Administrator's Guide

B Other Security Products
This appendix includes additional security products available for HP-UX, for the following
three security categories:
“Protecting Systems” (page 199)
“Protecting Data” (page 200)
“Protecting Identity” (page 203)
You can download these products for free from the HP Software Depot at:
http://www.hp.com/go/softwaredepot
B.1 Protecting Systems
In addition to the security products that are discussed in Part I Protecting Systems, the
following security products offer additional system protection.
B.1.1 HP-UX Bastille
HP-UX Bastille is a system hardening and reporting program that enhances the security
of the HP-UX operating system by consolidating essential hardening and lock-down
checklists from industry and government security organizations, and making them
accessible to administrators in an easy to use package.
For more information, see the HP-UX Bastille documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX Bastille Software.
B.1.2 HP-UX HIDS
HP-UX Host Intrusion Detection System (HIDS) enables security administrators to proactively
monitor, detect, and respond to attacks within a network, as follows:
Protects against both existing attack scenarios and against some as of yet unknown
scenarios. It seeks out patterns that might suggest security breaches or misuses by
examining information about system activity from a variety of data sources. Such
illicit activities might include: a hacker attempting to break into or disrupt your system,
subversive "insider" activities, or someone trying to spread a virus
Detects product enhances local host-level security within your network. It automatically
monitors each configured host system within the network for possible signs of
unwanted and potentially damaging intrusions. If unchecked it can lead to the loss
of availability of key systems or can compromise system integrity. HP-UX HIDS
generate alerts for many types of exploits.
Provides continuous protection against both existing attack scenarios and unknown
scenarios unlike other intrusion detection systems. It detects intrusions by using
detection templates. Detection templates are the building blocks used to identify the
B.1 Protecting Systems 199