Our digital experience management platform provides amazing levels of performance, but none of that matters if users can't access your site or application due to a denial of service attack. As the number of DDoS attacks on the internet continues to rise dramatically along with their size and frequency, Instart stands strong as a shield in front of your backend infrastructure.
Our globally-distributed network with massive connectivity, leveraging next generation anycast networking, ensures that a site stays up and running, servicing legitimate users during an attack. This allows us to continue our mission of providing our customers the fastest, most advanced application delivery and streaming service in the world.
Here's how DDoS protection works:
The global Instart service sits in front of your origin web server infrastructure, providing full termination of TCP, HTTP, and HTTPS traffic. This isolates your systems from the raw elements of the internet and allows our massive globally distributed network to absorb traffic and attacks.
Next, at the core of the Instart service is a robust, globally distributed network. Our delivery locations are provisioned with dedicated connectivity from a large number of tier 1 service providers. Using that network capacity, our customer's traffic is distributed across our expansive network of servers, routers, and load balancers. This globally distributed network is architected around next-generation IP anycast technology. By using anycast routing, traffic is automatically routed to the closest location. This enables us to disperse, absorb, and drop much larger volumes of traffic than might otherwise be possible with older unicast architectures.
Finally, standing behind the Instart service is a world-class operations and support team that monitors and supports our service around the clock. These teams keep a careful eye out for any security-related activity. Along with normal operating procedures, standardized procedures for security incident response have been created, whether detected by Instart or reported by one of our customers.
In addition, we have relationships in place with our network providers in case upstream coordination is necessary to block malicious traffic or take other measures to ensure service availability for our customers. And, of course, our service provides a robust set of controls that allows us to block or throttle malicious IPs and clients.
The prerequisite for our DDoS protection to apply is that the DDoS must be directed at the customer via our network. For example at the DNS name for the customer's site, or the IP address published by Instart or the customer's DNS provider. If the DDoS attack is directed specifically at the customer's origin IP address and that address is directly accessible from the public internet, Instart will not be in a position to offer protection.
Customers can enhance their ability to block such attacks by only permitting Instart IP addresses to access their origin directly. See Origin Cloaking for details.