• 跳到主要導覽
  • 跳到主要內容
  • 跳到頁尾
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
平台
解决方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用

曝險管理

使用單一平台管理網路風險,尋找、排定優先順序並消除所有攻擊破綻中的曝險。
瞭解更多資訊
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導階層
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
求職
參與和包容
Exposure Management Leadership Council
平台
解決方案
為什麼要選擇 Tenable
資源
公司
定價方式
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable 產品登入
社群與支援
購買 試用
曝險管理
AI 安全
雲端安全
OT 安全
弱點管理
Hexa AI
身分安全
修補程式管理
攻擊破綻管理
Web 應用程式掃描
安全工具連接器

檢視所有產品

依使用案例探索

安全 AI
安全 OT/IoT
曝險管理
雲端安全
合規性
弱點管理
資產庫
高安全性環境
安全資料中心
零信任

依產業探索

金融服務
能源
醫療保健
科技
教育
政府國防
零售
為什麼要選擇 Tenable
業界肯定
客戶案例
Tenable 與競爭對手的比較
報告
Tenable 為何是曝險管理領域的絕對領導者
瞭解原因
資源庫
曝險管理資源
部落格
研究中心
訓練與認證
網路安全指南
客戶案例
尋找合作夥伴
資源

曝險管理
資源中心

以實用的資源和工具加速您的曝險管理策略。
探索
關於 Tenable
領導團隊
投資人關係
Tenable 投資項目
獎項與肯定
媒體室
職業生涯
參與和包容
Exposure Management Leadership Council
  • 客戶群
  • Hokkoku Bank (北國銀行)
案例研究

Hokkoku Bank Hokkoku Bank, Ltd. logo


The most significant change—and the greatest benefit—since implementing Tenable Identity Exposure has been the visualization of our Active Directory security posture.

下載案例研究
使用的主要產品

Tenable Identity Exposure


身分安全態勢管理 (ISPM) 的基礎解決方案

強化您的安全態勢並防禦身分管理型攻擊。

Explore this product Request a demo
Capital: 26,673 million JPY
Employees: 1,533
No. of branches: 104 (including 1 sub-branch)
產業別: Financial

Hokkoku Bank shares its proactive security strategy and vision powered by Tenable

Headquartered in Kanazawa, Ishikawa Prefecture, The Hokkoku Bank, Ltd. was founded in 1943 through the merger of three local banks. Today, it is a leading financial institution in the Hokuriku region and offers a wide range of services. Looking ahead, the bank has announced that in March 2025, its holding company — Hokkoku Financial Holdings, Inc. — will change its name to CCI Group, Inc., reflecting a strategic vision that extends not only across Japan but also to international markets.

Benefits of Adoption

  • Gained clear visibility into Active Directory security, strengthening overall security posture
  • Identified and resolved misconfigurations
  • Streamlined and automated security operations
  • Gained deployment flexibility with the option to run Tenable on-prem

解決方案

Tenable Identity Exposure

Interviewee

The Hokkoku Bank, Ltd.

Chiaki Matsui, Security Group Manager, Information Systems Department
Tsutomu Yasoshima, Security Group Deputy Manager, Information Systems Department

簡介

As a financial institution operating on the front lines of cybersecurity, Hokkoku Bank is constantly evolving its defenses. We spoke with Mr. Matsui and Mr. Yasoshima from the bank’s Security Group to learn how Tenable Identity Exposure plays a foundational role in their robust cybersecurity strategy. This article highlights the tough challenges faced by financial institutions in today’s cyber landscape—and how Tenable brings transformative value to meet those challenges head-on.

Q: Could you tell us about Hokkoku Bank’s approach to cybersecurity?

Mr. Yasoshima: At our bank, the Security Group within the Systems Department takes full responsibility for all aspects of cybersecurity. Our work is wide-ranging—we establish and manage company-wide security policies, implement optimal security solutions, oversee daily operations and, most importantly, monitor our systems, detect potential threats and respond swiftly in the event of an incident. We cover the entire security lifecycle in a comprehensive manner.

Mr. Matsui: Since around 2012, Hokkoku Bank has shifted significantly toward in-house system development. Previously, we relied heavily on system integrators to implement packaged solutions, but with the launch of our internet banking services for individual customers, we have increasingly taken ownership of everything from system design to operation. In line with that shift, we have become more aware of the need to move away from relying solely on traditional “perimeter defense,” especially following the publication of guidelines by the Financial Services Agency in Japan. We now place more focus on a “defense-in-depth” strategy that assumes potential breaches. At the same time, we are always mindful of balancing security with convenience—an ongoing challenge—as we aim to maintain both business flexibility and effective use of data.

Q: What challenges were you facing that led to the decision to implement Tenable Identity Exposure?

Mr. Matsui: The turning point that led us to seriously consider implementing Tenable Identity Exposure was a Threat-Led Penetration Test (TLPT) conducted in 2023 by an external vendor. In this exercise, specific intrusion objectives were set, and the vendor simulated attacks based on realistic threat scenarios to objectively assess our defense capabilities. The results revealed a significant issue: once our perimeter defenses in the on-prem environment were breached, our ability to detect and respond to internal intrusions was insufficient. This weakness became an urgent issue that needed to be addressed. Among all the concerns, the security of Active Directory (AD)—the backbone of internal user authentication—stood out as especially critical. If compromised, AD could allow an attacker to gain control over the entire domain. The TLPT highlighted that we did not have a continuous monitoring system in place to detect risks within AD. This made it clear that we urgently needed to address the hidden risks in AD and build a more resilient security posture.

Q: What criteria did you set when selecting a solution? Were there any other options you considered?

Mr. Yasoshima: Our top priority in selecting a solution was ensuring robust protection for our on-prem Active Directory (AD). While many products on the market claim to protect AD, the majority are designed with cloud environments in mind. Given that our infrastructure still includes a significant on-prem component, which posed a major challenge, we found Tenable Identity Exposure particularly appealing due to its flexibility in supporting on-prem environments. In fact, even before adopting Tenable Identity Exposure, we had been using Tenable Nessus for vulnerability assessments and later expanded to Tenable Vulnerability Management. Because of our positive experience and familiarity with Tenable’s solutions, we already had a solid foundation of trust and understanding. That made it a natural next step to evaluate Tenable Identity Exposure as a part of our broader security strategy.

Of course, we also carefully evaluated other vendors’ products in parallel. However, what ultimately set Tenable Identity Exposure apart was its intuitive and visually accessible user interface. Through product demonstrations, we were impressed by how clearly it conveyed the severity of vulnerabilities within Active Directory, their potential impact and their complex interdependencies—all at a glance and in a step-by-step manner. This level of visibility allows even non-experts in cybersecurity to recognize risks and take appropriate actions. This ease of understanding and accessibility clearly sets it apart from other solutions. We concluded that this “visualization” capability is absolutely critical for maintaining ongoing security operations.

Q: Was the implementation process smooth?

Mr. Yasoshima: The implementation process went incredibly smoothly. We began evaluating the solution in April 2024, signed the contract just two months later in June, and immediately moved into deployment. Even we were surprised at how quickly everything progressed—clearly a reflection of how low the implementation cost was.

With other products, we found that deploying across the entire Active Directory environment often requires large-scale installation efforts, which can be very time- and resource-intensive. Tenable Identity Exposure, however, stood out in that regard. It doesn’t require agents to be installed on each server. Once AD data is synced, the solution can immediately begin continuous monitoring using Indicator of Exposure (IoE). This agentless design was one of the key reasons we were able to shorten the implementation timeline so significantly. We worked closely with our internal infrastructure team during deployment, and they also noted that the workload was much lighter than anticipated. What’s more, since it is agentless, there is minimal ongoing maintenance and operational overhead after implementation—a major advantage for us. This allows us to allocate our limited resources more strategically toward strengthening our overall security posture.

Q: What impact have you seen since implementing Tenable Identity Exposure? How have things changed compared to before?

Mr. Yasoshima: The most significant change—and the greatest benefit—since implementing Tenable Identity Exposure has been the visualization of our Active Directory security posture. Previously, the risks within AD were somewhat abstract, and it was difficult to pinpoint exactly where potential vulnerabilities existed. Now, through the Tenable Identity Exposure dashboard, we can clearly and visually identify these issues. It has allowed us to recognize which configurations require review and which vulnerabilities should be prioritized. That visibility has led directly to actionable steps for improvement. As a first step toward strengthening our security, I truly believe this has been an ideal and highly effective outcome.

Q: We understand you have also made use of Tenable’s training and professional services. How have you been leveraging them?

Mr. Yasoshima: The Tenable training we attended was a compact, two-hour online session, but it was highly practical. It covered everything from how to navigate the Tenable Identity Exposure dashboard to how to respond to detected issues. Even before the training, we had a sense of the product’s intuitive interface from the demo, but actually working hands-on during the session really reinforced our confidence in it.

In addition, we've actively taken advantage of Tenable’s professional services. One of the most valuable aspects was the ability to consult directly with Tenable’s expert analysts regarding the detection results from Tenable Identity Exposure. They help us by categorizing and prioritizing the large volume of findings, which has made it much easier for us to assign internal priorities and respond efficiently. We plan to continue collaborating closely with Tenable’s specialists to shape our mid- to long-term security improvement roadmap. With their expertise, we’re confident we can stay ahead of emerging threats and continuously optimize our security posture.

Q: It has been about a year since you implemented Tenable Identity Exposure. Are there any improvements or features you would like to see added?

Mr. Yasoshima: It’s been nearly a year since we introduced Tenable Identity Exposure and, so far, we have no major improvement requests. We’re very satisfied with how it’s been working for us. That said, if I were to suggest one feature that would make it even better, it would be the ability to detect early warning signs—such as unexpected changes in privileges—before they actually pose a risk. While we are already interested in enhancing predictive detection through log analysis, doing all of that manually with our current team’s resources is challenging. If Tenable Identity Exposure were to incorporate more advanced early-warning or behavioral detection capabilities, I believe it would significantly elevate our security operations and enable a more proactive defense strategy.

Q: Looking ahead, what kind of security measures would you like to implement? Could you also touch on how you plan to address the challenges around limited personnel that you mentioned previously?

Mr. Matsui: The shortage of IT talent is a serious issue not only in Japan as a whole but also within our organization. In particular, increasing the number of dedicated security personnel is extremely difficult under current conditions. That’s why we believe it's essential to make the most of security solutions that allow us to maintain strong security with limited staff—efficiently and effectively. We understand that Tenable also offers solutions tailored to cloud environments, which we’re actively using. By fully leveraging those tools as well, we hope to streamline our operations and boost productivity across our security efforts. The Financial Services Agency's guidelines now place a strong emphasis on automating asset management. That’s another area we recognize as a high priority, and we’re planning to address it as soon as possible.

Q: With the growing use of generative AI in the enterprise space, how do you view its potential role in cybersecurity?,

Mr. Yasoshima: At our bank, we allow the use of generative AI internally under certain conditions. Specifically, we’ve adopted an enterprise version of a generative AI service and strictly manage its use within a designated environment to ensure that input data is not used for external training purposes.

Mr. Matsui: As for how generative AI can be applied to cybersecurity, we’re still in the phase of gathering information and evaluating options. We’re aware that many solutions are already available in the market, but when considering cost-effectiveness, we haven’t yet reached the point of implementation. Some tools are starting to offer AI-powered summaries of alerts and detection results, essentially explaining what is happening, but what we’re particularly interested in is using AI to tune out noise. If there were a solution where AI could learn from explicitly labeled examples of false positives and automatically distinguish real threats from noise in a high-volume alert environment, it would significantly reduce the operational burden on security teams. We intend to keep a close eye on AI developments and continue exploring how to best integrate them into our security operations.

结语: A security foundation that protects the future of financial institutions—Powered by Tenable

This customer story clearly illustrates how the financial industry is responding to the growing threat of cyberattacks in a proactive and strategic manner. At the core of this response is Tenable Identity Exposure, which has delivered significant value by enabling visibility into Active Directory, risk-based prioritization, rapid deployment and reduced ongoing operational costs.

Tenable’s solutions go far beyond traditional vulnerability management tools. They have proven to be indispensable partners for organizations aiming to maximize security effectiveness and operational efficiency—even with limited human resources. For financial institutions facing increasingly complex threats, Tenable provides a powerful foundation to safeguard their future.

返回頂端

  • Tenable Identity Exposure

相關的客戶案例研究

Fukuoka Hibiki Shinkin Bank


閱讀案例研究

Snoop


閱讀案例研究

Demyst


閱讀案例研究

探索所有案例研究 ›

解決曝險,洞察先機。

合作夥伴

  • 成為合作夥伴
  • 尋找合作夥伴
  • 合作夥伴入口網站
  • 合作夥伴計劃

資源

  • 服務
  • 技術支援
  • 訓練與認證
  • 產品說明文件
  • 客戶社群
  • Tenable Trust

公司

  • 關於我們
  • 管理團隊
  • 新聞中心
  • 投資者關係

交流聯繫

  • 與我們聯絡
  • 試用我們的產品
  • 和業務人員聊聊
  • 與我們在活動中相見
  • 加入我們
  • 隱私權政策
  • 請勿販售/分享我的個人資訊
  • 法規
  • 508 合規性

© 2026 Tenable®, Inc. 保留所有權利

Tenable One

申請示範

以 AI 技術為後盾的全球領先曝險管理平台。

感謝您

感謝您對 Tenable One 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

申請示範

利用可據以行動的雲端安全平台消除雲端曝險。

感謝您

感謝您對 Tenable One Cloud Exposure 感興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

申請示範

根據對貴公司的風險發現並安排弱點的優先順序。內部部署管理。

感謝您

感謝您對 Tenable Security Center 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

申請示範

利用自動化簡化安全團隊與 IT 團隊的合作,並縮短平均修復時間。

感謝您

感謝您對 Tenable Patch Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

申請示範

洞悉、辨識並消除 IT 與容器弱點。

感謝您

感謝您對 Tenable Enclave Security 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

申請示範

全盤掌握所有與網際網路連線的資產,藉此消除盲點和不明的風險來源。

感謝您

感謝您對 Tenable One Attack Surface Management 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

申請示範

洞悉、保護與管理貴公司團隊使用 AI 平台的方式。

感謝您

感謝您對 Tenable One AI Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

申請示範

針對融合式 OT/IT 環境利用統一的安全解決方案消除 OT 曝險。

感謝您

感謝您對 Tenable One OT Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

申請示範

利用適用於身分智慧型企業的重要解決方案來消除身分曝險。

感謝您

感謝您對 Tenable One Identity Exposure 有興趣。
我們的人員將盡快與您聯絡。

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

為什麼要選擇 Tenable

參閱 Tenable 實際應用案例

想瞭解 Tenable 如何協助您的團隊發現並修復危及業務的關鍵網路弱點嗎? 請填寫此表單以取得客製化報價或示範。

感謝訂閱!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

瞭解 Tenable 如何協助達成 SLCGP 網路安全計畫要求

Tenable 解決方案能協助您滿足 SLCGP 的所有要求。與 Tenable 代表人員聯絡,以便深入瞭解。representative to learn more.

感謝您

您應該很快就會收到一封確認電子郵件,我們的一位業務開發代表將會與您聯繫。如有任何問題,請發送電子郵件至:[email protected]。

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

訂閱

您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

感謝訂閱!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

免費試用

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用軟體也包含 Tenable Web App Scanning。


立即購買

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。


資產數量

100

選擇您的訂閱方案

立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Vulnerability Management 感興趣。
我們的人員將盡快與您聯絡。

偵錯:
表單 ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

免費試用

試用 Tenable Web App Scanning

享受完整存取我們專為新型應用程式所設計、屬於 Tenable One 曝險管理平台一部分的最新 Web 應用程式掃描產品。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

您的 Tenable Web App Scanning 試用軟體也包含 Tenable Vulnerability Management。

立即購買

購買 Tenable Web App Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

FQDN

5
$3,578
立即購買

請聯絡我們或 Tenable 合作夥伴。

感謝您

感謝您對 Tenable Web App Scanning 感興趣。
我們的人員將盡快與您聯絡。

偵錯:
表單 ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

免費試用

免費試用 Tenable Nessus Professional

Tenable Nessus 是目前市場上最全方位的弱點掃描器。請填妥以下表單以繼續 Nessus Pro 試用。

立即購買

購買 Tenable Nessus Professional

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

*價格包含增值稅。

免費試用

免費試用 Tenable Nessus Expert

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

您已經有 Tenable Nessus Professional 了嗎? 升級至 Nessus Expert,免費試用 7 天。

立即購買

購買 Nessus Expert


選擇您的授權

購買多年期授權省更多!

增加支援與訓練

立即購買
續訂既有授權
尋找經銷商

利用 Nessus Pro 的進階支援,貴公司的團隊可 365 天全年無休 24 小時全天候使用電話、社群以及對談支援。此種進階等級的技術支援可確保加速應變與解決問題。

進階支援方案特色

電話支援

電話支援全年 365 天、全天候 24 小時無休,最多可提供十 (10) 位指定的支援聯絡人。

對談支援

對話支援也可提供指定的支援聯絡人使用,您可透過 Tenable Community 7 天 24 小時全年無休取得此支援服務。

Tenable Community 支援入口網站

所有指定的支援聯絡人都可在 Tenable Community 內提交支援案件。使用者也可以存取知識庫、文件集、授權資訊、技術支援編號等;利用即時對談向社群發問,然後從其他社群成員的回答中得知秘訣與技巧。

初次回應時間

P1-重大:< 2 小時
P2-高度:< 4 小時
P3-中度:< 12 小時
P4-提供資訊說明:< 24 小時

支援聯絡人

支援聯絡人需對於資訊技術、向 Tenable 購買的軟體具備一定的專精程度,同時也熟悉該軟體所監控的客戶資源。支援聯絡人必須會說英語並能以英語提出支援請求。支援聯絡人必須在合理範圍內向 Tenable 提供其詢問的資訊,以便 Tenable 重現錯誤或解決請求支援的問題。