Peakhour Security Overview¶
Peakhour provides a comprehensive, multi-layered security platform to protect your applications from a wide range of threats. The security dashboard enables you to configure, monitor, and respond to security events in real-time.
Core Security Features¶
Web Application Firewall (WAF)¶
Protect your applications from common web exploits like SQL injection and Cross-Site Scripting (XSS) with our enterprise-grade WAF, powered by ModSecurity and the OWASP Core Rule Set. - How to Create WAF Custom Rules - Understanding Virtual Patching
Firewall Rules & Access Lists¶
Create granular access control policies using our powerful Wirefilter rule engine. Block or allow traffic based on IP, country, ASN, user agent, and more. - Understanding Access Lists - IP Reputation Lists
Bot Protection¶
Intelligently distinguish between good bots (like search engines) and malicious bots (like scrapers and scanners) using JavaScript challenges and behavioral analysis.
Rate Limiting¶
Protect your applications from DDoS attacks, brute-force attempts, and other forms of abuse by controlling the rate of incoming requests.
API Security¶
Discover, monitor, and protect your API endpoints with features like schema validation, endpoint discovery, and API-specific security rules. - How to Protect APIs
Monitoring and Response¶
Firewall Events¶
View and analyze all security events in a centralized dashboard. Drill down into specific incidents, understand attack vectors, and fine-tune your security policies. - How to Investigate Firewall Events
By using the Peakhour Security Dashboard, you can implement a comprehensive security strategy that provides maximum protection against both known and emerging threats.