Welcome to the Cloud Storage Security Help Docs¶
Cloud Storage Security offers two solutions: Antivirus for Amazon S3 and Data Classification for Amazon S3. More storage platforms and functionality is being added all the time.
Antivirus for Amazon S3¶
Antivirus for Amazon S3 allows users to detect Amazon S3 files that are infected with malware and viruses. When infected files are uploaded to Amazon S3, Cloud Storage Security detects the malicious files and guards against the spread of malware.
Computer malware is rampant and an everyday fact of doing business. Historically malware has been delivered through email, web, or even file sharing through shared network drives. The threat has evolved to include a new attack vector - uploading infected files to Amazon S3. From there, other users that access the infected files can end up spreading the malware.
Users and applications have come to rely on public cloud to provide storage of critical business files. More malware is finding its way to cloud storage as a result. Cloud Storage Security provides anti-malware protection for cloud storage to prevent users from inadvertently exposing themselves to malware by checking existing and new files for malware infections. Anti-malware software inspects a file and checks the content to detect malicious code or data. Once detected, Cloud Storage Security will remediate the object by either deleting, quarantining, or repairing the file.
Data Classification for Amazon S3¶
Cloud storage has become the center pin of every cloud workflow. Once available, data finds its way in. With as scalable and easy to use as cloud storage is, it is getting harder and harder to keep track and maintain awareness of what you have in the cloud. Our Data Classification solution will allow you to automatically discover, identify and classify sensitive and regulated data based on pre-defined rules.
Cloud Storage Security is an automated security solution that efficiently discovers and scans files in Amazon S3 buckets for malware, threats and sensitive data. It integrates natively, scales automatically, and does not interfere with DevOp workflows. It is managed from a single console to optimize IT administration and security operations resources.
How to Use this Help¶
The Help Docs are broken into five main sections:
How it Works,
This section will get you up and running in minutes. We will address buying the product, deploying the product, the initial configuration and review the Management Console.
This section will go through all aspects of the Console. You will walk through each page of the Console and how to work within each one.
How it Works
This section will go into details around how the product functions, the architecture, config options, sizing considerations and how to use it. Please review the included demo videos.
This section will capture and cover all the small or simple questions we find coming up a lot.
This section covers new functionality released in the product.
Remember to Search¶
The documentation navigation is fairly straight forward and easy to find what you need. Additionally we provide the ability to
Search. The upper right corner on all of the documentation pages has a search field. Every aspect of the documentation is indexed and searchable (case-insensitive). Search enables you to find topics that you may not be able to specifically recall or find through the table of contents.
For example, to find a topic related to protecting buckets in other regions, simply search on
region to discover all pages and content related to "region". Below shows the results of searching on "region":