stay in a production bucket or letting a user download it, it automatically moved to the quarantine bucket and notified the security team. It blocks public access, tags infected files accordingly, and prevents downstream systems from using flagged files. For example, one of the end-users uploaded an Excel file to the portal that contained malicious macro code. Without quarantine, a finance or admin user could have downloaded and opened the file, infecting their endpoint. However, with quarantine enabled, the file is scanned post-upload, and if it is malicious, it is detected and moved to the quarantine bucket, preventing any dangerous files from reaching users. This process stops threats at an earlier stage.
Automatically malware scanning for uploaded files is the best feature given the nature of S3 storage. Even with such scanning, uploaded content can still become an infection path, making automatic file malware scanning the most valuable feature.
Antivirus for Amazon S3 has positively impacted my organization by reducing malware risk from uploads, decreasing manual review efforts, speeding up responses to suspicious files, enhancing trust in customer-facing portals, and improving our cloud storage security posture.
What needs improvement?
Improvements can be made to Antivirus for Amazon S3 since it sometimes generates false positives on rare file types, which requires tuning based on workloads. Additionally, reporting on executive dashboards should be enhanced, and there may be a need for cost adjustments. Multi-cloud support would strengthen the offering, and these aspects, along with user interface enhancements, should be considered.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for more than 1.6 years, mainly in the AWS environment where files uploaded to S3 buckets require malware scanning before customer access.
What do I think about the stability of the solution?
Antivirus for Amazon S3 is stable with no major issues, and the integration overall works well.
What do I think about the scalability of the solution?
Scalability is good with AWS native architectures in place.
How are customer service and support?
The quality of customer support is dependent on the vendor, but in my opinion, it is all good.
Which solution did I use previously and why did I switch?
I previously used Trend Micro Cloud file scanning solutions, but I switched to Antivirus for Amazon S3 because it is very easy to use and is trusted by many by default.
What was our ROI?
I have indeed seen a return on investment since Antivirus for Amazon S3 prevents malware incidents, reduces the need for manual file checking, improves consumer trust, and strengthens compliance controls. These metrics represent significant returns on investment.
What's my experience with pricing, setup cost, and licensing?
I was not part of the pricing, setup cost, or licensing discussions, but based on my knowledge, it generally depends on business criticality and external exposure, which justifies the expenses when files are uploaded.
Which other solutions did I evaluate?
Before choosing Antivirus for Amazon S3, I evaluated custom antivirus pipelines, native AWS security workflows plus Lambda, and Trend Micro Cloud file scanning solutions, and I switched to Antivirus for Amazon S3 due to its trusted reputation.
What other advice do I have?
My advice for others looking into using Antivirus for Amazon S3 is that if any organization or application deals with file uploads to S3, they should not assume the storage is secure on its own. Scanning content before internal use or download access is vital, and organizations need to consider all these aspects before making a choice.
Antivirus for Amazon S3 is a very practical security control for an AWS environment that handles uploads or shared files, effectively closing a common blind spot in cloud storage security. I would rate this product an 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated file scanning has strengthened compliance and streamlined secure document workflows
What is our primary use case?
Our primary use case for Antivirus for Amazon S3 is scanning files uploaded by external partners and end-users before those files flow into our downstream processing system. We have S3 buckets that act as our ingestion points, documents, Lambda deployment packages, and third-party data files, all of which need to be validated for malware before they touch any internal system. Antivirus for Amazon S3 sits right at the entry point, automatically scanning every object as it lands. It essentially acts as our first line of defense at the cloud storage layer.
One concrete example of how I am using Antivirus for Amazon S3 day-to-day is that we exposed an S3 endpoint to a network of around 40 external vendors who regularly uploaded compliance documents and reports. Before Antivirus for Amazon S3, we had a basic Lambda and ClamAV setup that constantly broke down with files over 400 MB and needed constant maintenance. After switching, we deployed the solution in under 15 minutes using the CloudFormation template, and within the first month, we caught three infected uploads from different vendors that could have otherwise made it into our document processing queue. That incident alone justified the switch for our security team.
What is most valuable?
The best features Antivirus for Amazon S3 offers are event-driven scanning and automated object tagging. Event-driven scanning means the moment a file hits S3, it is already being scanned. No polling, no delay, and no manual triggers are required. Object tagging is where the real downstream power comes in. Files get tagged as clean or infected, and our processing jobs only pick up objects tagged as safe. The decoupling means we do not have to tightly wire our application logic to the security layer. Multi-engine support from Sophos, CSS Premium, and ClamAV is also a significant benefit for detection coverage.
These features have genuinely reduced the operational burden on our security and DevOps teams. Before, someone had to manually investigate an alert, trace where a file came from, and then decide what to do. That easily took 45 minutes to an hour per incident. Now, the infected file is automatically quarantined or deleted, tagged with metadata, and the relevant team gets a Slack notification within seconds. We estimated it saved our team around 8 to 10 hours a month in manual work alone. The development team does not need any specialized security knowledge to work with it. It is just part of the S3 workflow.
The positive impact of Antivirus for Amazon S3 on my organization has been most visible in three areas: security posture, compliance confidence, and developer velocity. From a security standpoint, we have eliminated the risk of malicious files entering our core systems from external sources, which was a major audit finding we were trying to resolve. From a compliance angle, we can now demonstrate continuous, automated scanning of all ingested objects, which directly supports our SOC 2 or ISO 27001 obligations. From a developer standpoint, the team does not have to think about security at the application layer for every new upload workflow. It is already handled at the infrastructure level.
What needs improvement?
If I had to point to one main area where Antivirus for Amazon S3 can be improved, it would be the reporting and analytics side of things. The current dashboard gives you what you need for operations, but if you want rich, forensic-level reporting, such as tracking infection patterns over time, which upload sources are riskier, or trending data by bucket, you have to build that system yourself on top of the logs. I would love to see more out-of-the-box reporting capabilities without needing to pipe everything into a SIEM first. It is not a deal-breaker, but it would make the product much stronger from a security analytics perspective.
Regarding needed improvements, I think about documentation, debugging, and monitoring. Documentation is generally good, but there are some edge cases, particularly across cross-account deployment configuration, where the documentation feels thin. I had to piece together information from a Stack Overflow post and a support ticket to get it right. For debugging, clearer error messaging from the scanning engine when something fails silently would be helpful. Sometimes a scan just does not trigger, and there is no obvious signal in the logs as to why. Better diagnostic tooling there would save a lot of troubleshooting.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for about one and a half to two years now, primarily across our cloud-native ingestion pipelines.
What do I think about the stability of the solution?
Stability for Antivirus for Amazon S3 has been excellent in two years of use. We have had zero unplanned outages attributed to the solution. The Fargate-based architecture means there is no underlying compute to babysit, and we have never seen it fall under high load. We have had spikes where thousands of files were uploaded in a short window, such as during a large batch data transfer, and the scanning kept pace without any noticeable delay or backlog. That kind of reliability is what you need when it is sitting in a production security pipeline.
How are customer service and support?
My experience with customer support for Antivirus for Amazon S3 has been very positive. The one significant support request we raised around cross-account deployment configuration was resolved within two business days with clear, technically accurate guidance. The support team clearly knows the product deeply and does not escalate everything to a generic FAQ. I have also seen them release a bug fix within 48 hours after a community-reported issue, which shows that they are actively engaged. For a cloud marketplace product at this point, that level of responsiveness is genuinely impressive.
Which solution did I use previously and why did I switch?
Previously, we were running a homegrown solution built on ClamAV with an AWS Lambda function. It worked initially, but it had a hard file size cap around 400 MB, required constant maintenance whenever ClamAV definitions updated, and had no real management interface. Everything was manual. As our S3 footprint grew, the external upload volume increased. It just did not keep up. The tipping point was when we needed multi-region support, and the DIY solution could have required significant rework. That is when we started evaluating purpose-built solutions.
How was the initial setup?
The setup experience was genuinely impressive. We were up and scanning in under 15 minutes using the CloudFormation template. The 30-day free trial with up to 500 GB of scanning was also very generous and gave us enough time to validate it properly before committing.
What was our ROI?
I have seen a return on investment from Antivirus for Amazon S3, and it has been strongly felt and quick to materialize. We eliminated the maintenance overhead of our old Lambda-ClamAV setup, which was consuming roughly 5 to 6 engineering hours per month in patches, fixes, and size limitation workarounds. We have reduced our security incident response time related to S3 uploads by about 40%, and the automated quarantine workflow alone has prevented at least two incidents that would have caused downstream data corruption. When you factor in the cost of a potential breach versus the subscription cost, the math is very clearly in favor of this product.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Antivirus for Amazon S3 started with pricing at $49 per month for the first 100 GB scanned on the pay-as-you-go model and then scales on a per-GB basis after that. For the volume we are operating at, it has been very predictable and reasonable. It is far cheaper than staffing someone to manage a homegrown solution.
Which other solutions did I evaluate?
Before choosing Antivirus for Amazon S3, we looked at a few options seriously, such as Amazon GuardDuty Malware Protection for S3, which was the obvious first choice given its native AWS integration, but it did not give us the level of control and configurability we needed, particularly around custom tagging and quarantine workflow. We also evaluated BucketAV and MetaDefender Cloud . BucketAV was appealing for its simplicity and open-source nature, but it lacked enterprise-grade multi-engine support. MetaDefender had great detection, but required data to leave our AWS environment, which was a non-starter. Antivirus for Amazon S3 hit the right balance of control, deployment simplicity, and detection quality.
What other advice do I have?
Something I do not think gets enough attention about the features is the Terraform support. We follow infrastructure-as-code practices, and being able to define and enforce antivirus policies on S3 buckets at creation time through Terraform templates has been transformative. Now, every new bucket across all our environments is automatically protected the moment it is provisioned. There is no room for human error or someone forgetting to enable scanning. The multi-region deployment support is also worth noting for teams that operate across multiple AWS regions, which we do.
If you are running any kind of external-facing upload workflow on S3, do not wait to put a proper scanning layer in place. The AWS shared responsibility model is clear. AWS does not scan your S3 data for threats. That is on you. Antivirus for Amazon S3 is one of the fastest ways to close that gap without building something yourself. Take the 30-day free trial seriously. Test it with your actual workloads and spend time understanding the tagging and quarantine configuration. That is where you will unlock the most value in your downstream automation. I would rate this product an 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated threat response has protected our cloud data and has improved security efficiency
What is our primary use case?
Antivirus for Amazon S3 has protected us many times. In a real scenario that I remember, there was access to an Amazon S3 bucket from unknown locations, including Russia and Ukraine. We immediately received an alert about suspicious account activity from unknown user locations, and an API call was activated. Once we received the alert, we quickly investigated and found that malicious Java code had been injected into the S3 bucket, which was causing infections when users downloaded it on their machines. The host was compromised, the AWS account was compromised, and we got a real-time malware alert.
What is most valuable?
The best feature is definitely the deployment. The deployment takes less than 10 minutes. The solution runs within the AWS account, ensuring the data remains secure and compliant. Automated threat mitigation is the second main feature. It automatically tags, deletes, and quarantines the infected file upon detection and provides robust defense against malware, protecting in real time.
The system can automatically delete and quarantine the infected files once they are found to be malicious. This antivirus solution has a robust defense against malware, ensuring it never reaches the end user's S3 bucket and S3 locations.
It has definitely impacted our business positively. It makes our complete S3 bucket and AWS account secure by ensuring that no malicious file can be uploaded or downloaded by any AWS account holder. All the data that is stored in the cloud is fully protected, fully compliant, and secure.
There is definitely a huge impact on the organization that we observed. There was an 80% efficiency increase with the deployment of this antivirus solution, which causes fewer incidents to be created whenever any alert is generated in real time. We saved a lot of time in terms of mitigating or identifying threats and quickly taking action on securing the AWS account from malware infection spread. It saves a lot of time and has improved the overall efficiency and effectiveness of the account and storage devices.
What needs improvement?
There are no major issues, but if the company could work on deployment features as well as cost-effectiveness and some specific features that require licensing needs, it would be really helpful.
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
I think others should definitely go for Antivirus for Amazon S3. The reason is that it is not just about protecting from malicious files, but it takes action immediately by quarantining the file and deleting the file whenever needed. I can perform automated actions, automated alert investigation, and quickly block threats from the organization. It definitely works in a real-time scenario. Since it is integrated with the cloud, it is really easy to get support from the cloud storage. Additionally, the cloud signature gets updated every day, which is really helpful. I would rate this solution a nine out of ten.
Automated file scanning has improved security and now lets us focus more on core development work
What is our primary use case?
Antivirus for Amazon S3 is typically used for scanning files uploaded to S3 buckets for malware before they are consumed by downstream services. This is especially critical when handling user-generated content or third-party uploads.
What is most valuable?
One of the best features of Antivirus for Amazon S3 is automatic malware scanning on upload without needing to manage infrastructure. AWS native solutions such as GuardDuty Malware Protection provide fully managed agent-less scanning.
A key aspect of Antivirus for Amazon S3 that is worth mentioning is the ability to receive notifications and alerts when potential threats are detected, which allows my team to take swift action and ensure the security of our application.
Antivirus for Amazon S3 has improved our overall security posture, especially for compliance-heavy applications. My team became more confident handling external file uploads. We reduced custom infrastructure costs by around 30% since we did not need EC2-based scanning pipelines. Additionally, development times dropped by about 20% due to the managed service.
I have seen a significant improvement in my team's productivity since we implemented Antivirus for Amazon S3. The 20% reduction in development time has allowed us to focus on higher-priority tasks. With the managed service handling the scanning, our developers can now allocate more time to feature development and less time to infrastructure management.
What needs improvement?
One limitation I have identified is that advanced customizations can be tricky with fully managed solutions for Antivirus for Amazon S3. Sometimes we need more control over scanning logic or workflows.
For needed improvements, I would say documentation is good, but troubleshooting scan failures or false positives can still take time with Antivirus for Amazon S3. Better debugging tools would help.
One area I would like to see improved for Antivirus for Amazon S3 is the automation of certain security protocols, such as automatic updates and patch management to further enhance our security posture. I believe this would help us streamline our operations and reduce the risk of human error.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for about a year now, primarily in projects where users upload files such as documents or images. It became important when we started dealing with untrusted file uploads.
What do I think about the stability of the solution?
Antivirus for Amazon S3 is very stable, especially AWS-managed solutions. We have not experienced any major downtime or failures in our scanning workflows.
What do I think about the scalability of the solution?
Scalability for Antivirus for Amazon S3 is excellent. It can handle high volumes of uploads without performance degradation since it builds on S3 's event-driven architecture.
How are customer service and support?
Customer support for Antivirus for Amazon S3, specifically AWS native solutions, is solid if you have an enterprise plan. Community and documentation also cover most common issues.
Which solution did I use previously and why did I switch?
Earlier, we used a custom EC2-based antivirus pipeline, but it required maintenance and scaling efforts, which is why we switched to a managed solution for simplicity.
How was the initial setup?
The setup for Antivirus for Amazon S3 is relatively simple. We only need to enable scanning on buckets or deploy via CloudFormation . Pricing is usually pay-as-you-go based on the data scanned.
What was our ROI?
The return on investment for Antivirus for Amazon S3 is strong because it reduces security risk and eliminates the need for custom infrastructure. Overall efficiency improved by roughly 25%.
Which other solutions did I evaluate?
I evaluated custom Lambda-based scanning, third-party tools such as BucketAV and solutions using VirusTotal APIs before choosing Antivirus for Amazon S3.
What other advice do I have?
My advice for others looking into using Antivirus for Amazon S3 is that if your application accepts file uploads, you should definitely implement antivirus scanning for S3. I recommend starting with a managed solution to avoid unnecessary complexity.
Antivirus for Amazon S3 is essential for any system handling external file uploads. It is one of those things you would not think about until something goes wrong, so it is better to have it in place early. I rate this product an 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated tagging has transformed our cloud file protection and now improves security compliance
What is our primary use case?
I mainly use Antivirus for Amazon S3 for native AWS and Amazon GuardDuty Malware Protection on the S3 . I also use it as a third-party marketplace app and as an open-source and DIY solution. These are the main ways I have been using it.
How has it helped my organization?
Antivirus for Amazon S3 has had a positive impact on my organization, and I notice improvements in security.
Since using Antivirus for Amazon S3, I have seen that it is a very key feature for me as it improves compliance and also reduces risk. When you have files with an automated object target on them, the solution will put them in quarantine or delete them immediately. This flags anomalies effectively.
I have noticed measurable outcomes since implementing Antivirus for Amazon S3, as it saves time. Since we are using automated tagging, we do not rely on detections, such as getting an alert and then having a human go and remediate the issue. We try to make these actions as simple as possible and have them performed automatically. The actions immediately put the anomaly in quarantine, and any engineers can check in later.
What is most valuable?
The best features Antivirus for Amazon S3 offers include event-driven execution, automated object targeting, immediate remediation, in-tenant processing, data sovereignty, and scale and archiving support.
Out of those features, automated object targeting stands out as the most valuable in my day-to-day work because it allows me to automatically apply a metadata tag to S3 objects as a post-scan, for instance, identifying them as infected or clean.
I would add that you rely on humans for protection in your operation, just as you do with the automated object target. An infected tag will instantly trigger an automated workflow and bridge on AWS Lambda to immediately delete the file or move it to a completely isolated area, such as quarantine. If the file is not being deleted immediately, it is put in quarantine.
What needs improvement?
I do not have suggestions on how Antivirus for Amazon S3 can be improved at this time. I am still exploring the app and trying to see what the product can do with the features more.
I do not wish for any improvements at this time, as it has only been four months, and I am still working with it alongside different tools to see the product limits or the way the product is designed. The documentation is fine for me, and I am still looking for more features or things that I can do on my own or with my teams to improve our environment.
For how long have I used the solution?
I have been using Antivirus for Amazon S3 for about four months.
What other advice do I have?
My advice to others looking into using Antivirus for Amazon S3 is that it is something every company needs to try or every engineer that has something on the public cloud or private cloud. I would rate this solution an 8 out of 10.