{"id":561114,"date":"2021-04-09T14:39:06","date_gmt":"2022-07-08T08:48:02","guid":{"rendered":"https:\/\/www.capgemini.com\/?page_id=517770"},"modified":"2026-04-28T07:21:51","modified_gmt":"2026-04-28T07:21:51","slug":"continuous-protection","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","title":{"rendered":"Continuous protection"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 38%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 38%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"34\">Continuous protection<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/services\/cybersecurity\/protect\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/services\/cybersecurity\/protect\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-security-that-scales-with-you\"><strong>Security that scales with you.<\/strong><\/h3>\n\n\n\n<p>Security is no longer a one-time implementation \u2013 it must evolve in step with your business. As cloud adoption, connected systems, and digital identities grow in complexity, so does the need for continuous, adaptive protection. Continuous Protection services by Capgemini are built to evolve with your business \u2013 ensuring your data, infrastructure, applications, and users stay protected in real time, across IT, OT, cloud, and hybrid environments.<\/p>\n\n\n\n<p>We deliver a future-ready defense posture grounded in modern architecture, zero trust principles, and end-to-end visibility \u2013 so you can reduce risk, stay compliant, and build with confidence.<\/p>\n\n\n\n<p>Whether you\u2019re modernising your infrastructure, moving to multi-cloud, or integrating OT and IT environments, our Continuous Protection services provide the sustainable, scalable security foundation you need to drive transformation \u2013 securely.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"expandable-heading-tag\">What we offer<\/h2><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><p><\/p><\/div><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Security architecture<\/h3><\/div><div class=\"expander-content\"><p>We design and implement security frameworks that are embedded at every layer of your IT ecosystem \u2013 from initial concept through deployment \u2013 ensuring resilience, scalability, and compliance from the ground up.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Identity and access management (IAM)<\/h3><\/div><div class=\"expander-content\"><p>Our IAM solutions enable seamless and secure user access across hybrid and multi-cloud environments. We help you enforce least-privilege principles, streamline authentication, and maintain visibility and control over digital identities.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Read more link\" href=\"https:\/\/www.capgemini.com\/solutions\/identity-access-management\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cloud security<\/h3><\/div><div class=\"expander-content\"><p>We help you secure your cloud environment with native, context-aware defenses tailored to dynamic workloads. Our solutions ensure continuous compliance, threat detection, and risk mitigation across public, private, and hybrid clouds.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<p><\/p>\n<div class=\"content-more\"><a class=\"more2\" aria-label=\"Cloud security link\" href=\"https:\/\/www.capgemini.com\/solutions\/cloud-security\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Cloud security<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Zero trust security<\/h3><\/div><div class=\"expander-content\"><p>Our zero trust approach redefines perimeter security by enforcing strict identity verification and access controls across every user, device, and application \u2013 regardless of location. We help you implement a zero trust architecture that minimizes risk, limits lateral movement, and ensures continuous validation of trust across your digital environment.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Infrastructure security<\/h3><\/div><div class=\"expander-content\"><p>From IT to OT, we deliver integrated security solutions that protect your infrastructure at scale. Our approach combines advanced threat prevention, real-time monitoring, and automated response to safeguard critical systems and assets.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Application security and DevSecOps<\/h3><\/div><div class=\"expander-content\"><p>We embed security into every phase of the software development lifecycle. By integrating DevSecOps practices, we help your teams shift security left, reduce vulnerabilities early, and deliver secure applications at speed.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"App. security testing link\" href=\"https:\/\/www.capgemini.com\/solutions\/application-security-testing\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">App. security testing<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Data security<\/h3><\/div><div class=\"expander-content\"><p>Our data security solutions ensure sensitive information is protected through policy-driven controls, encryption, and compliance-ready frameworks. We help you maintain data integrity, privacy, and trust \u2013 wherever your data resides.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Operational Technology(OT) security<\/h3><\/div><div class=\"expander-content\"><p>Capgemini OT security protects critical industrial environments by securing operational assets, production systems, and connected devices. We help organisations ensure safety, resilience, and compliance across their OT landscape.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/gIZkdGRe3tI?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Our secure IoT\/OT services<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">See how we use convergence to secure your IoT deployments.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-even layout-even-mixed-color-cards \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Research and insights<\/h2><\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/the-identity-singularity-2035\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2026\/03\/Capgemini-Identity-Singularity-2035-web-banner.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/the-identity-singularity-2035\/\" aria-label=\"The identity singularity 2035\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">The identity singularity 2035<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/zero-trust-from-aspiration-to-rapid-implementation\/\" aria-label=\"Zero trust: From aspiration to rapid implementation\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Zero trust: From aspiration to rapid implementation<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/thinking-with-a-data-protection-mindset\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Data-Protection-PoV_Web-banner.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/why-its-time-for-ai-in-identity-and-access-management\/\" aria-label=\"Why it\u2019s time for AI in Identity and access management\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Why it\u2019s time for AI in Identity and access management<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/thinking-with-a-data-protection-mindset\/\" aria-label=\"Thinking with a data protection mindset\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Thinking with a data protection mindset<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/the-value-of-secure-digital-identity-controls\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/04\/IDC-web-banner-2880-x-1800.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/the-value-of-secure-digital-identity-controls\/\" aria-label=\"The value of secure digital identity controls\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">The value of secure digital identity controls<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" aria-label=\"Generative AI and Cybersecurity: A revisited classic\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Generative AI and Cybersecurity: A revisited classic<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><\/div><\/section>\n\n\n<section class=\" section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Meet our experts<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/11\/Marco-Pereira-1.jpg\" alt=\"Marco Pereira\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Marco Pereira<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Global Head of Cybersecurity, Cloud Infrastructure Services<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. \nMarco holds a master\u2019s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/07\/jerome_desbonnet.jpg\" alt=\"J\u00e9r\u00f4me Desbonnet\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/fr.linkedin.com\/in\/jeromedesbonnet\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">J\u00e9r\u00f4me Desbonnet<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Expert in Cybersecurity architectures<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/fr.linkedin.com\/in\/jeromedesbonnet\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">I create security architecture designs. I plan and execute major security programs to ensure that our clients are well protected.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/11\/Christophe-Menant.jpg\" alt=\"Christophe-Menant\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Director, Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Christophe leads the portfolio of offers and cybersecurity innovation at CAPGEMINI France. With over 30 years in IT and 25+ years in cybersecurity, he brings a wealth of experience in international and global environments. Christophe excels in helping clients develop and execute robust security strategies and transformation programs.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Didier-Appell-Profile-Card.webp\" alt=\"Didier Appell\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Didier Appell<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Principal, Global Offer Lead for OT\/IoT Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Didier Appell leads Capgemini\u2019s global OT\/IoT cybersecurity practice, bringing over two decades of experience in software development, system integration, and industrial cybersecurity. He has built and scaled cybersecurity offerings for industrial systems and connected devices, adapting IT best practices to meet operational and performance needs in industrial environments. Didier drives innovation across sectors including transportation, energy, telecoms, and healthcare, extending Capgemini\u2019s expertise from France to global markets.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/05\/lee-newcombe-e1525680343732-1-1.jpg\" alt=\"Lee Newcombe\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"subnav-button--form\" href=\"javascript:void(0)\" aria-label=\"contact us\" data-bs-toggle=\"modal\" data-bs-target=\"#WPB419aa864_92a4_4cf7_aa45_eb9f30b2cfc3\" data-bs-expert-title=\"1\">\n\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ico-form\"><\/i>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lee Newcombe<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Expert in Cloud security, Security Architecture<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"subnav-button--form\" href=\"javascript:void(0)\" aria-label=\"contact us\" data-bs-toggle=\"modal\" data-bs-target=\"#WPB419aa864_92a4_4cf7_aa45_eb9f30b2cfc3\" data-bs-expert-title=\"Lee Newcombe\">\n\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ico-form\"><\/i>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"modal\" id=\"WPB419aa864_92a4_4cf7_aa45_eb9f30b2cfc3\">\n\t\t\t\t\t<div class=\"modal-dialog modal-dialog-centered modal-lg modal-dialog-scrollable landing-page-modals\">\n\t\t\t\t\t\t<div class=\"modal-content\">\n\t\t\t\t\t\t\t<div class=\"modal-header\">\n\t\t\t\t\t\t\t\t<button type=\"button\" class=\"btn-close\" aria-label=\"close\" data-bs-dismiss=\"modal\"><\/button>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"modal-body\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"logo-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/themes\/capgemini2025\/assets\/images\/logo.svg\"\n\t\t\t\t\t\t\t\t\t\talt=\"Connect with us\" class=\"light\" \/>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/themes\/capgemini2025\/assets\/images\/logo-white.svg\"\n\t\t\t\t\t\t\t\t\t\talt=\"Connect with us\" class=\"dark\" \/>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"form-title\">Connect with us<\/h4>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"mf_forms__container \">\n\t\t\t\t\t\t\t\t<form id=\"mf_form_344241_1623490589\" class=\"mf_form__form row needs-validation\" action=\"\" method=\"post\" enctype=\"multipart\/form-data\" data-nosnippet>\n\n\t\t\t\t\t\t\t\t<input type=\"hidden\" name=\"form_id\" data-validate=\"number\" class=\"mf_form__id\" value=\"344241\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"form_title\" class=\"mf_form__title\" value=\"\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"wp_rest_nonce\" class=\"mf_form__wp_rest_nonce\" value=\"5b6bb8730c\" \/>\n\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_conditional_logic\" class=\"mf_form__title conditional_logic\" value=\"\" \/>\n\t\t\t\t\n\t\t\t\t<input type=\"hidden\" name=\"mf_form_fields_country_dpo_field\" class=\"mf_form__title conditional_logic mf_form_fields_country_dpo_field\" value=\"\" \/>\n\n\t\t\t\t<!-- Anti-spam field -->\n\t\t\t\t<input type=\"text\" \n\t\t\t\t\tname=\"website_url\" \n\t\t\t\t\tclass=\"mf_field__url\" \n\t\t\t\t\tautocomplete=\"off\"\n\t\t\t\t\ttabindex=\"-1\"\n\t\t\t\t\taria-hidden=\"true\"\n\t\t\t\t\tstyle=\"position:absolute;left:-9999px;width:1px;height:1px;opacity:0;pointer-events:none;\" \n\t\t\t\t\/>\n\t\t\t<\/form>\n\n\t\t\t<div class=\"mf_form__success\" tabindex=\"0\" role=\"alert\">\n\t\t\t\t\t\t\t\t<p>Thank You! We have received your form submission.\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"mf_form__errors\">\n\t\t\t\t<p>We are sorry, the form submission failed. Please try again.<\/p>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t<script>\n\t\t\twindow.MF_CONFIG344241 = {\"344241\":{\"errors\":[],\"redirect\":\"\"}};\n\t\t<\/script>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"partner-heading\">Partners<\/h2><\/div><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/gb-en\/about-us\/technology-partners\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM puts smart to work. Capgemini helps you make the most of it.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/gb-en\/about-us\/technology-partners\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Working together to help companies boost business value with cloud-powered solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/microsoft.png?w=350&#038;quality=70\" alt=\"microsoft\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"microsoft\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/gb-en\/about-us\/technology-partners\/oracle\/\" class=\"partner-box-title\" aria-label=\"Business with imagination. We shape powerful Oracle technology to create winning solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/oracle-2.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/gb-en\/about-us\/technology-partners\/sap\/\" class=\"partner-box-title\" aria-label=\"Unlock growth, agility and value with a proven partner. 40+ years of SAP expertise.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2020\/12\/sap-1.png?w=350&#038;quality=70\" alt=\"Partners-sap\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"Partners-sap\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":119,"featured_media":695094,"parent":555962,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[{\"uuid\":\"67c178b87727e\",\"blogId\":\"30\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/us-en\/\",\"postId\":567307,\"postLink\":\"https:\/\/www.capgemini.com\/us-en\/services\/cybersecurity\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b87c853\",\"blogId\":\"5\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/gb-en\/\",\"postId\":561114,\"postLink\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b882a65\",\"blogId\":\"18\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/in-en\/\",\"postId\":987498,\"postLink\":\"https:\/\/www.capgemini.com\/in-en\/services\/cybersecurity\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b885c5e\",\"blogId\":\"28\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/mx-es\/\",\"postId\":5793,\"postLink\":\"https:\/\/www.capgemini.com\/mx-es\/servicios\/ciberseguridad\/proteger\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b888920\",\"blogId\":\"26\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/fi-en\/\",\"postId\":503825,\"postLink\":\"https:\/\/www.capgemini.com\/fi-en\/services\/cybersecurity\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b88b6a2\",\"blogId\":\"20\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/se-en\/\",\"postId\":132708,\"postLink\":\"https:\/\/www.capgemini.com\/se-en\/services\/cybersecurity\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false},{\"uuid\":\"67c178b88dcdd\",\"blogId\":\"12\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/br-pt\/\",\"postId\":628576,\"postLink\":\"https:\/\/www.capgemini.com\/br-pt\/servicos\/servicos-de-seguranca-cibernetica\/protect\/\",\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}]","cg_seo_canonical_relation":"{\"uuid\":\"17f27ca8-6e0f-4218-8437-77a56caab03b\",\"blogId\":\"1\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/\",\"postLink\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\",\"postId\":517770,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false,\"hreflang\":\"\",\"link\":\"\"}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"a5751bad-00d9-4503-b0a6-ef0ca7ba935a\",\"blogId\":\"1\",\"domain\":\"www.capgemini.com\",\"sitePath\":\"\/\",\"postLink\":\"https:\/\/www.capgemini.com\/services\/cybersecurity\/protect\/\",\"postId\":517770,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false,\"isEnabled\":true}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[328],"content-group":[],"class_list":["post-561114","page","type-page","status-publish","has-post-thumbnail","hentry","page-type-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Continuous protection | Scalable, adaptive cybersecurity by Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous protection\" \/>\n<meta property=\"og:description\" content=\"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T07:21:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\",\"name\":\"Continuous protection | Scalable, adaptive cybersecurity by Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg\",\"datePublished\":\"2022-07-08T08:48:02+00:00\",\"dateModified\":\"2026-04-28T07:21:51+00:00\",\"description\":\"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/gb-en\/services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Continuous protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/\",\"name\":\"Capgemini UK\",\"description\":\"Get the future you want\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Continuous protection | Scalable, adaptive cybersecurity by Capgemini","description":"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","og_locale":"en_GB","og_type":"article","og_title":"Continuous protection","og_description":"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.","og_url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","og_site_name":"Capgemini UK","article_modified_time":"2026-04-28T07:21:51+00:00","og_image":[{"width":2880,"height":1800,"url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","name":"Continuous protection | Scalable, adaptive cybersecurity by Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/gb-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg","datePublished":"2022-07-08T08:48:02+00:00","dateModified":"2026-04-28T07:21:51+00:00","description":"Capgemini\u2019s Continuous Protection services secure data, infrastructure, and users across IT, OT, and cloud\u2014ensuring future-ready, scalable defense.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#primaryimage","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Services","item":"https:\/\/www.capgemini.com\/gb-en\/services\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Continuous protection"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/gb-en\/#website","url":"https:\/\/www.capgemini.com\/gb-en\/","name":"Capgemini UK","description":"Get the future you want","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Continuous protection","url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini UK","logo":""},"keywords":[],"dateCreated":"2022-07-08T08:48:02Z","datePublished":"2022-07-08T08:48:02Z","dateModified":"2026-04-28T07:21:51Z"},"rendered":"<meta name=\"parsely-title\" content=\"Continuous protection\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-protection\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-07-08T08:48:02Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":555962,"url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/","url_meta":{"origin":561114,"position":0},"title":"Cybersecurity","author":"translator0services","date":"April 9, 2021","format":false,"excerpt":"Cybersecurity FacebookLinkedin Continuous resilience for tomorrow\u2019s threats. Cybersecurity is no longer just a defensive measure \u2013 it\u2019s a strategic enabler of growth, innovation, and trust. At Capgemini, we help you shift the narrative from risk and cost to resilience and opportunity. We deliver what\u2019s most elusive in cybersecurity today: trust.\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":561120,"url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-vigilance\/","url_meta":{"origin":561114,"position":1},"title":"Continuous vigilance","author":"translator0services","date":"April 9, 2021","format":false,"excerpt":"Continuous vigilance FacebookLinkedin Proactive threat detection, response, and continuous risk reduction \u2013 powered by global expertise and advanced automation. Cyber threats don\u2019t rest. Neither should your defenses. As attack surfaces expand and adversaries grow more sophisticated, enterprises need security operations that are as agile and relentless as the threats they\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":559654,"url":"https:\/\/www.capgemini.com\/gb-en\/about-us\/management-and-governance\/responsible-business\/cybersecurity\/","url_meta":{"origin":561114,"position":2},"title":"Cybersecurity and data protection","author":"translator0aboutus","date":"August 24, 2021","format":false,"excerpt":"Protecting our company, our employees, and our clients.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/08\/Capgemini_about-us_CyberSecurity-and-dataProtection.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/08\/Capgemini_about-us_CyberSecurity-and-dataProtection.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/08\/Capgemini_about-us_CyberSecurity-and-dataProtection.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/08\/Capgemini_about-us_CyberSecurity-and-dataProtection.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":633706,"url":"https:\/\/www.capgemini.com\/gb-en\/solutions\/continuous-touchless-planning\/","url_meta":{"origin":561114,"position":3},"title":"Continuous touchless planning","author":"translator0solutions","date":"November 2, 2023","format":false,"excerpt":"SolutionContinuous touchless planningDownload report2 MB pdf FacebookLinkedinWhen the COVID-19 crisis spread its footprint globally, manufacturers were left grappling with issues of short or no supply of raw materials, transportation disruptions, and employee shortages. Now, organisations must focus on crisis response and recovery to survive, while also taking the steps to\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/09\/Capgemini_Solutions_Connected-supply-and-fulfillment_Touchless-planning.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/09\/Capgemini_Solutions_Connected-supply-and-fulfillment_Touchless-planning.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/09\/Capgemini_Solutions_Connected-supply-and-fulfillment_Touchless-planning.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/09\/Capgemini_Solutions_Connected-supply-and-fulfillment_Touchless-planning.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":575837,"url":"https:\/\/www.capgemini.com\/gb-en\/solutions\/rise-with-sap\/","url_meta":{"origin":561114,"position":4},"title":"RISE with SAP","author":"translator0solutions","date":"June 3, 2022","format":false,"excerpt":"Welcome to where transformation is your everyday business","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"RISE with SAP","src":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/06\/RISE-with-SAP-2880x1800-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/06\/RISE-with-SAP-2880x1800-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/06\/RISE-with-SAP-2880x1800-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/06\/RISE-with-SAP-2880x1800-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":561116,"url":"https:\/\/www.capgemini.com\/gb-en\/services\/cybersecurity\/continuous-strategy-grc\/","url_meta":{"origin":561114,"position":5},"title":"Continuous strategy GRC","author":"translator0services","date":"April 9, 2021","format":false,"excerpt":"Continuous strategy, governance, risk and compliance FacebookLinkedinSecure by strategy. Resilient by design.Cybersecurity today is not just about defense \u2013 it\u2019s about enabling secure growth. Continuous Strategy, Governance, Risk and Compliance services by Capgemini help you embed security into the DNA of your organization \u2013 so you can grow with confidence,\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2021\/04\/Cyber-resilience-web-banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini UK","distributor_original_site_url":"https:\/\/www.capgemini.com\/gb-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/pages\/561114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/comments?post=561114"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/pages\/561114\/revisions"}],"predecessor-version":[{"id":712587,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/pages\/561114\/revisions\/712587"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/pages\/555962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media\/695094"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media?parent=561114"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/brand?post=561114"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/partner_type?post=561114"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/service?post=561114"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/industry?post=561114"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/partners?post=561114"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/page-type?post=561114"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/content-group?post=561114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}