Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Endpoint Detection and Response (EDR)
Threat Hunting
Incident Response & Remediation
User Provisioning/Deprovisioning
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
Passwordless Authentication
Contextual Authentication
Clientless Access
Secrets Management
System for Cross-domain Identity Management (SCIM)