SentinelOne launches Amazon S3 Storage Sentinel for complete cloud protection

AI-Powered malware prevention, detection, and response for industry-leading cloud object storage service.

SentinelOne has introduced Storage Sentinel for Amazon S3, a high-performance malware prevention solution for industry-leading Amazon Simple Storage Service (Amazon S3). Storage Sentinel harnesses the power of SentinelOne’s patented AI to prevent, detect, and respond at machine speed to malicious files entering Amazon S3.


“SentinelOne is committed to protecting our customers’ evolving cloud footprints - whether storage, compute, or containers - from threats like ransomware,” said Rick Bosworth, Director of Product Marketing, SentinelOne. “With Storage Sentinel for Amazon S3, global enterprises can proactively curtail the lateral spread of malware, better manage the risk of disruption to business operations, and stay one step ahead of cyber criminals.”


Advanced threat actors easily evade legacy protection solutions which still rely on signatures. Storage Sentinel is powered by SentinelOne’s patented AI to prevent and detect malicious files and activity. On-access and on-demand file scanning detects malware in milliseconds and scales to secure even the most active storage, without latency. Automated quarantine and metadata for threat enrichment streamline incident response and provide holistic cloud visibility.


With Storage Sentinel for AWS S3, SentinelOne customers can now manage a new enterprise cloud attack surface within the Singularity XDR platform alongside their enterprise assets. For organisations already using Singularity Cloud for runtime protection of cloud workloads in Amazon Elastic Cloud Compute (Amazon EC2), Amazon Elastic Container Service (Amazon ECS), or Amazon Elastic Kubernetes Service (Amazon EKS), Storage Sentinel is an easy addition to a cloud-first defence-in-depth security strategy.

Data privacy regulation a top three challenge for IoT adopters.
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
Fears over employees ignoring security advice and ransomware attacks evolving beyond company capabilities outweigh personal job security.
New MDR service uniquely combines Cortex XDR technology with Unit 42’s advanced threat intelligence and threat hunting.
New Claroty xDome empowers enterprises to both modernize and protect the continuity of the cyber-physical systems that sustain our lives.
Half (50%) of IT leaders cite too much bureaucracy and process overload as a key barrier to employees being able to focus on their core role.
Gigamon, a leading deep observability company, has launched its first State of Ransomware 2022 and Beyond report aimed at providing insights into how the threatscape is evolving and how the severity of the ‘blame culture’ in cybersecurity is escalating.
Tata Consultancy Services has published findings from its TCS Risk & Cybersecurity Study, which reveals that cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations.