AWS services span a wide range including com- pute , storage , networking , database , analytics , applications , pute, storage, networking, database, analytics, applications, deployment , management , developer tools , etc .
This may be accomplished in some implementations with an architecture that connects a scan implementations with an architecture that connects a scan- ning service directly to the cloud data storage associated ning service directly to the cloud data storage associated with a target application , in a manner that is intended to be with a target application, in a manner that is intended to be efficiently configured and managed .
In some implementations , the instructions are further executable by implementations, the instructions are further executable by the processor to take an action by setting a protection mode the processor to take an action by setting a protection mode for the file on the cloud storage service .
The threat, no matter how it is categorized, may need to be stopped at various points of a networked com need to be stopped at various points of a networked com- puting environment , such as one of an enterprise facility puting environment, such as one of an enterprise facility 102 , including at one or more laptops , desktops , servers , 102, including at one or more laptops, desktops, servers, gateways , communication ports , handheld or mobile gateways, communication ports, handheld or mobile devices , firewalls , and the like .
This approach may eliminate the inevitable overlaps and gaps in protection caused by treating viruses overlaps and gaps in protection caused by treating viruses and spyware as separate problems , while simultaneously and spyware as separate problems, while simultaneously simplifying administration and minimizing desktop load .