• 跳到主要導覽
  • 跳到主要內容
  • 跳到頁尾
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
平台
解决方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用

曝險管理

使用單一平台管理網路風險,尋找、排定優先順序並消除所有攻擊破綻中的曝險。
瞭解更多資訊
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導階層
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
求職
參與和包容
Exposure Management Leadership Council
平台
解決方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用
曝險管理
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導團隊
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
職業生涯
參與和包容
Exposure Management Leadership Council
  • 客戶群
  • Fukuoka Hibiki Shinkin Bank
案例研究

Fukuoka Hibiki Shinkin Bank Logo Fukuoka Hibiki Shinkin Bank


Tenable Identity Exposure was chosen as the only agentless solution that configures and continuously monitors Active Directory, reducing costs. Paired with Tenable Cloud Security, it also enforces strong protection across cloud services.

下載案例研究
使用的主要產品

Tenable Identity Exposure


身分安全態勢管理 (ISPM) 的基礎解決方案

強化您的安全態勢並防禦身分管理型攻擊。

Explore this product Request a demo
Employees: 530
Branches: 41 (including one agency branch)
產業別: Financial

Fukuoka Hibiki Shinkin Bank deploys Tenable Identity Exposure to view and eliminate Active Directory risks and improve its cloud security

Benefits of Tenable Adoption

  • Improved visualization of Active Directory
  • Organization of dormant accounts and ease of configuration management and control

Interviewees

Fukuoka Hibiki Shinkin Bank:

Mr. Atsushi Yoshida, Executive Officer, General Manager of Systems Department & Head of DX Promotion Office
Mr. Masayuki Miyaji, Senior Analyst, Systems Department

Concern over misconfiguration risks in Active Directory

Q: Can you tell us about your cybersecurity program at Fukuoka Hibiki Shinkin Bank? For example, do you implement your program according to the Guideline for Cybersecurity in the Financial Sector, as set out by the Ministry of Finance in October 2024?

Mr. Yoshida: We were already working on cyber hygiene as an important aspect of cybersecurity before the Ministry of Finance’s guideline was published. As we are entrusted with our customers’ assets, we consider maintaining cyber hygiene to be a prerequisite for our operation. Especially with many customers using our online services, IT security is important to protect our network, cloud environment and identity. We have also been referring to the guideline since its publication in order to implement our security measures.

Q: Can you tell us how you came to adopt Tenable Identity Exposure? What were the challenges you wished to resolve?

Mr. Yoshida: As we configured Active Directory ourselves, we had some concerns about potential vulnerabilities and misconfiguration. We had penetration tests done, but only once a year, so we felt there was a need to increase its frequency. There was a case in the past, where one of the tests flagged a configuration issue in Active Directory. Human errors are inevitable, so we also need to take steps to prevent misconfiguration.

Q: What kind of risks did you think you would be exposed to if those challenges were left unaddressed?

Mr. Yoshida: As attackers target financial institutions to achieve various objectives, we understood that if those challenges were left unaddressed we would be at risk of being breached. Once our network is compromised, ransomware could be introduced, which could lead to huge damage such as data breach and even our system being completely hijacked. This was a serious challenge, as it would affect our reputation as a financial institution.

Build and operation capabilities were available in-house, which enabled independent deployment

Q: As you selected a solution to resolve those challenges, what requirements did you set?

Mr. Yoshida: We always look for the very latest security products. When we felt we needed to protect Active Directory, one of the system integrators associated with Tenable suggested Tenable Identity Exposure as an effective tool for the purpose.

Q: The Ministry of Finance’s guideline also states that steps should be taken to protect Active Directory. Was it your intention to adhere to the guideline?

Mr. Yoshida: We had already set a policy for securing Active Directory before the guideline was published. Its publication and the decision to adopt Tenable happened almost simultaneously, which was good timing. We might be diligent in applying patches like Windows Update, but if security issues were present in the configuration, Active Directory could be taken over by an attacker. So we were aware that some kind of measure was necessary in order to meet the requirements of the Ministry of Finance’s guideline.

Q: So a Tenable product was suggested; what was the key factor that made you decide to go for Tenable Identity Exposure?

Mr. Yoshida: The biggest reason was that Tenable was the only product that could configure and continuously monitor Active Directory. Furthermore, the product is agentless, which was an advantage in reducing deployment and management costs. We also purchased Tenable Cloud Security together with Tenable Identity Exposure to enforce security for our cloud services. Therefore we have in our sight that in future we may leverage Tenable One, to manage everything centrally from a cyber exposure management platform.

Q: Did your deployment go smoothly with Tenable Identity Exposure?

Mr. Miyaji: Yes, its deployment was simple. Build and configuration tasks were completed in one day. We basically manage system build and operation management in-house, so we had our own team to deploy the product. I imagine that if we had introduced a similar product from a different company, it would have taken at least a month, with the necessary PoC, discussions, etc., in the course of deployment.

Q: I understand that you have been making efforts to establish in-house capabilities for some time. These days there are many organizations who employ external managed service providers; can you tell me the reason why you think in-house capabilities are important?

Mr. Yoshida: You could say that it’s a kind of corporate culture. We have a history of doing everything in-house, from computer configuration to system development. As that is the way we generally do things, we have some resistance to outsourcing. Our teams have a thorough knowledge of our network and security, so outsourcing introduces an element of uncertainty that detailed development and operation may become invisible to us.

Q: Setting and fine-tuning the system after deployment; did that go without any problem?

Mr. Miyaji: It was easy anyways, but as we attended the hands-on seminar for Tenable Identity Exposure, we were able to build the system without a hitch.

Q: What was that seminar like? Any requests?

Mr. Miyaji: It was very detailed and easy to follow. We attended it almost at the same time as the product was being deployed. We were able to get detailed explanations of Active Directory security with demonstrations. However, the product has numerous functions, with a wide range of findings it can detect, such that a few hours were not enough. It would have been even better if the seminar had been expanded to cover all aspects, over several sessions, if that was at all possible.

Approximately 200 dormant accounts were found, configuration checks were simple to do

Q: What are the benefits of having Tenable? What changes have you noticed before and after deployment?

Mr. Miyaji: We are now able to look at the dashboard and find risky situations in an instant. For example, we were able to visualize dormant accounts which we were not aware of before. As our system has been in use for nearly twenty years, we found approximately 200 dormant accounts on the Tenable Identity Exposure console, and we were able to delete unnecessary accounts immediately. We were also able to monitor changes in objects in real time, for example, with group policy settings. We did have security measures for Active Directory before, but with the deployment of Tenable, we are now able to use quantifiable scores to visualize its security level overall, which I believe contributes immensely toward reducing security risk.

Q: Do you have any concerns or anything you are unhappy with?

Mr. Miyaji: I have nothing major that I am dissatisfied with. I suppose that, while system admins like myself and our team can see from the console that the right configurations are in place, for management, a reporting function with an easy-to-understand format will make it even better.

Q: What is the console like? Is it easy to use?

Mr. Miyaji: The console is localized, intuitive and very user-friendly. In addition, threats are ranked according to their severity, which makes it easy to determine which should be dealt with as a priority. This has improved our operational efficiency.

Q: Can you tell us about your future plans for security and human resources?

Mr. Miyaji: There is no end to the provision of cybersecurity. As new attack vectors emerge in rapid succession, we hope to equip our organization with the latest countermeasures that are suitable for us. Therefore, although the fundamental policy and framework for security remain unchanged, we ensure that we are always flexible. In terms of human resources, for example, where we have a team of three at the moment, we will need to increase our headcount, and I hope to train newcomers in-house, mainly, with the help of our partners.

Q: You told me you have decided to deploy Tenable Cloud Security. What benefits do you expect to get from the product?

Mr. Yoshida: As we scale up the use of cloud resources, I believe the product will be useful in managing risk in the cloud. At present, we use mainly Microsoft 365, but we are exploring the use of Microsoft Azure, AWS and Salesforce. We hope to be able to visualize what is going on in the cloud and eliminate misconfigurations caused by human error, as well as secure our workloads, identities, data and more. It will be most helpful if you could share your advice for best practice.

返回頂端

  • Tenable Identity Exposure

相關的客戶案例研究

Hokkoku Bank (北國銀行)


閱讀案例研究

Snoop


閱讀案例研究

Demyst


閱讀案例研究

探索所有案例研究 ›

解決曝險,洞察先機。

合作夥伴

  • 成為合作夥伴
  • 尋找合作夥伴
  • 合作夥伴入口網站
  • 合作夥伴計劃

資源

  • 服務
  • 技術支援
  • 訓練與認證
  • 產品說明文件
  • 客戶社群
  • Tenable Trust

公司

  • 關於我們
  • 管理團隊
  • 新聞中心
  • 投資者關係

交流聯繫

  • 與我們聯絡
  • 試用我們的產品
  • 和業務人員聊聊
  • 與我們在活動中相見
  • 加入我們
  • 隱私權政策
  • 請勿販售/分享我的個人資訊
  • 法規
  • 508 合規性

© 2026 Tenable®, Inc. 保留所有權利

Tenable One

申請示範

以 AI 技術為後盾的全球領先曝險管理平台。

感謝您

感謝您對 Tenable One 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

申請示範

利用可據以行動的雲端安全平台消除雲端曝險。

感謝您

感謝您對 Tenable One Cloud Exposure 感興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

申請示範

根據對貴公司的風險發現並安排弱點的優先順序。內部部署管理。

感謝您

感謝您對 Tenable Security Center 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

申請示範

利用自動化簡化安全團隊與 IT 團隊的合作,並縮短平均修復時間。

感謝您

感謝您對 Tenable Patch Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

申請示範

洞悉、辨識並消除 IT 與容器弱點。

感謝您

感謝您對 Tenable Enclave Security 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

申請示範

全盤掌握所有與網際網路連線的資產,藉此消除盲點和不明的風險來源。

感謝您

感謝您對 Tenable One Attack Surface Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

申請示範

洞悉、保護與管理貴公司團隊使用 AI 平台的方式。

感謝您

感謝您對 Tenable One AI Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

申請示範

針對融合式 OT/IT 環境利用統一的安全解決方案消除 OT 曝險。

感謝您

感謝您對 Tenable One OT Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

申請示範

利用適用於身分智慧型企業的重要解決方案來消除身分曝險。

感謝您

感謝您對 Tenable One Identity Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

為什麼要選擇 Tenable

參閱 Tenable 實際應用案例

想瞭解 Tenable 如何協助您的團隊發現並修復危及業務的關鍵網路弱點嗎? 請填寫此表單以取得客製化報價或示範。

感謝訂閱!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

瞭解 Tenable 如何協助達成 SLCGP 網路安全計畫要求

Tenable 解決方案能協助您滿足 SLCGP 的所有要求。與 Tenable 代表人員聯絡,以便深入瞭解。representative to learn more.

感謝您

您應該很快就會收到一封確認電子郵件,我們的一位業務開發代表將會與您聯繫。如有任何問題,請發送電子郵件至:[email protected]。

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

訂閱

您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

感謝訂閱!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

免費試用

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用軟體也包含 Tenable Web App Scanning。


立即購買

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。


資產數量

100

選擇您的訂閱方案

立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Vulnerability Management 感興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

免費試用

試用 Tenable Web App Scanning

享受完整存取我們專為新型應用程式所設計、屬於 Tenable One 曝險管理平台一部分的最新 Web 應用程式掃描產品。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

您的 Tenable Web App Scanning 試用軟體也包含 Tenable Vulnerability Management。

立即購買

購買 Tenable Web App Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

FQDN

5
$3,578
立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Web App Scanning 感興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

免費試用

免費試用 Tenable Nessus Professional

Tenable Nessus 是目前市場上最全方位的弱點掃描器。請填妥以下表單以繼續 Nessus Pro 試用。

立即購買

購買 Tenable Nessus Professional

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

*價格包含增值稅。

免費試用

免費試用 Tenable Nessus Expert

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

您已經有 Tenable Nessus Professional 了嗎? 升級至 Nessus Expert,免費試用 7 天。

立即購買

購買 Nessus Expert


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

利用 Nessus Pro 的進階支援,貴公司的團隊可 365 天全年無休 24 小時全天候使用電話、社群以及對談支援。此種進階等級的技術支援可確保加速應變與解決問題。

進階支援方案特色

電話支援

電話支援全年 365 天、全天候 24 小時無休,最多可提供十 (10) 位指定的支援聯絡人。

對談支援

對話支援也可提供指定的支援聯絡人使用,您可透過 Tenable Community 7 天 24 小時全年無休取得此支援服務。

Tenable Community 支援入口網站

所有指定的支援聯絡人都可在 Tenable Community 內提交支援案件。使用者也可以存取知識庫、文件集、授權資訊、技術支援編號等;利用即時對談向社群發問,然後從其他社群成員的回答中得知秘訣與技巧。

初次回應時間

P1-重大:< 2 小時
P2-高度:< 4 小時
P3-中度:< 12 小時
P4-提供資訊說明:< 24 小時

支援聯絡人

支援聯絡人需對於資訊技術、向 Tenable 購買的軟體具備一定的專精程度,同時也熟悉該軟體所監控的客戶資源。支援聯絡人必須會說英語並能以英語提出支援請求。支援聯絡人必須在合理範圍內向 Tenable 提供其詢問的資訊,以便 Tenable 重現錯誤或解決請求支援的問題。