Governed Request Path

How Peakhour works

Peakhour evaluates TLS, bot signals, WAAP and API policy, rate limits, cache, image optimisation, logs, routing, and origin delivery in one governed path.

Compact Peakhour governed request path showing users, decision plane, origins, cache, and evidence stream.

Application Security at the Edge

Peakhour can operate as your full edge or sit beside an existing CDN, adding WAAP, bot, rate-limit, cache, TLS, log, and observability decisions to the request path.

Governed Edge Architecture

Peakhour places one governed decision plane in front of your applications. The edge terminates TLS, evaluates bot and WAAP/API signals, applies rate limits, chooses cache or optimisation paths, records evidence, and routes clean traffic to the right origin service.
Governed Peakhour edge architecture showing users, TLS, security controls, cache and image optimisation, logging, routing, and protected origins

Two deployment modes for the application edge

Peakhour supports two first-class architecture paths: Peakhour Edge, where Peakhour is the full application edge, and Existing Edge + Peakhour, where your current edge or CDN stays in place while Peakhour adds decisions, risk signals, evidence, and observability.

Compare deployment modes
Full edge platform

Peakhour Edge

Peakhour handles edge delivery, inspection, acceleration, caching, traffic routing, DDoS resilience, logs, and observability before requests reach origin.

WAAP Bots Rate limits Traffic Images DDoS Cache Logs Observability
Keep your current edge

Existing Edge + Peakhour

Your existing edge or CDN remains in the request path while Peakhour adds intelligence, risk signals, policy decisions, enriched log context, and observability.

WAAP Bots Rate limits Traffic Images DDoS Cache Logs Observability
One control vocabulary The same Peakhour capabilities map to both paths, so deployment choice does not change the buyer-facing product story.
Evidence follows the request Peakhour decisions can feed logs and dashboards whether Peakhour is the edge or an intelligence layer beside it.

Traditional Application Architecture

Without an Application Security Platform, requests flow directly from users to your applications. This exposes your infrastructure to DDoS attacks, bot traffic, credential stuffing, API abuse, and other security threats. Your servers must handle all traffic processing, authentication validation, and threat detection.
Direct-to-origin application architecture showing unfiltered traffic, bot traffic, API abuse, and origin overload risk

Peakhour Application Security Platform

With Peakhour, our intelligent security platform intercepts all requests before they reach your applications. We provide comprehensive threat detection, API protection, account security, and performance optimisation. Only legitimate, verified traffic reaches your infrastructure.
Peakhour edge decision path showing traffic inspection, policy decisions, evidence logging, and clean origin delivery

Global Edge Security Network

Peakhour deploys security processing across our global edge network. Each location provides real-time threat detection, API protection, and intelligent traffic filtering. This distributed architecture ensures low-latency security decisions and protection against large-scale attacks.
Global Peakhour edge map showing regional inspection points, anycast routing, logging streams, and origin failover

Multi-layer Security Processing

Every request passes through our comprehensive security pipeline, designed for modern application protection.

Intelligent Security Pipeline

When we process a request, our Application Security Platform provides:
  1. 1
    TLS Encryption & Protocol Security - Advanced TLS/SSL with modern cipher suites and HSTS enforcement
  2. 2
    Threat Detection & Bot Management - AI-powered bot detection with behavioural analysis and residential proxy identification
  3. 3
    Application Firewall & API Protection - Next-generation WAF with API security and OWASP Top 10 protection
  4. 4
    Rate Limiting & DDoS Protection - Intelligent rate limiting with contextual analysis and automatic scaling
  5. 5
  6. 6
    Logging, Routing & Origin Delivery - Request evidence is written to logs and clean traffic is routed to healthy origin services with delivery context intact
Request processing ladder showing TLS, bot detection, WAAP and API protection, rate limiting, caching and image optimisation, logging, routing, and origin delivery

Global CDN & Performance Optimisation

Global Edge Caching

Intelligent caching across our global network reduces latency and improves user experience worldwide.

Image Transformation

Automatic WebP/AVIF conversion, resizing, and compression optimised for each device and browser.

Dynamic Content Caching

Intelligent caching of personalised and dynamic content while maintaining security and freshness.

Content Optimisation

Automatic minification, compression, and modern format delivery for CSS, JavaScript, and HTML.

Enterprise CDN & Content Delivery

Peakhour's integrated CDN provides comprehensive content delivery and optimisation capabilities:

Global Edge Network

  • Anycast routing - Automatic routing to the closest edge location
  • Multi-tier caching - Optimised cache hierarchy for maximum performance
  • Origin shield - Reduces origin load and improves cache hit ratios
  • Failover protection - Automatic failover to healthy edge locations

Advanced Image Processing

  • Format conversion - Automatic WebP, AVIF, and JPEG XL delivery
  • Device optimisation - Responsive images sized for each device
  • Quality adjustment - Intelligent compression based on content analysis
  • Real-time processing - On-demand transformations with edge caching

Content Optimisation Engine

  • Minification - Automatic HTML, CSS, and JavaScript compression
  • Brotli compression - Advanced compression for faster delivery
  • Resource bundling - Intelligent combining of CSS and JS files
  • Critical CSS extraction - Above-the-fold CSS optimisation
CDN optimisation diagram showing edge cache, image transformation, compression, origin shield, and cache evidence

Advanced Security Capabilities

Real-time Threat Detection

AI-powered threat detection identifies sophisticated attacks including credential stuffing, API abuse, and advanced bot networks in real-time.

API Security & Protection

API protection with rate limits, authentication checks, schema validation, and data leak prevention for REST and GraphQL routes.

DevSecOps Integration

Native integration with CI/CD pipelines, infrastructure as code, and security automation workflows for DevSecOps teams.

Deployment Paths and Controls

Peakhour's Application Security Platform attaches policy, routing, and evidence controls to your edge path without requiring application rewrites. Support for:
  • DNS-based deployment - Simple DNS changes activate protection
  • API-first architecture - RESTful APIs for automation and integration
  • Multi-cloud compatibility - Works with AWS, Azure, GCP, and hybrid environments
  • Container & Kubernetes - Native support for containerised applications
  • CDN integration - Compatible with existing CDN configurations
  • Monitoring & observability - Rich metrics and alerting for security teams
Peakhour integration diagram showing DNS deployment, APIs, cloud and Kubernetes origins, CDN compatibility, monitoring, and observability

Ready to Secure Your Applications?

Get a demo and see how Peakhour can secure your applications.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.