Skip to Content

Protect

How do you design and deploy the right cybersecurity defenses? There are multiple considerations: products, technologies, costs, users, locations, integration, supply chain, compliance implications… and more!

Our Protect services portfolio enables you to deploy solutions addressing your business goals while protecting critical data, environments, systems, and users. Our services are tailored to your specific business and technology requirements, typically based on the findings of our consulting.

Our fast-track approach

Helping you manage and take control of your people and asset rights.

They are designed to drive effective cybersecurity controls in all environments across IT, Cloud, and OT; take full advantage of the latest cybersecurity innovations and deliver a higher return-on-investment from your existing capabilities; and enhance protection – with minimal disruption to your business.

Embrace technology and capabilities to protect your business.

What we do

With our Identity and Access Management (IAM) services, you can manage cybersecurity risks, and gain control.

Take advantage of our Identity-as-a-Service and Application Security Testing solutions to protect your employees, your customers, your applications, and all the data your business depends on.

With us, know how to make IAM your first line of cyber defense – and secure your applications.

Regardless of what environments you leverage to operate your business, we can implement the technology and controls to protect it.

Our Cloud Security Services can help you at every step of your transformation and migration strategy.

Our network segmentation services can build fundamental security controls into your critical production environments, and we can drive operational maturity throughout your IT security platforms.

Our Cloud Security Services can help you at every step of your transformation and migration strategy. Our Network Segmentation Services can build fundamental security controls into your critical production environments, and we can drive operational maturity throughout your IT security platforms. 

With us, know how to secure your end-to-end cloud journey, protect your critical infrastructure with our converged OT/IT/IIoT solutions, and achieve network optimization across IT and OT/IoT networks.

Our secure IoT/OT services

See how we use convergence to secure your IoT deployments.

Expert perspectives

Cloud, Cybersecurity

Looking to improve business agility? Start with a move to cloud security

Geert van der Linden
19 Apr 2021
Cybersecurity

Insider Threats: Getting to the left of Boom!

Dan Leyman
15 Feb 2021
Cybersecurity

Cybersecurity: Don’t trust anyone

Geert van der Linden
25 Nov 2020

Meet our experts

Nicolas Castellon

Expert in Cybersecurity

Erik Colliander

Head of Cybersecurity Center of Excellence
Erik is a senior security expert with around 25 years of experience in the information technology industry with business knowledge from many sectors (such as?) and with the main focus being the security area. With a broad perspective as well as in depth knowledge spanning over many related areas in the cybersecurity field the Cybersecurity CoE is a valuable task force to bring into both existing challenges, providing a holistic and long term approach to security in engagements as well as help drive new business.

Øystein Hermansen

Identity and access specialist
Øystein Hermansen is a security architect at Capgemini and is a part of the Capgemini Center Of Excellence for Cybersecurity for the Nordics. His key areas are identity and access management, governance, security architecture for cloud and hybrid platforms, and development of security policies for customers. He has worked with security, both technically and organisationally, for over 20 years, with wide experience from both public and private sector.

Hanne Bruleite

Identity & Access Specialist and People Manager, part of the Cybersecurity Team in Capgemini Norway
Hanne M. Bruleite is a part of the Cybersecurity team in Norway. Her main focus is on Identity and Access Management (IAM), a crucial discipline within security for any organization, for one of Capgemini Norways most strategic clients in the energy sector. As an Account Cyber Security Officer (ACSO) she is also ensuring that deliveries are done securely and in compliance with policies and contract responsibilities. Hanne is passionate about raising security awareness and sharing cybersecurity knowledge.

Bjørne Brekke

Cybersecurity Business & Technology Advisor
Bjørne is a principal cybersecurity business and technology advisor with 20 years of experience in Identity and Access Management (IAM) technologies and projects.