{"id":517766,"date":"2021-04-09T14:37:43","date_gmt":"2021-04-09T14:37:43","guid":{"rendered":"https:\/\/www.capgemini.com\/dk-en\/?page_id=517766"},"modified":"2026-04-10T07:32:18","modified_gmt":"2026-04-10T07:32:18","slug":"continuous-vigilance","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","title":{"rendered":"Continuous vigilance"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Continuous vigilance<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/services\/cybersecurity\/defend\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/services\/cybersecurity\/defend\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-proactive-threat-detection-response-and-continuous-risk-reduction-powered-by-global-expertise-and-advanced-automation\">Proactive threat detection, response, and continuous risk reduction \u2013 powered by global expertise and advanced automation.<\/h2>\n\n\n\n<p>Cyber threats don\u2019t rest. Neither should your defenses. As attack surfaces expand and adversaries grow more sophisticated, enterprises need security operations that are as agile and relentless as the threats they face. Continuous Vigilance services by Capgemini delivers round-the-clock protection \u2013 from advanced threat hunting to managed detection and response, we empower your teams to detect faster, respond smarter, and recover stronger \u2013 minimizing impact while strengthening long-term security posture.<\/p>\n\n\n\n<p>With our Continuous Vigilance services, you gain clarity, confidence, and control needed to operate securely \u2013 today and into the future.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-client-stories section-client-stories\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"clientblock-title\"><\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"slider-nav-wrapper smallDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next \" aria-label=\"Slider next\"><\/button><\/div><\/div><div class=\"slider-list\"><div class=\"slide active\">\n\t\t\t<div class=\"slide-bg-wrapper\">\n\t\t\t\t<picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 2x\"\n\t\t\t\tmedia=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2048&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=480&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=960&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 0)\"\/><img decoding=\"async\" loading=\"lazy\" class=\"slide-bg\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg\" alt=\"\"\n\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\"\n\t\t\/><\/picture><div class=\"slide-reveal\"><\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"slide-info-wrapper\">\n\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t<div class=\"col-12 col-lg-6\">\n\t\t\t\t\t\t\t<div class=\"slide-info\">\n\t\t\t\t\t\t\t\t<a aria-label=\"Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT\"\n\t\t\t\t\t\t\t\t   href=\"https:\/\/www.capgemini.com\/dk-en\/news\/client-stories\/fighting-the-rise-of-cybercrime-and-online-fraud-by-establishing-the-nordic-financial-cert\/\">\n\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"client-subtitle\">Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT<\/h3>\n\t\t\t\t\t\t\t\t\t\t<p>Nordic financial institutions worked with Capgemini to establish the first international financial CERT to respond to increasingly sophisticated cybersecurity threats<\/p>\n\t\t\t\t\t\t\t\t\t<\/div><!-- End of box-->\n\t\t\t\t\t\t\t\t<\/a><div class=\"slide-info-footer\">\n                                <div class=\"brand-logo-wrapper\"><\/div>\n\t\t\t<div class=\"content-more\">\n\t\t\t\t<a class=\"cta-button\" href=\"https:\/\/www.capgemini.com\/dk-en\/news\/client-stories\/fighting-the-rise-of-cybercrime-and-online-fraud-by-establishing-the-nordic-financial-cert\/\" aria-label=\"Read more about Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT\"><span>Read more<\/span><\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div><!-- End of slide info-->\n<\/div>\n<\/div>\n<\/div>\n<\/div><!-- End of container-->\n\n<\/div><!-- End of slide active -->\n<\/div><div class=\"slider-nav-wrapper largeDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">What we do<\/h2><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><p><\/p><\/div><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Managed Detection and Response (MDR)<\/h3><\/div><div class=\"expander-content\"><p>Our MDR services provide 24\/7 monitoring and rapid response, leveraging AI-driven analytics and automation to detect and contain threats in real time. We help you reduce dwell time, accelerate incident resolution, and maintain business continuity.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Managed SOC and SOC Transformation<\/h3><\/div><div class=\"expander-content\"><p>Delivered through our global Cyber Defense Centers, our Managed SOC services offer around-the-clock threat monitoring, analysis, and response. We also help modernize and transform your in-house SOC with advanced tooling, processes, and skilled resources to meet today\u2019s security demands. <\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber Defense Center link\" href=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Cyber Defense Center<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Digital Forensics and Incident Response (DFIR)<\/h3><\/div><div class=\"expander-content\"><p>When a breach occurs, speed and precision are critical. Our DFIR teams deliver immediate response, forensic investigation, and root cause analysis to minimize impact, reduce recovery time, and preserve your organization\u2019s reputation.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Threat Hunting<\/h3><\/div><div class=\"expander-content\"><p>Our expert threat hunters go beyond alerts to uncover hidden threats and advanced persistent threats (APTs) lurking in your environment. Using behavioral analytics, threat intelligence, and hypothesis-driven investigation, we help you stay one step ahead of attackers. <\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Threat hunting services link\" href=\"https:\/\/www.capgemini.com\/solutions\/capgeminis-threat-hunting-services\/\" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Threat hunting services<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Vulnerability Management<\/h3><\/div><div class=\"expander-content\"><p>We help you identify, assess, and remediate vulnerabilities across your digital estate. By aligning remediation efforts with business impact and threat context, we ensure your resources are focused where they matter most.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Penetration Testing<\/h3><\/div><div class=\"expander-content\"><p>We simulate real-world cyberattacks to identify exploitable vulnerabilities in your systems, applications, and networks. Our ethical hackers help you uncover security gaps before adversaries do \u2013 strengthening your defenses with actionable insights.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Red\/Purple Teaming<\/h3><\/div><div class=\"expander-content\"><p>Our offensive security experts simulate real-world attacks to test your defenses and uncover weaknesses. Through Red and Purple Teaming exercises, we provide actionable insights to enhance your detection, response, and overall cyber resilience.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 1d9d80d9-a4be-45e1-bcd2-59ebd29e029f\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cyber Defense Centers powered by Microsoft Sentinel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCyber Defense Centers powered by Microsoft Sentinel\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"We help our clients keep their systems, applications, and data protected, day and night.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWe help our clients keep their systems, applications, and data protected, day and night.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"See our brochure about Cyber Defense Centers powered by Microsoft Sentinel\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/01\/CDC-Brochure.pdf\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSee our brochure\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 50% 50%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Vehicle SOC (V-SOC)<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Transforming Automotive Security<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/n12lmxHu2l0?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/MmKOmZ6hVjI?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Global threat intelligence<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">We can help eliminate threats swiftly &#8211; and before it&#8217;s too late.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd layout-one-card-only \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Research and insights <\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/05\/Zero-Trust-Orchestration-web-banner-2024.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/accelerate-your-journey-to-zero-trust-with-zero-trust-orchestration\/\" aria-label=\"Accelerate your journey to zero trust with zero trust orchestration\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Accelerate your journey to zero trust with zero trust orchestration<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Fireside chat<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Artificial Intelligence (AI) in security operations.<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/4TVplJFSXzs?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Expert perspectives <\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/crypto-agility-the-unsung-hero-in-the-quantum-security-race\/\" aria-label=\"Crypto-agility: The unsung hero in the quantum security race\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/crypto-agility-the-unsung-hero-in-the-quantum-security-race\/\" aria-label=\"Crypto-agility: The unsung hero in the quantum security race\"><h3 class=\"expert-subtitle\">Crypto-agility: The unsung hero in the quantum security race<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Marco-Pereira-1.jpg?w=400\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Marco Pereira<\/div><div class=\"date-text\">Jul 29, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/capgemini-is-the-microsoft-global-financial-services-partner-of-the-year\/\" aria-label=\"Capgemini is the Microsoft Global Financial Services Partner of the Year\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/09\/Capgemini_Awards-and-recognition.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Customer experience, Cybersecurity, Data and AI, Sustainability<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/capgemini-is-the-microsoft-global-financial-services-partner-of-the-year\/\" aria-label=\"Capgemini is the Microsoft Global Financial Services Partner of the Year\"><h3 class=\"expert-subtitle\">Capgemini is the Microsoft Global Financial Services Partner of the Year<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"Abhaya-Gupta\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2023\/05\/Abhaya-Gupta.jpg?w=490\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Abhaya Gupta<\/div><div class=\"date-text\">Jun 25, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/a-digital-edge-for-financial-services-navigating-cybersecurity-in-the-era-of-the-digital-operational-resilience-act-dora\/\" aria-label=\"A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/04\/GettyImages-1254825709.jpeg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity, Technology<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/a-digital-edge-for-financial-services-navigating-cybersecurity-in-the-era-of-the-digital-operational-resilience-act-dora\/\" aria-label=\"A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)\"><h3 class=\"expert-subtitle\">A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/04\/Christiaan-Koopman.jpg?w=389\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Christiaan Koopman<\/div><div class=\"date-text\">Mar 22, 2024<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"partner-heading\">Partners<\/h2><\/div><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/technology-partners\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM puts smart to work. Capgemini helps you make the most of it.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/partnerships\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Working together to help companies boost business value with cloud-powered solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/technology-partners\/oracle\/\" class=\"partner-box-title\" aria-label=\"Business with imagination. We shape powerful Oracle technology to create winning solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/partnerships\/sap\/\" class=\"partner-box-title\" aria-label=\"Unlock growth, agility and value with a proven partner. 40+ years of SAP expertise.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":119,"featured_media":875021,"parent":517716,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[8,18,5,30,10,14,17,7,26,6,28,23,29,20,24],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"8af3cff9-fb37-42c3-aa1f-2b1e8f6a9796\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[162],"content-group":[],"class_list":["post-517766","page","type-page","status-publish","has-post-thumbnail","hentry","page-type-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Predict &amp; Prevent Cyber Attacks - Cyber Threat Intelligence Services | Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict &amp; prevent attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous vigilance\" \/>\n<meta property=\"og:description\" content=\"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict &amp; prevent attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Denmark\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T07:32:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\",\"name\":\"Predict & Prevent Cyber Attacks - Cyber Threat Intelligence Services | Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"datePublished\":\"2021-04-09T14:37:43+00:00\",\"dateModified\":\"2026-04-10T07:32:18+00:00\",\"description\":\"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict & prevent attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Continuous vigilance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/\",\"name\":\"Capgemini Denmark\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Predict & Prevent Cyber Attacks - Cyber Threat Intelligence Services | Capgemini","description":"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict & prevent attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","og_locale":"en_US","og_type":"article","og_title":"Continuous vigilance","og_description":"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict & prevent attacks.","og_url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","og_site_name":"Capgemini Denmark","article_modified_time":"2026-04-10T07:32:18+00:00","og_image":[{"width":2880,"height":1800,"url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","name":"Predict & Prevent Cyber Attacks - Cyber Threat Intelligence Services | Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/dk-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","datePublished":"2021-04-09T14:37:43+00:00","dateModified":"2026-04-10T07:32:18+00:00","description":"Capgemini\u2019s Defend portfolio covers services related to applications, networks, endpoints to empower businesses to meet compliance, predict & prevent attacks.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","contentUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Services","item":"https:\/\/www.capgemini.com\/dk-en\/services\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Continuous vigilance"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/dk-en\/#website","url":"https:\/\/www.capgemini.com\/dk-en\/","name":"Capgemini Denmark","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Continuous vigilance","url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Denmark","logo":""},"keywords":[],"dateCreated":"2021-04-09T14:37:43Z","datePublished":"2021-04-09T14:37:43Z","dateModified":"2026-04-10T07:32:18Z"},"rendered":"<meta name=\"parsely-title\" content=\"Continuous vigilance\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2021-04-09T14:37:43Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Denmark","distributor_original_site_url":"https:\/\/www.capgemini.com\/dk-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/comments?post=517766"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517766\/revisions"}],"predecessor-version":[{"id":875023,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517766\/revisions\/875023"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media\/875021"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media?parent=517766"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/brand?post=517766"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partner_type?post=517766"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/service?post=517766"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/industry?post=517766"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partners?post=517766"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/page-type?post=517766"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/content-group?post=517766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}