What is Gladius?
Next-Generation, Decentralized DDoS mitigation, CDN, and WAF services
We cover all the bases
Gladius also fits well within current network implementations using a myriad of deployment options because…
Gladius is a software solution.
Deployed on bare metal, VMs, or containers (docker, ECS, OpenShift) in almost any environment, Gladius is designed to be modular, giving pool operators maximum flexibility when designing their network and deploying nodes. Gladius uses blockchain technology to fortify authentication/authorization of nodes and content
Gladius works like traditional CDN and WAF solutions, but puts control back into the hands of the network operators and gives Everyday users a chance to participate in the solution.
Why make another CDN/WAF/DDoS solution?
Current solutions are centralized
Pool infrastructure can be decentralized to cover large geographic areas or specific industries.
One way transactions
Pool operators can pay everyday users for their bandwidth, lowering their overhead and spreading out the responsibility of serving up content across a large pool of trustless nodes.
DDoS protection is overpriced
Why does DDoS protection cost so much from everyone else? Pools with sufficient edge nodes can mitigate attacks without costly hardware or expensive contracts from cloud DDoS providers.
WAF is too difficult to maintain in the cloud
All or none seems to be the only options available to web clients. Why not give websites more control and allow them to implement new rules to cater to their specific applications.
Can not utilize excess capacity
Imagine a world where all the space bandwidth capacity is used to protect websites from DDoS attacks while providing Layer 7 protections. Gladius makes this possible.
Blockchain enables nodes in a deployment to trustlessly verify the origin of any message in the network. Transaction details are now stored on an open ledger using smart contracts enabling a wide array of possibilities. Basically a simplified and verifiable accounting solution, potentially across multiple parties. In this case, CDN and DDoS mitigation