There are with no doubt security mechanism in place to isolate non-global zones from each other as this is actually how zones were implemented by design.
Excerpt from Introduction to Oracle® Solaris Zones
A process assigned to a zone can manipulate, monitor, and directly
communicate with other processes that are assigned to the same zone.
The process cannot perform these functions with processes that are
assigned to other zones in the system or with processes that are not
assigned to a zone. Processes that are assigned to different zones are
only able to communicate through network APIs.
There is no known mechanism I'm aware of for a process running in a ngz, even as root, to access or compromise another zone data unless of course, a communication channel has been purposely put in place, like sharing a folder or communicating through the network. This would be also the case with physically separate servers though.
A ngz might affect another zone performance, even leading to denial of service if both are sharing the same underlying resources like CPU, memory, disk, network, and so on. This can be overcome by dedicating, capping or fairly scheduling these resources.
On the other hand, a process running on the global zone has by default some visibility to every non global zone under it. That's the reason why you generally shouldn't install anything non administrative on the global zone.
You can, in addition to the standard mechanisms, enable mandatory access control with Solaris Trusted Extensions. These extensions use labels to classify zones, files, network, and devices and enforce the requested operations authorization.
Another way to hide what is running inside zones from the global zone is to instantiate them as kernel zones. You'll need Solaris 11.2 or newer for that.
Note that Solaris 10 is eleven years old. You might want to switch to Solaris 11 which has many enhancements. In addition to the previously mentioned kernel zones, you might be interested by Immutable zones which add a new layer of protection against attacks, and by the improvements introduced in Solaris 11 Trusted Extensions.