• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • Fukuoka Hibiki Shinkin Bank
Case study

Fukuoka Hibiki Shinkin Bank Logo Fukuoka Hibiki Shinkin Bank


Tenable Identity Exposure was chosen as the only agentless solution that configures and continuously monitors Active Directory, reducing costs. Paired with Tenable Cloud Security, it also enforces strong protection across cloud services.

Download the case study
Primary product used

Tenable Identity Exposure


The essential solution for identity security posture management (ISPM)

Strengthen your security posture and defend against identity-based attacks.

Explore this product Request a demo
Employees: 530
Branches: 41 (including one agency branch)
Industry: Financial

Fukuoka Hibiki Shinkin Bank deploys Tenable Identity Exposure to view and eliminate Active Directory risks and improve its cloud security

Benefits of Tenable Adoption

  • Improved visualization of Active Directory
  • Organization of dormant accounts and ease of configuration management and control

Interviewees

Fukuoka Hibiki Shinkin Bank:

Mr. Atsushi Yoshida, Executive Officer, General Manager of Systems Department & Head of DX Promotion Office
Mr. Masayuki Miyaji, Senior Analyst, Systems Department

Concern over misconfiguration risks in Active Directory

Q: Can you tell us about your cybersecurity program at Fukuoka Hibiki Shinkin Bank? For example, do you implement your program according to the Guideline for Cybersecurity in the Financial Sector, as set out by the Ministry of Finance in October 2024?

Mr. Yoshida: We were already working on cyber hygiene as an important aspect of cybersecurity before the Ministry of Finance’s guideline was published. As we are entrusted with our customers’ assets, we consider maintaining cyber hygiene to be a prerequisite for our operation. Especially with many customers using our online services, IT security is important to protect our network, cloud environment and identity. We have also been referring to the guideline since its publication in order to implement our security measures.

Q: Can you tell us how you came to adopt Tenable Identity Exposure? What were the challenges you wished to resolve?

Mr. Yoshida: As we configured Active Directory ourselves, we had some concerns about potential vulnerabilities and misconfiguration. We had penetration tests done, but only once a year, so we felt there was a need to increase its frequency. There was a case in the past, where one of the tests flagged a configuration issue in Active Directory. Human errors are inevitable, so we also need to take steps to prevent misconfiguration.

Q: What kind of risks did you think you would be exposed to if those challenges were left unaddressed?

Mr. Yoshida: As attackers target financial institutions to achieve various objectives, we understood that if those challenges were left unaddressed we would be at risk of being breached. Once our network is compromised, ransomware could be introduced, which could lead to huge damage such as data breach and even our system being completely hijacked. This was a serious challenge, as it would affect our reputation as a financial institution.

Build and operation capabilities were available in-house, which enabled independent deployment

Q: As you selected a solution to resolve those challenges, what requirements did you set?

Mr. Yoshida: We always look for the very latest security products. When we felt we needed to protect Active Directory, one of the system integrators associated with Tenable suggested Tenable Identity Exposure as an effective tool for the purpose.

Q: The Ministry of Finance’s guideline also states that steps should be taken to protect Active Directory. Was it your intention to adhere to the guideline?

Mr. Yoshida: We had already set a policy for securing Active Directory before the guideline was published. Its publication and the decision to adopt Tenable happened almost simultaneously, which was good timing. We might be diligent in applying patches like Windows Update, but if security issues were present in the configuration, Active Directory could be taken over by an attacker. So we were aware that some kind of measure was necessary in order to meet the requirements of the Ministry of Finance’s guideline.

Q: So a Tenable product was suggested; what was the key factor that made you decide to go for Tenable Identity Exposure?

Mr. Yoshida: The biggest reason was that Tenable was the only product that could configure and continuously monitor Active Directory. Furthermore, the product is agentless, which was an advantage in reducing deployment and management costs. We also purchased Tenable Cloud Security together with Tenable Identity Exposure to enforce security for our cloud services. Therefore we have in our sight that in future we may leverage Tenable One, to manage everything centrally from a cyber exposure management platform.

Q: Did your deployment go smoothly with Tenable Identity Exposure?

Mr. Miyaji: Yes, its deployment was simple. Build and configuration tasks were completed in one day. We basically manage system build and operation management in-house, so we had our own team to deploy the product. I imagine that if we had introduced a similar product from a different company, it would have taken at least a month, with the necessary PoC, discussions, etc., in the course of deployment.

Q: I understand that you have been making efforts to establish in-house capabilities for some time. These days there are many organizations who employ external managed service providers; can you tell me the reason why you think in-house capabilities are important?

Mr. Yoshida: You could say that it’s a kind of corporate culture. We have a history of doing everything in-house, from computer configuration to system development. As that is the way we generally do things, we have some resistance to outsourcing. Our teams have a thorough knowledge of our network and security, so outsourcing introduces an element of uncertainty that detailed development and operation may become invisible to us.

Q: Setting and fine-tuning the system after deployment; did that go without any problem?

Mr. Miyaji: It was easy anyways, but as we attended the hands-on seminar for Tenable Identity Exposure, we were able to build the system without a hitch.

Q: What was that seminar like? Any requests?

Mr. Miyaji: It was very detailed and easy to follow. We attended it almost at the same time as the product was being deployed. We were able to get detailed explanations of Active Directory security with demonstrations. However, the product has numerous functions, with a wide range of findings it can detect, such that a few hours were not enough. It would have been even better if the seminar had been expanded to cover all aspects, over several sessions, if that was at all possible.

Approximately 200 dormant accounts were found, configuration checks were simple to do

Q: What are the benefits of having Tenable? What changes have you noticed before and after deployment?

Mr. Miyaji: We are now able to look at the dashboard and find risky situations in an instant. For example, we were able to visualize dormant accounts which we were not aware of before. As our system has been in use for nearly twenty years, we found approximately 200 dormant accounts on the Tenable Identity Exposure console, and we were able to delete unnecessary accounts immediately. We were also able to monitor changes in objects in real time, for example, with group policy settings. We did have security measures for Active Directory before, but with the deployment of Tenable, we are now able to use quantifiable scores to visualize its security level overall, which I believe contributes immensely toward reducing security risk.

Q: Do you have any concerns or anything you are unhappy with?

Mr. Miyaji: I have nothing major that I am dissatisfied with. I suppose that, while system admins like myself and our team can see from the console that the right configurations are in place, for management, a reporting function with an easy-to-understand format will make it even better.

Q: What is the console like? Is it easy to use?

Mr. Miyaji: The console is localized, intuitive and very user-friendly. In addition, threats are ranked according to their severity, which makes it easy to determine which should be dealt with as a priority. This has improved our operational efficiency.

Q: Can you tell us about your future plans for security and human resources?

Mr. Miyaji: There is no end to the provision of cybersecurity. As new attack vectors emerge in rapid succession, we hope to equip our organization with the latest countermeasures that are suitable for us. Therefore, although the fundamental policy and framework for security remain unchanged, we ensure that we are always flexible. In terms of human resources, for example, where we have a team of three at the moment, we will need to increase our headcount, and I hope to train newcomers in-house, mainly, with the help of our partners.

Q: You told me you have decided to deploy Tenable Cloud Security. What benefits do you expect to get from the product?

Mr. Yoshida: As we scale up the use of cloud resources, I believe the product will be useful in managing risk in the cloud. At present, we use mainly Microsoft 365, but we are exploring the use of Microsoft Azure, AWS and Salesforce. We hope to be able to visualize what is going on in the cloud and eliminate misconfigurations caused by human error, as well as secure our workloads, identities, data and more. It will be most helpful if you could share your advice for best practice.

Back to Top

  • Tenable Identity Exposure

Related customer case studies

Hokkoku Bank


Read case study

Snoop


Read case study

Demyst


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.