
Detect Embedded Malware in File Shares and Storage Platforms Securing File Shares and Collaboration Workflows for New and Latent Malware Threats
Vendor
ReversingLabs
Company Website

Overview
ReversingLabs Secure File Collaboration protects enterprise file‑share and collaboration workflows by scanning every uploaded file—whether via cloud platforms like AWS S3, Azure, Google Cloud, or local SMB/NFS shares and tools like OneDrive and SharePoint. Files are automatically ingested, analyzed, classified, and isolated into clean/dirty folders using ReversingLabs’ extensive malware/goodware repository and advanced scan engines. This solution defends against embedded malware, safeguards backups during BC/DR operations, and supports retro‑hunting with custom YARA rules—all integrated into existing infrastructure to secure every collaboration point securely.
Features and Capabilities
- Multi‑Source File Ingestion from cloud storage (AWS S3, Azure, GCP), SMB/NFS, OneDrive, SharePoint, and other file‑share endpoints.
- Automated Malware Detection & Classification leveraging ReversingLabs’ threat intelligence repository with billions of samples and proprietary engines.
- Automated File Routing moves files into quarantined “dirty” or trusted “clean” folders based on scan output.
- Backup Protection for BC/DR by continuously scanning backup archives and preventing malicious files from being restored.
- Custom YARA Rules & Retro‑Hunting Support to detect hidden or dormant threats across storage platforms.
- Scalability & Broad File Format Support: analyzes over 4,800 file types and unpacks more than 400 archive formats, with no file size limitation.
- Out‑of‑the‑Box Connectors & Integrations: seamless ingestion from diverse environments, including email, cloud, network shares, and collaboration tools.
- High‑Throughput Cloud Deep Scan for scanning large files (up to 10 GB) in AWS S3, ideal for cloud‑native workloads.
- Continuous Scanning & Alerting: detects and alerts on changes in file repositories to prevent re‑infection and unauthorized modifications.