Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Data Security
Web Security
Filtering
IP Black/White List
Attack Surface Monitoring
Threat Hunting
Threat Blocking
Threat Intelligence
Threat Library
Incident Response & Remediation
Security Awareness Training
Antivirus
Anti-Malware
Anti-Ransomware
Anti-Spyware
Anti-Phishing
Anti-Spam
DDoS Protection
Exfiltration Prevention
Bot Mitigation
Zero Day Mitigation
Data Visualization
Dashboard
Geographical Reporting
Threat Analytics
Website Reputation Analysis
Device Analytics
Behavioral Analytics
Policy Assessments
Traffic Analysis
Threat Modeling
Network Discovery
Network Control
Network Isolation
Network Tunnels
Split Tunneling
Device Discovery
Device Control
Device Isolation
Application Discovery
Application Control
Application Isolation
User Provisioning/Deprovisioning
Role Based Access Control (RBAC)
RADIUS Authentication
Lightweight Directory Access Protocol (LDAP)
Controls Management
Data Indexing
Data Classification
Data Mapping
Threat Alerts
Policy Management
DevOps
DevSecOps
APIs
Artificial Intelligence (AI)
Machine Learning (ML)
Have you used A10 in the past?
Help other people find the right software by sharing your A10 experience.