| Block SQL Injection Attacks | Blocks SQL statements that do not match an approved allowlist before they are executed | 
    
      | Intrusion Detection | Detect SQL statements that do not match an approved allowlist and alert administrators | 
    
      | Real-time Threat Monitoring | Monitor for out of policy SQL statements in real time | 
    
      | Block Potential Threats | Blocks out of policy SQL statements before they are executed | 
    
      | Allowlist Policy Enforcement | Enforce normal or expected SQL behavior using pre-approved allowlist | 
    
      | Learning | Record approved incoming SQL statements to build allowlist | 
    
      | Logging | All SQL activity is logged so that incoming threats can be tracked and analyzed | 
    
      | Accuracy | Minimize false positives by only allowing approved statements to access your data | 
    
      | Transparent Protection | Requires no changes to your application regardless of development language, framework or 3rd party application | 
    
      | User Level Flexibility | Approved allowlist are built on a per user basis | 
    
      | Real Time Counters | Shows real-time counts of approved and rejected statements | 
    
      | High Performance | Low overhead, instance-based firewall with no additional firewall services to run or maintain | 
    
      | High Availability | Since it runs on each server, no single point of failure when running for many database servers | 
    
      | Scale out | Runs on each server so scales out to maintain performance | 
    
      | Ease of Use | Instance based firewall does not require additional products to configure or administer |