{"id":503822,"date":"2021-04-09T14:37:43","date_gmt":"2021-04-09T14:37:43","guid":{"rendered":"https:\/\/www.capgemini.com\/?page_id=517766"},"modified":"2026-01-19T15:26:53","modified_gmt":"2026-01-19T15:26:53","slug":"continuous-vigilance","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","title":{"rendered":"Continuous vigilance"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Continuous vigilance<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/&amp;text=Continuous vigilance\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/&amp;text=Continuous vigilance\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Proactive threat detection, response, and continuous risk reduction \u2013 powered by global expertise and advanced automation.<\/h2><p class=\"intro-para-content\">Cyber threats don\u2019t rest. Neither should your defenses. As attack surfaces expand and adversaries grow more sophisticated, enterprises need security operations that are as agile and relentless as the threats they face. Continuous Vigilance services by Capgemini delivers round-the-clock protection \u2013 from advanced threat hunting to managed detection and response, we empower your teams to detect faster, respond smarter, and recover stronger \u2013 minimizing impact while strengthening long-term security posture.<br><br>With our Continuous Vigilance services, you gain clarity, confidence, and control needed to operate securely \u2013 today and into the future.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-client-stories section-client-stories\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"clientblock-title\"><\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"slider-nav-wrapper smallDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next \" aria-label=\"Slider next\"><\/button><\/div><\/div><div class=\"slider-list\"><div class=\"slide active\">\n\t\t\t<div class=\"slide-bg-wrapper\">\n\t\t\t\t<picture><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=2880&amp;quality=70 2x\"\n\t\t\t\tmedia=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=2880&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=2048&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=480&amp;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg?w=960&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 0)\"\/><img decoding=\"async\" loading=\"lazy\" class=\"slide-bg\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2019\/08\/Capgemini_Client-Story_Utility-leader-builds-cybersecurity-powerhouse.jpg\" alt=\"\"\n\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\"\n\t\t\/><\/picture><div class=\"slide-reveal\"><\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"slide-info-wrapper\">\n\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t<div class=\"col-12 col-lg-6\">\n\t\t\t\t\t\t\t<div class=\"slide-info\">\n\t\t\t\t\t\t\t\t<a aria-label=\"Utility leader builds cybersecurity powerhouse\"\n\t\t\t\t\t\t\t\t   href=\"https:\/\/www.capgemini.com\/pt-en\/news\/client-stories\/utility-leader-builds-cybersecurity-powerhouse\/\">\n\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"client-subtitle\">Utility leader builds cybersecurity powerhouse<\/h3>\n\t\t\t\t\t\t\t\t\t\t<p>How does one of the top 10 energy and utility company with static perimeter defenses become a world leader in cybersecurity ?<\/p>\n\t\t\t\t\t\t\t\t\t<\/div><!-- End of box-->\n\t\t\t\t\t\t\t\t<\/a><div class=\"slide-info-footer\">\n                                <div class=\"brand-logo-wrapper\"><\/div>\n\t\t\t<div class=\"content-more\">\n\t\t\t\t<a class=\"cta-button\" href=\"https:\/\/www.capgemini.com\/pt-en\/news\/client-stories\/utility-leader-builds-cybersecurity-powerhouse\/\" aria-label=\"Read more about Utility leader builds cybersecurity powerhouse\"><span>Read more<\/span><\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div><!-- End of slide info-->\n<\/div>\n<\/div>\n<\/div>\n<\/div><!-- End of container-->\n\n<\/div><!-- End of slide active -->\n<\/div><div class=\"slider-nav-wrapper largeDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"content-title\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">What we do<\/h2><\/div><p><\/p><\/div><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Managed detection and Response (MDR)<\/h3><\/div><div class=\"expander-content\"><p>Our MDR services provide 24\/7 monitoring and rapid response, leveraging AI-driven analytics and automation to detect and contain threats in real time. We help you reduce dwell time, accelerate incident resolution, and maintain business continuity.<br><br><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Managed SOC and SOC Transformation<\/h3><\/div><div class=\"expander-content\"><p>Delivered through our global Cyber Defense Centers, our Managed SOC services offer around-the-clock threat monitoring, analysis, and response. We also help modernize and transform your in-house SOC with advanced tooling, processes, and skilled resources to meet today\u2019s security demands.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber Defense Center link\" href=\"https:\/\/www.capgemini.com\/solutions\/cyber-defense-center\/\" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber Defense Center<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Digital Forensics and Incident Response (DFIR)<\/h3><\/div><div class=\"expander-content\"><p>When a breach occurs, speed and precision are critical. Our DFIR teams deliver immediate response, forensic investigation, and root cause analysis to minimize impact, reduce recovery time, and preserve your organization\u2019s reputation.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Threat Hunting<\/h3><\/div><div class=\"expander-content\"><p>Our expert threat hunters go beyond alerts to uncover hidden threats and advanced persistent threats (APTs) lurking in your environment. Using behavioral analytics, threat intelligence, and hypothesis-driven investigation, we help you stay one step ahead of attackers.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Threat Hunting services link\" href=\"https:\/\/www.capgemini.com\/solutions\/capgeminis-threat-hunting-services\/\" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Threat Hunting services<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Vulnerability Management<\/h3><\/div><div class=\"expander-content\"><p>We help you identify, assess, and remediate vulnerabilities across your digital estate. By aligning remediation efforts with business impact and threat context, we ensure your resources are focused where they matter most.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Penetration Testing<\/h3><\/div><div class=\"expander-content\"><p>We simulate real-world cyberattacks to identify exploitable vulnerabilities in your systems, applications, and networks. Our ethical hackers help you uncover security gaps before adversaries do \u2013 strengthening your defenses with actionable insights.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Red\/Purple Teaming<\/h3><\/div><div class=\"expander-content\"><p>Our offensive security experts simulate real-world attacks to test your defenses and uncover weaknesses. Through Red and Purple Teaming exercises, we provide actionable insights to enhance your detection, response, and overall cyber resilience.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 22f3c911-735f-4f24-81d7-47869c9584ba\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cyber Defense Centers powered by Microsoft Sentinel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCyber Defense Centers powered by Microsoft Sentinel\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"We help our clients keep their systems, applications, and data protected, day and night.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWe help our clients keep their systems, applications, and data protected, day and night.<br>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"Take a look about Cyber Defense Centers powered by Microsoft Sentinel\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"\/pt-en\/insights\/research-library\/making-zero-trust-practical\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tTake a look\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_research-and-insights_On-Demand-Webinar_Making-Zero-Trust-Practical.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 50% 50%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Vehicle SOC (V-SOC)<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Transforming Automotive Security<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/n12lmxHu2l0?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/MmKOmZ6hVjI?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Global threat intelligence<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">We can help eliminate threats swiftly \u2013 and before it\u2019s too late.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Research and insights<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/boosting-cybersecurity-immunity-confronting-cybersecurity-risks-in-todays-work-from-home-world\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/04\/Capgemini_CRI_BOOSTING-CYBERSECURITY-IMMUNITY.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/boosting-cybersecurity-immunity-confronting-cybersecurity-risks-in-todays-work-from-home-world\/\" aria-label=\"Boosting cybersecurity immunity in today&#039;s work-from-home world\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Report<\/div>\n                                <h3 class=\"card-title\">Boosting cybersecurity immunity in today&#039;s work-from-home world<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/future-role-of-the-ciso-basement-or-boardroom\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2020\/07\/Capgemini_Industries_Capital-Markets_Wealth-Management_2.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/ai-applications-podcast-series\/\" aria-label=\"AI applications: Expert insights from Capgemini and IBM\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Podcast series<\/div>\n                                <h3 class=\"card-title\">AI applications: Expert insights from Capgemini and IBM<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/research-library\/future-role-of-the-ciso-basement-or-boardroom\/\" aria-label=\"The future role of the CISO: The basement or the boardroom?\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Analyst view point<\/div>\n                                <h3 class=\"card-title\">The future role of the CISO: The basement or the boardroom?<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Fireside chat<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Artificial Intelligence (AI) in security operations.<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/4TVplJFSXzs?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Expert Perspectives<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\" aria-label=\"5 advices\/tips for secure an Industrial system\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2022\/07\/data-hubs-banner.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/5-advices-tips-for-secure-an-industrial-system\/\" aria-label=\"5 advices\/tips for secure an Industrial system\"><h3 class=\"expert-subtitle\">5 advices\/tips for secure an Industrial system<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">Jun 14, 2022<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/digital-trust-is-the-heartbeat-of-public-sector-transformation\/\" aria-label=\"Digital trust is the heartbeat of public sector transformation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/11\/Capgemini_Expert-Perspectives_Digital-trust-is-the-heartbeat-of-public-sector-transformation.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/digital-trust-is-the-heartbeat-of-public-sector-transformation\/\" aria-label=\"Digital trust is the heartbeat of public sector transformation\"><h3 class=\"expert-subtitle\">Digital trust is the heartbeat of public sector transformation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">Nov 10, 2021<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/mastering-the-critical-art-of-cybersecurity-in-automotive\/\" aria-label=\"Mastering the critical art of cybersecurity in Automotive\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/11\/Capture-9.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/pt-en\/insights\/expert-perspectives\/mastering-the-critical-art-of-cybersecurity-in-automotive\/\" aria-label=\"Mastering the critical art of cybersecurity in Automotive\"><h3 class=\"expert-subtitle\">Mastering the critical art of cybersecurity in Automotive<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2021\/05\/Geert-van-der-Linden-2.png?w=360\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Geert van der Linden<\/div><div class=\"date-text\">Nov 3, 2021<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Meet our Experts<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/11\/Mona-Ghadiri.jpg\" alt=\"Mona Ghadiri\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/monaghadiri\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Mona Ghadiri<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Vice President, Global Offer Lead for Cybersecurity Defense<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/monaghadiri\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Mona is a three-time Microsoft Security MVP, recognized for expertise in SIEM, XDR, and Security Copilot. She has led development of Microsoft-based cyber services and now focuses on SOC transformation, pragmatic AI in security, and talent development. A global speaker and advocate for women in AI and cybersecurity, she serves on multiple Microsoft community boards. Mona holds a BA and MBA and brings a unique blend of product leadership, engineering, and industry recognition.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"partner-heading\">Partners<\/h2><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/pt-en\/about-us\/partnerships\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM puts smart to work. Capgemini helps you make the most of it.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/06\/IBM-logo.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/pt-en\/about-us\/partnerships\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Working together to help companies boost business value with cloud-powered solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/07\/purepng.com-microsoft-logologobrand-logoiconslogos-251519939132du80p.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/pt-en\/about-us\/partnerships\/oracle\/\" class=\"partner-box-title\" aria-label=\"Business with imagination. We shape powerful Oracle technology to create winning solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/07\/Oracle-Logo.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/pt-en\/about-us\/partnerships\/sap\/\" class=\"partner-box-title\" aria-label=\"Unlock growth, agility and value with a proven partner. 40+ years of SAP expertise.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/07\/SAP_2011_logo.svg.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":119,"featured_media":0,"parent":487551,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"7e82a419-ed06-4990-9175-7d20ab898c16\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":false,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[162],"content-group":[],"class_list":["post-503822","page","type-page","status-publish","hentry","page-type-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Continuous vigilance | 24\/7 Threat detection and response by Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini&#039;s Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous vigilance\" \/>\n<meta property=\"og:description\" content=\"Capgemini&#039;s Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Portugal\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T15:26:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\",\"name\":\"Continuous vigilance | 24\/7 Threat detection and response by Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\",\"datePublished\":\"2021-04-09T14:37:43+00:00\",\"dateModified\":\"2026-01-19T15:26:53+00:00\",\"description\":\"Capgemini's Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Continuous vigilance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/pt-en\/\",\"name\":\"Capgemini\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/583bff1c49fe01875935cc65c5c38e00\",\"name\":\"translator0services\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/701e58d1297df64619bfdd5ff0389404c410576b620ad93152f3e3f400287bb3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/701e58d1297df64619bfdd5ff0389404c410576b620ad93152f3e3f400287bb3?s=96&d=mm&r=g\",\"caption\":\"translator0services\"},\"url\":\"https:\/\/www.capgemini.com\/pt-en\/author\/translator0services\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Continuous vigilance | 24\/7 Threat detection and response by Capgemini","description":"Capgemini's Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","og_locale":"en_US","og_type":"article","og_title":"Continuous vigilance","og_description":"Capgemini's Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.","og_url":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","og_site_name":"Capgemini Portugal","article_modified_time":"2026-01-19T15:26:53+00:00","og_image":[{"url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","url":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","name":"Continuous vigilance | 24\/7 Threat detection and response by Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/pt-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg","datePublished":"2021-04-09T14:37:43+00:00","dateModified":"2026-01-19T15:26:53+00:00","description":"Capgemini's Continuous Vigilance services provide proactive, AI-powered detection, response, and risk reduction\u2014delivering always-on protection at scale.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#primaryimage","url":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg","contentUrl":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/uploads\/sites\/42\/2025\/10\/Cyber-resilience-web-banner_265023.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/pt-en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.capgemini.com\/pt-en\/services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Continuous vigilance"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/pt-en\/#website","url":"https:\/\/www.capgemini.com\/pt-en\/","name":"Capgemini","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/pt-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/583bff1c49fe01875935cc65c5c38e00","name":"translator0services","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/pt-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/701e58d1297df64619bfdd5ff0389404c410576b620ad93152f3e3f400287bb3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/701e58d1297df64619bfdd5ff0389404c410576b620ad93152f3e3f400287bb3?s=96&d=mm&r=g","caption":"translator0services"},"url":"https:\/\/www.capgemini.com\/pt-en\/author\/translator0services\/"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Continuous vigilance","url":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Portugal","logo":""},"keywords":[],"dateCreated":"2021-04-09T14:37:43Z","datePublished":"2021-04-09T14:37:43Z","dateModified":"2026-01-19T15:26:53Z"},"rendered":"<meta name=\"parsely-title\" content=\"Continuous vigilance\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/pt-en\/services\/cybersecurity\/continuous-vigilance\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-pub-date\" content=\"2021-04-09T14:37:43Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/pt-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","featured_image_alt":false,"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Portugal","distributor_original_site_url":"https:\/\/www.capgemini.com\/pt-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/pages\/503822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/comments?post=503822"}],"version-history":[{"count":17,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/pages\/503822\/revisions"}],"predecessor-version":[{"id":536021,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/pages\/503822\/revisions\/536021"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/pages\/487551"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/media?parent=503822"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/brand?post=503822"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/partner_type?post=503822"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/service?post=503822"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/industry?post=503822"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/partners?post=503822"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/page-type?post=503822"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/pt-en\/wp-json\/wp\/v2\/content-group?post=503822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}