assets.sentinelone.com Open in urlscan Pro
52.206.101.23  Public Scan

Submitted URL: https://assets.sentinelone.com/aws-pf/storage-sentinel-amazon-s3?lb-mode=overlay
Effective URL: https://assets.sentinelone.com/aws-pf/threat-detection-for-amazon-s3-en?lb-mode=overlay&xs=529266
Submission: On October 14 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_3371" style="display: none; font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1px;" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 155px;">
          <div class="mktoAsterix">*</div><span style="font-size: 14px;">Email:</span>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 185px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="pathfactory" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="website" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Campaign__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="NULL" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Term__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="NULL" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Content__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="NULL" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap"><label for="contentListThresholdMet" id="LblcontentListThresholdMet" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Content List Threshold Met:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><textarea id="contentListThresholdMet" name="contentListThresholdMet" rows="2" aria-labelledby="LblcontentListThresholdMet InstructcontentListThresholdMet"
          class="mktoField mktoHasWidth" maxlength="2000" style="width: 150px;"></textarea><span id="InstructcontentListThresholdMet" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap"><label for="GCLID__c" id="LblGCLID__c" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>GCLID:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><textarea id="GCLID__c" name="GCLID__c" rows="2" aria-labelledby="LblGCLID__c InstructGCLID__c" class="mktoField mktoHasWidth" maxlength="2000"
          style="width: 150px;"></textarea><span id="InstructGCLID__c" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="G_Goal__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="pfwebinarondemand" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="3371"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="327-MNM-087">
</form>

<form style="display: none; font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft">
</form>

Text Content

*
Email:









*
Content List Threshold Met:




*
GCLID:






Submit
Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 2
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

Protect, detect and respond to malware and suspicious files in your Amazon
Simple Storage Service (S3) before they spread: including ransomware, crypto-
miners, Remote Access Trojans (RAT), spyware, adware, worms, and more.
As a scalable and secure object storage solution, organizations use Amazon S3
buckets to
ingest, store and share files from customers, vendors, partners, and other
application workflows.
Amazon ensures the infrastructure for the bucket is secure, and has strong
guardrails in place
to prevent accidental misconfigurations, however storing and using unscanned
files from any
source introduces risk. The content and security of these uploaded files is
unknown without
scanning, leaving the business, downstream customers, and applications at risk.
Protect Your Organization & Customers From Malicious Files
SentinelOne Threat Detection for Amazon S3 automatically scans every new object
added
to a bucket for malware, and can scan existing files quickly, on demand. With
autoscaling,
scanning takes milliseconds to complete per file, and custom remediation actions
including
removal and quarantining of infected files protect organizations from spreading
malicious
content uploaded to S3 buckets. Simple deployment via Amazon CloudFormation
template,
and discovery features to quickly discover, and protect all S3 buckets in your
environment.
This ensures no hidden buckets will remain unprotected, and configurable cloud
policies give
you the flexibility you need to protect yours assets dynamically- from the
instant the bucket is
provisioned. All scanning is done within your environment, ensuring that no
objects or sensitive
data leaves your environment. This protection is not only easy to deploy, but it
also integrates
easily into existing application architectures and workflows.
KEY BENEFITS
+ Protect your cloud environment
from the spread of malware
+ Detect malware & zero-days in
milliseconds
+ Meet data sovereignty and
compliance requirements
+ Streamline and automate file
threat analysis
+ Easily integrate into existing
applications and workflows
+ Manage workloads, endpoints
and S3 from the same
management console
+ Flexible coverage policies
+ Automate bucket discovery
Automatically identify, and protect all S3 buckets in your environment and apply
configurable cloud policies to ensure no bucket is left unprotected.
Threat Detection for Amazon S3
AI-Powered Cloud Data Security
DATA SHEET

sentinelone.com
sales@sentinelone.com
+ 1 855 868 3733
About SentinelOne
SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect,
and respond to
cyber attacks faster and with higher accuracy than ever before. Our Singularity
XDR platform protects
and empowers leading global enterprises with real-time visibility into attack
surfaces, cross-platform
correlation, and AI-powered response. Achieve more capability with less
complexity.
S1-THREAT-DETECTION-FOR-AMAZON-S3-07282023© SentinelOne 2023
Record Breaking ATT&CK Evaluation
• 100% Protection. 100% Detection
• Top Analytic Coverage, 3 Years Running
• 100% Real-time with Zero Delays
A Leader in the 2022 Magic
Quadrant for Endpoint
Protection Platforms
96% of Gartner Peer InsightsTM
EDR Reviewers Recommend
SentinelOne Singularity
Innovative. Trusted. Recognized.
KEY FEATURES
+ In-line file scanning via
SentinelOne’s advanced AI
detection engines
+ Scanning in your environment-
files and sensitive data never
leave your environment
+ Configurable policy-based
responses
+ File quarantine/unquarantine
+ Automatic scanning of new files,
simple on demand scanning of
existing files
+ Single console for cloud
workloads, storage, user
endpoints and IOT
The Power of AI: Layered Defense for Better Protection
In today’s threat environment, signature based approaches alone are not enough:
you need
machine-speed protection for machine-speed attacks. Threat Detection for Amazon
S3 uses
SentinelOne’s AI and Threat Intelligence engines to protect your S3 buckets
against malware,
no matter where the files originated from including: customer submissions,
website uploads,
data pipelines and more. These approaches together can identify all kinds of
malware, including
ransomware, cryptominers, RAT, spyware, adware and worms, as well as zero-day
threats that
often evade signature based protection alone.
Key Capabilities
Multi-layered protection against file-born malware and zero-day attacks
Autoscalable, performance driven protection with scanning in milliseconds per
file
Automate remediations including quarantine and encryption of malicious files
preventing the spread of malware
Power cloud threat hunting with a single console and telemetry for workloads,
user
endpoints and cloud storage
Inventory your cloud storage and apply policy based protection
Threat Detection for Amazon S3 is deployed simply via Cloud Formation Template,
and integrates easily into existing application workflows to protect your
organization at speed and scale.
Protected
Buckets
File Updates
SQS Queue
Scan Result
SQS Queue
Management Console
Quarantine
Bucket
Threat Detection
Compute Resources
Customer Cloud SentinelOne Cloud

More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel

Next 
Next 

Securing AWS Workloads with SentinelOne Singularity from SentinelOne
In this webinar, see how SentinelOne brings AI-powered threat prevention,
detection, and response to AWS workloads, including the new ECS Anywhere
container service.
LinkedIn LinkTwitter LinkFacebook LinkEmail Link
Get a Demo



SIGN UP FOR A DEMO

pdf:Threat Detection For Amazon S3
video:Securing AWS Workloads with SentinelOne Singularity from SentinelOne
pdf:Singularity Cloud Workload Security for Amazon Web Services
video:SentinelOne AWS Backup Integration Demo
video:Stop Ransomware in Its Tracks with SentinelOne and AWS
pdf:Modern Cybersecurity for Modern Enterprises
video:10 Tips for Kubernetes Hardening
pdf:Proactive Attack Surface Management for AWS Workloads With SentinelOne and
Amazon Inspector
pdf:Singularity Cloud: Cloud Workload Security for Kubernetes
pdf:SentinelOne for AWS Elastic Disaster Recovery
video:Securing Kubernetes in Amazon EKS Anywhere with SentinelOne
webpage:Practical Guidance for Optimizing Agility and Security for Cloud
Workloads
pdf:Singularity XDR Use Cases Solution Brief
pdf:Cengage – Modernizing Cloud Security
pdf:Stingray Accelerates Its Security Response Times with SentinelOne on AWS
video:Unify Cloud Visibility and Compliance With SentinelOne and AWS Security
Hub
video:The Anatomy of Ransomware Events Targeting Data Residing in Amazon S3