Best Network Access Control (NAC) Software for Splunk Enterprise

Compare the Top Network Access Control (NAC) Software that integrates with Splunk Enterprise as of December 2025

This a list of Network Access Control (NAC) software that integrates with Splunk Enterprise. Use the filters on the left to add additional filters for products that have integrations with Splunk Enterprise. View the products that work with Splunk Enterprise in the table below.

What is Network Access Control (NAC) Software for Splunk Enterprise?

Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection. Compare and read user reviews of the best Network Access Control (NAC) software for Splunk Enterprise currently available using the table below. This list is updated regularly.

  • 1
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
    Leader badge
    Starting Price: $1499.00/year
    View Software
    Visit Website
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 4
    Auconet BICS
    Strengthen your existing ITOM solutions with synergistic Auconet BICS capabilities. Auconet provides next-generation IT operations management and security through its BICS (Business Infrastructure Control Solution), on a single pane of glass. BICS continuously discovers, secures, manages, and centrally controls every network device, port, and endpoint, in complex, heterogeneous IT or SCADA infrastructures with up to a million or more endpoints. Auconet BICS enables global enterprises to seamlessly and efficiently solve today’s issues with mobile device utilization and BYOD, and tomorrow's challenges with Internet of Everything non-traditional endpoints. Designed for the enterprise, and proven by long-term installations, Auconet is trusted by top-tier Global 1000 firms, including BASF, Siemens, and Deutsche Bahn, as well as hundreds of leading financial institutions. Auconet BICS delivers a fresh, efficient approach to control complex networks.
  • 5
    ThreatBlockr

    ThreatBlockr

    ThreatBlockr

    The only solution that blocks every threat from every path in your network. Networks relying primarily on archaic firewall technology without including other more modern security layers like ThreatBlockr® are easy prey for cybercriminals. Firewalls are easily blinded by encrypted attacks. They’re easily traversed by port forwarding fragmented packet attacks. They’re often misconfigured. They can also get confused by simple extended web and messaging protocols. Side-channel attacks, BYOD, and WFH all compound the problem. Organizations use ThreatBlockr® to gain instant network protection without having to drastically re-engineer their existing security stacks, whether they are on-premise, in the cloud, or both. Fix your security stack by deploying ThreatBlockr® today, and get back to working with the confidence that you’re secure, wherever you are. Enable an ideal protected network while improving firewall efficiency.
  • Previous
  • You're on page 1
  • Next