Skip to content


Welcome to the Cloud Storage Security Help Docs

Cloud Storage Security offers two solutions: Antivirus for Amazon S3 and Data Classification for Amazon S3. More storage platforms and functionality is being added all the time.

Antivirus for Amazon S3

Antivirus for Amazon S3 allows users to detect Amazon S3 files that are infected with malware and viruses. When infected files are uploaded to Amazon S3, Cloud Storage Security detects the malicious files and guards against the spread of malware.

Computer malware is rampant and an everyday fact of doing business. Historically malware has been delivered through email, web, or even file sharing through shared network drives. The threat has evolved to include a new attack vector - uploading infected files to Amazon S3. From there, other users that access the infected files can end up spreading the malware.

Users and applications have come to rely on public cloud to provide storage of critical business files. More malware is finding its way to cloud storage as a result. Cloud Storage Security provides anti-malware protection for cloud storage to prevent users from inadvertently exposing themselves to malware by checking existing and new files for malware infections. Anti-malware software inspects a file and checks the content to detect malicious code or data. Once detected, Cloud Storage Security will remediate the object by either deleting, quarantining, or repairing the file.

Data Classification for Amazon S3

Cloud storage has become the center pin of every cloud workflow. Once available, data finds its way in. With as scalable and easy to use as cloud storage is, it is getting harder and harder to keep track and maintain awareness of what you have in the cloud. Our Data Classification solution will allow you to automatically discover, identify and classify sensitive and regulated data based on pre-defined rules.

Cloud Storage Security is an automated security solution that efficiently discovers and scans files in Amazon S3 buckets for malware, threats and sensitive data. It integrates natively, scales automatically, and does not interfere with DevOp workflows. It is managed from a single console to optimize IT administration and security operations resources.

How to Use this Help

The Help Docs are broken into five main sections: Getting Started, How it Works, Console Overview, FAQ and What's New.

Getting Started

This section will get you up and running in minutes. We will address buying the product, deploying the product, the initial configuration and review the Management Console.

Console Overview

This section will go through all aspects of the Console. You will walk through each page of the Console and how to work within each one.

How it Works

This section will go into details around how the product functions, the architecture, config options, sizing considerations and how to use it. Please review the included demo videos.


This section will capture and cover all the small or simple questions we find coming up a lot.

What's New

This section covers new functionality released in the product.

The documentation navigation is fairly straight forward and easy to find what you need. Additionally we provide the ability to Search. The upper right corner on all of the documentation pages has a search field. Every aspect of the documentation is indexed and searchable (case-insensitive). Search enables you to find topics that you may not be able to specifically recall or find through the table of contents.

For example, to find a topic related to protecting buckets in other regions, simply search on region to discover all pages and content related to "region". Below shows the results of searching on "region":

Search for region information

Last update: May 12, 2022