Skip to content

Peakhour Security Overview

Peakhour provides a comprehensive, multi-layered security platform to protect your applications from a wide range of threats. The security dashboard enables you to configure, monitor, and respond to security events in real-time.

Core Security Features

Web Application Firewall (WAF)

Protect your applications from common web exploits like SQL injection and Cross-Site Scripting (XSS) with our enterprise-grade WAF, powered by ModSecurity and the OWASP Core Rule Set. - How to Create WAF Custom Rules - Understanding Virtual Patching

Firewall Rules & Access Lists

Create granular access control policies using our powerful Wirefilter rule engine. Block or allow traffic based on IP, country, ASN, user agent, and more. - Understanding Access Lists - IP Reputation Lists

Bot Protection

Intelligently distinguish between good bots (like search engines) and malicious bots (like scrapers and scanners) using JavaScript challenges and behavioral analysis.

Rate Limiting

Protect your applications from DDoS attacks, brute-force attempts, and other forms of abuse by controlling the rate of incoming requests.

API Security

Discover, monitor, and protect your API endpoints with features like schema validation, endpoint discovery, and API-specific security rules. - How to Protect APIs

Monitoring and Response

Firewall Events

View and analyze all security events in a centralized dashboard. Drill down into specific incidents, understand attack vectors, and fine-tune your security policies. - How to Investigate Firewall Events

By using the Peakhour Security Dashboard, you can implement a comprehensive security strategy that provides maximum protection against both known and emerging threats.