Yes. The Instart service can absorb and block large amounts of malicious traffic by leveraging a combination of architecture, scale, and – when required – security operations team interventions.
Large-scale DDoS or DoS attacks are not generally built to attack distributed service provider networks, but rather individual organizations hosting websites or web applications. These smaller entities typically have limited active traffic management and filtering capabilities. By comparison, Instart has built a globally-distributed service with its own autonomous network, allowing us to independently make sophisticated IP routing changes when necessary.
In addition to the robustness provided by our service’s global scale, our Anycast-based network architecture allows us to efficiently distribute large amounts of attack traffic across a worldwide network – something a typical organization cannot do on its own.
Our system contain a set of always-on protection to scrub and block DDoS attacks at both the network layer (3/4) and the application layer (7).
On an as-needed basis, we can also work with our upstream providers to block and isolate attack traffic to ensure we continue servicing legitimate requests during an attack. Processes and procedures are in place so that our operations team can respond swiftly in the event intervention or coordination with upstream providers becomes necessary.
This means that by deploying the Instart service in front of a website or API, even the largest DDoS attacks seen can be blocked.