DEBUG: PAGE=domain, TITLE=View all Vendors,ID=1466,TEMPLATE=vendors
toggle expanded view
VENDORID = -1
VENDOR =
VENDORparam =
Title = View all Vendors
Description =

Search across all vendors:

Capgemini - Cyber Resiliency Services

Vendor Analysis

by Mike Smart

published on Dec 14, 2020

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

This NelsonHall vendor assessment analyzes Capgemini's offerings and capabilities in Cyber Resiliency Services 

Who is this Report for:

NelsonHall’s cyber resiliency services profile on Capgemini is a comprehensive assessment of Capgemini’s offerings and capabilities, designed for:

  • Sourcing managers monitoring the capabilities of existing suppliers of cyber resiliency and identifying vendor suitability for security services RFPs
  • Vendor marketing, sales, and business managers looking to benchmark themselves against their peers
  • Financial analysts and investors specializing in the cyber resiliency sector.

Scope of this Report:

The report provides a comprehensive and objective analysis of Capgemini’s cyber resiliency services offerings and capabilities, and market and financial strengths, including:

  • Identification of the company’s strategy, emphasis, and new developments
  • Analysis of the company’s strengths, weaknesses, and outlook
  • Revenue estimates
  • Analysis of the profile of the company’s customer base including the company’s targeting strategy and examples of current contracts
  • Analysis of the company’s offerings and key service components
  • Analysis of the company’s delivery organization including the location of delivery locations.

Key Findings & Highlights:

This NelsonHall vendor assessment analyzes Capgemini’s offerings and capabilities in cyber resiliency services. Capgemini offers a range of cybersecurity services, including:

  • Define Services
    • Strategy: strategic consulting, operational consulting, secure IoT/IT services
    • Assessment: assessments for secure remote working, IAM FastTrack, endpoint security, cyber-attack simulation, cloud security assessment, data classification, cyber defense maturity evaluation, penetration testing, red teaming, and threat simulation, industrial systems and IoT assessment, Compliance aaS
  • Protect services: point security solutions, and the deployment of security solutions for application security testing, vulnerability scanning, insider threat intelligence, automotive cybersecurity, insider risk services, secure IoT/IT deployment
  • Defend managed services: cyber defense center operations, endpoint protection aaS, DLP, cloud security, IDaaS, Threat intelligence, network security management, vulnerability management, One Security portal, MDR, secure IoT/IT management and cyber insurance for example.

Login to get full access:

close