Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Data Security
Cloud Security
Web Security
Email Security
Gateway Security
Server Security
Workload Security
Runtime Security
Endpoint Detection and Response (EDR)
Managed Detection and Response (MDR)
Firewall
Threat Hunting
Threat Blocking
Threat Intelligence
Threat Library
Incident Response & Remediation
Cloud Access Security Broker (CASB)
Secure Access Service Edge (SASE)
Antivirus
Anti-Malware
Anti-Ransomware
Anti-Spyware
Anti-Phishing
Anti-Spam
DDoS Protection
Exfiltration Prevention
Zero Trust Network Access (ZTNA)
Network Performance Monitoring (NPM)
Infrastructure Monitoring
Audit Trail
Vulnerability Assessments
Dashboard
Daily Summary
Threat Analytics
Risk Assessments
Behavioral Analytics
Policy Assessments
VPN Assessments
Threat Scoring
Fraud Detection
Device Discovery
Device Control
Bring Your Own Device (BYOD)
Network Discovery
Network Control
Network Isolation
Network Traffic Control (NTC)
Virtual Private Network (VPN)
Policy Management
Centralized Console
Segmentation/Grouping
Sandbox
Application Control
Role Based Access Control (RBAC)
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
Security Alerts
Threat Alerts
Automated Onboarding
APIs
Salesforce
Box
Dropbox
Hyper-V
VMware
Okta
AWS
Google Cloud
OneLogin
Azure
Gmail
Google Drive
Duo
Microsoft OneDrive
Machine Learning (ML)
Device Limit
Have you used SonicWall in the past?
Help other people find the right software by sharing your SonicWall experience.