Achieving results that other's can't match.

Request a demo Calculate your ROI



  • Easy CNAME set up
  • Phone, Chat, Email support
  • Analytics
  • 99.99% uptime SLA


  • Global content delivery network (CDN)
  • Unlimited edge rules
  • Image optimisation with structural similarity analysis (SSIM), auto format conversion and AVIF support
  • Comprehensive Image manipulation application programming interface (API)
  • Minimum Edge Cache Expire of 10 minutes
  • Edge Scripting
  • Content Minification
  • Url Mounting
  • Dynamic Content Caching
  • Advanced Caching features like Cache Tags, Custom Cache Keys, Edge Server Site Includes (ESI)


  • Free dedicated SSL certificate from Lets Encrypt with auto renewal
  • Free bring your own SSL
  • DDoS mitigation
  • Rate Limiting
  • Unlimited Custom Blocklist/Whitelist rules
  • Shared Intelligence Bot Protection
  • Block lists, Bots, Scrapers, Hackers etc
  • Cloud Web Application Firewall (WAF) with OWASP Top 10 and virtual application patching

High Availability

  • Multi origin
  • Origin pools
  • Origin load balancing
  • Serve Stale

Advanced Bot Management Contact Sales

While our basic, shared intelligence-based Bot protection functionality will suit most customers, Peakhour offers custom services tailored for larger or more mission-critical websites. This will deliver more detailed Bot detection, analysis and protection enabling the custom, fine-grained control that such critical infrastructure deserves. The main options include:

  • Site specific analysis - Behavioural Machine learning models tuned specifically for your website
  • Supervised learning for your site - Resources dedicated to your site for traffic analysis and labeling

High Volume or Custom Requirements Contact Sales

Peakhour is pleased to offer a highly flexible service that can be customised to develop an optimal solution to meet your needs in a wide variety of ways. Customisable service options include the following:

  • Custom Infrastructure - Deploy private POPs in your network or on a specific provider
  • Access log exporting
  • Custom Integration - Get expert assistance in customising your application for maximum performance and security.
  • Dedicated IP addresses
  • Network interconnects
  • Custom authentication at the edge
  • Prioritised support
  • Custom Features