Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

AVG Releases Free AntiVirus Bundle for Amazon EC2 Cloud Servers

AVG Enables Increased Secure Cloud Experience for Amazon EC2 Users

AVG Enables Increased Secure Cloud Experience for Amazon EC2 Users

Internet security firm AVG Technologies, today announced availability of a preconfigured Anti-virus technology bundle for Amazon Web Services EC2 users. Available for free, the Amazon Machine Image (AMI) can be found on the Amazon Web Services Community AMIs list.

Antivirus for Amazon Cloud ServersAVG’s AMI consists of a hardened Debian Linux operating system with AVG’s pre-configured Anti-virus technology. AVG says the solution can be launched and ready for use as quickly as any other instance on Amazon EC2.

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud, designed to make scaling easier for developers.

Designed for Web sites which enable user generated content to be submitted, AVG’s solution focuses on scanning submitted files for malware. AVG says the service is also ideal for companies using EC2 to perform a wide range of online activities involving files storage, supplier or partner communications.

“For many businesses operating online, security is vital. Allowing users to upload content not only puts the site itself at risk from harmful files, it could also cause the site to become a distributor of malware itself, in turn infecting its own users,” said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. “With our free Anti-Virus for EC2, server operators benefit from our Community-Powered-Protection at no cost.”

This service, targeted at small and medium sized businesses, is part of AVG’s SMB program.

The relevant AMIs are ready to deploy and can be found in the Amazon directory under:

us-east: ami-94758dfd

Advertisement. Scroll to continue reading.

us-west: ami-7d4c1e38

eu-west: ami-7818290c

ap-southeast: ami-d0750d82

ap-northeast: ami-8e309a8f

Instructions on how to setup the EC2 environment and run AVG are available here.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.