Peakhour Documentation

Configure, secure,
optimise, automate,
and document
the edge.

Route applications through Peakhour,
apply policy and tune image delivery,
then keep evidence close to implementation.

Connected documentation workflow showing configuration, security, optimisation, automation, and evidence steps.

Everything you need to secure and optimize your applications

🛡️

Advanced Security

Multi-layered protection with WAF, bot detection, DDoS mitigation, and zero-trust access control.

Learn about Security

Global Performance

Accelerate your applications with intelligent caching, image optimization, and global CDN.

Optimize Performance
📊

Deep Analytics

Real-time insights into security events, performance metrics, and user behavior patterns.

Explore Analytics
⚙️

Powerful Automation

Flexible rules engine, APIs, and integrations for DevOps and infrastructure-as-code workflows.

View APIs & Rules
🔐

Zero Trust Access

Modern identity-aware access control for applications, APIs, and internal resources.

Setup Zero Trust
🔍

Advanced Logging

Comprehensive logging with advanced querying, alerting, and SIEM integrations.

Query Logs

🚀 Get Started in Minutes

New to Peakhour? Follow our step-by-step guides to get your first application secured and accelerated.

1

Quick Setup

Point your domain to Peakhour and configure basic security

First Steps
2

Security Policies

Create your first firewall rule and protect against threats

First Firewall Rule
3

Performance Optimization

Configure caching and content optimization for faster loading

Cache Automation

💬 Need Help?

Our documentation is designed to be comprehensive and easy to follow. If you need additional assistance:

Contact Support Browse All Guides