Best Zero Trust Security Software for Splunk Enterprise

Compare the Top Zero Trust Security Software that integrates with Splunk Enterprise as of July 2025

This a list of Zero Trust Security software that integrates with Splunk Enterprise. Use the filters on the left to add additional filters for products that have integrations with Splunk Enterprise. View the products that work with Splunk Enterprise in the table below.

What is Zero Trust Security Software for Splunk Enterprise?

Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats. Compare and read user reviews of the best Zero Trust Security software for Splunk Enterprise currently available using the table below. This list is updated regularly.

  • 1
    Google Chrome Enterprise
    Google Chrome Enterprise supports Zero Trust security frameworks by enforcing continuous verification of users, devices, and network contexts before granting access to web applications. It integrates with identity providers and supports multi-factor authentication and conditional access policies. Chrome’s secure browsing environment ensures that only authenticated and authorized users access enterprise resources, minimizing the attack surface and reducing lateral movement risks. This approach aligns with modern security strategies focused on strict access control and least privilege. Its compatibility with leading Zero Trust platforms allows seamless integration into broader enterprise security ecosystems. Chrome Enterprise helps organizations implement Zero Trust principles without disrupting user workflows.
    Starting Price: Free
    View Software
    Visit Website
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 4
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 5
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 6
    ZTX Platform

    ZTX Platform

    SecureTrust Cyber

    The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. Each user session is isolated via encrypted tunnels, preventing lateral movement and ensuring compliance. Ideal for companies seeking simplified, high-performance cybersecurity without managing multiple tools.
    Starting Price: $30/month per device
  • Previous
  • You're on page 1
  • Next