{"id":141692,"date":"2022-03-30T08:05:12","date_gmt":"2022-03-30T08:05:12","guid":{"rendered":"https:\/\/www.capgemini.com\/?page_id=666738"},"modified":"2026-01-09T12:11:15","modified_gmt":"2026-01-09T12:11:15","slug":"capgeminis-threat-hunting-services","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","title":{"rendered":"Threat hunting services"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable is-style-blue-line header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:53% 54%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Solution<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Threat hunting services <\/h1><\/div><div class=\"inner-row-insight download-btn\"><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Cybersecurity products alone are not enough to protect today\u2019s digital enterprise. That\u2019s why Capgemini\u2019s Threat Hunting offer uniquely combines automated collection with in-depth human analysis. <br><\/h2><p class=\"intro-para-content\">Designed by our R&amp;D experts, this identifies advanced persistent threats and reduces the risk of a missed attack.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/fRGXanU4qOo?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">The unwelcome guest<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">We help you spot threats hiding in your IT system.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-don-t-risk-your-survival-by-failing-to-spot-a-cyber-attack\">Don\u2019t risk your survival by failing to spot a cyber attack<\/h3>\n\n\n\n<p>Increasing digitization has created wide-ranging vulnerabilities for the modern enterprise. As cyber attackers find ever smarter ways to breach security defenses, research suggests that it can take more than a hundred days to detect an attack on your system. Thus, the cost of failing to identify an attack has severe implications for your bottom line, from a loss of customer confidence and potential theft of intellectual property, to fines for data security non-compliance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\"><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-detecting-unknown-attacks-and-flagging-suspicious-activity\">Detecting unknown attacks and flagging suspicious activity<\/h3>\n\n\n\n<p>Would you know if your IT system had been compromised? Capgemini\u2019s Threat Hunting service recognizes that 100% protection can never be guaranteed, so it\u2019s vital to spot a malicious intrusion as quickly as possible. We take a unique approach to achieving this.<\/p>\n\n\n\n<p>Unlike cybersecurity product companies, we keep our scope narrow (we focus on a defined critical perimeter), but we do not restrict the number of alerts flagging suspicious activity. Human analysis reduces the risk of missing an attack, while a focus on anomalous behavior and unwanted changes to authorized programs detects unknown attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\"><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-unique-combination-of-human-analysis-and-automation\">A unique combination of human analysis and automation<\/h3>\n\n\n\n<p>Our Threat Hunting service goes beyond automation. By incorporating expert in-depth human analyses, we reduce the risk of automated data analysis on its own missing malicious intrusions. With attack methods constantly evolving, it\u2019s difficult for detection tools to stay on top of the threat. While SOCs base detection on a large perimeter for known threats, we consider the unknown and advanced persistent threats. And by accepting more false positives, we also greatly reduce false negatives.<\/p>\n\n\n\n<p><strong>Hunt out the cyber threat to reduce risk.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":151,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"57be7b71-d476-4a04-b6f2-19aa42ef6c1d\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[],"content-group":[],"class_list":["post-141692","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat hunting services - Capgemini Australia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat hunting services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T12:11:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\",\"name\":\"Threat hunting services - Capgemini Australia\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg\",\"datePublished\":\"2022-03-30T08:05:12+00:00\",\"dateModified\":\"2026-01-09T12:11:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat hunting services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/\",\"name\":\"Capgemini Australia\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat hunting services - Capgemini Australia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","og_locale":"en_US","og_type":"article","og_title":"Threat hunting services","og_url":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","og_site_name":"Capgemini Australia","article_modified_time":"2026-01-09T12:11:15+00:00","og_image":[{"url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","url":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","name":"Threat hunting services - Capgemini Australia","isPartOf":{"@id":"https:\/\/www.capgemini.com\/au-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg","datePublished":"2022-03-30T08:05:12+00:00","dateModified":"2026-01-09T12:11:15+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#primaryimage","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg","contentUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-56.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/au-en\/"},{"@type":"ListItem","position":2,"name":"Threat hunting services"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/au-en\/#website","url":"https:\/\/www.capgemini.com\/au-en\/","name":"Capgemini Australia","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/au-en\/solutions\/threat-hunting-services\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Threat hunting services","url":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Australia","logo":""},"keywords":[],"dateCreated":"2022-03-30T08:05:12Z","datePublished":"2022-03-30T08:05:12Z","dateModified":"2026-01-09T12:11:15Z"},"rendered":"<meta name=\"parsely-title\" content=\"Threat hunting services\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/au-en\/solutions\/threat-hunting-services\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-03-30T08:05:12Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/au-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","featured_image_alt":false,"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Australia","distributor_original_site_url":"https:\/\/www.capgemini.com\/au-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/pages\/141692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/comments?post=141692"}],"version-history":[{"count":6,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/pages\/141692\/revisions"}],"predecessor-version":[{"id":549940,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/pages\/141692\/revisions\/549940"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media?parent=141692"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/brand?post=141692"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/partner_type?post=141692"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/service?post=141692"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/industry?post=141692"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/partners?post=141692"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/page-type?post=141692"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/content-group?post=141692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}