{"id":593,"date":"2020-01-28T17:42:51","date_gmt":"2020-01-28T16:42:51","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/exhibitors"},"modified":"2020-01-30T14:42:07","modified_gmt":"2020-01-30T13:42:07","slug":"exhibitors","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors","title":{"rendered":"Exhibitors"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-593\" data-title=\"Exhibitors\" data-anim=\"ms:1000;r:0;\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumedia.blob.core.windows.net\/itsm\/sites\/17\/2022\/04\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-593-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>Exhibitors<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-593-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_section][vc_row][vc_column]\r\n\t\t\t<div class=\"weyou-exhibitors-shorcode\" style=\"display: none;\">\r\n\t\t\t<div class=\"weyou-exhibitors-toolbar\">\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-filter\">\r\n\t\t\t\t\t\t<div class=\"filter-toggler\">Filter by Activity \/ Print my Visit Tour<\/div>\r\n\t\t\t\t\t\t<div class=\"filter-holder\">\r\n\t\t\t\t\t\t\t<div><label><input type=\"checkbox\" value=\"cybersecurity\"\/>CYBERSECURITY<\/label><label><input type=\"checkbox\" value=\"cloud-computing\"\/>CLOUD COMPUTING<\/label><label><input type=\"checkbox\" value=\"data-center\"\/>DATA CENTER<\/label><label><input type=\"checkbox\" value=\"networks-and-telecoms\"\/>NETWORKS AND TELECOMS<\/label><label><input type=\"checkbox\" value=\"managed-services\"\/>MANAGED SERVICES<\/label><label><input type=\"checkbox\" value=\"print-document\"\/>PRINT \/ DOCUMENT <\/label><label><input type=\"checkbox\" value=\"mobility\"\/>MOBILITY<\/label><label><input type=\"checkbox\" value=\"consulting-and-training\"\/>CONSULTING AND TRAINING<\/label>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div><!-- .filter-holder -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitors-filter -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-sort\">\r\n\t\t\t\t\t\t<span class=\"option-label\">Sort<\/span>\r\n\t\t\t\t\t\t<select class=\"sort\">\r\n\t\t\t\t\t\t\t<option value=\"asc\" selected>Company name A-Z<\/option>\r\n\t\t\t\t\t\t\t<option value=\"desc\">Company name Z-A<\/option>\r\n\t\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<span class=\"option-label\">Per page<\/span>\r\n\t\t\t\t\t<select class=\"perpage\">\r\n\t\t\t\t\t\t<option value=\"10\">10<\/option>\r\n\t\t\t\t\t\t<option value=\"15\" selected>15<\/option>\r\n\t\t\t\t\t\t<option value=\"30\">30<\/option>\r\n\t\t\t\t\t\t<option value=\"60\">60<\/option>\r\n\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<span class=\"option-label\">Layout<\/span>\r\n\t\t\t\t\t<div class=\"layout-switcher\">\r\n\t\t\t\t\t\t<a href=\"#\" class=\"grid-layout active\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm0-80h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133ZM200-413h133v-134H200v134Zm213 0h134v-134H413v134Zm214 0h133v-134H627v134ZM200-627h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"list-layout\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M760-360v-80H200v80h560Zm0-160v-80H200v80h560Zm0-160v-80H200v80h560ZM200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm560-80v-80H200v80h560Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t<\/div><!-- .layout-switcher -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t<\/div><!-- .weyou-exhibitors-toolbar -->\r\n\t\t\t<div class=\"weyou-exhibitors-container grid-layout columns-5\">\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:10000\" data-exhibitor-name=\"42k-io\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c3a2d81e-22e5-409b-9ce7-e6d0e7a2fbe6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">42K.IO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/42k.io\/\" target=\"_blank\">https:\/\/42k.io\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Partner<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> 42k.io, the European repository dedicated to cybersecurity: is this cyber solution really worthy of our trust?<br \/>\r\n With over 200 solutions listed, 42k.io simplifies selection and evaluation, while helping you reflect on issues of dependency and strategic autonomy by analyzing the risks posed by cyber solutions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9999\" data-exhibitor-name=\"6cure\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/eeac5346-a8f2-41e9-ba6c-6df8e8ae9b10.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">6CURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.6cure.com\" target=\"_blank\">https:\/\/www.6cure.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> 6cure, a French provider specializing in the protection of critical networks and DNS infrastructures, supports you in detecting and mitigating multifaceted DDoS attacks.<br \/>\r\nWith this expertise, 6cure also offers a DDoS audit service designed to assess the resilience of infrastructures to these attacks in a controlled environment.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9998\" data-exhibitor-name=\"abnormal-ai\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/79826aae-6e6a-46e2-811d-e9eb2d0ad3f2.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ABNORMAL AI<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/abnormal.ai\/\" target=\"_blank\">https:\/\/abnormal.ai\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H41<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Abnormal AI is a leader in cloud email security, built natively on AI. Powered by a cloud-native API architecture and behavioral AI, the platform detects and neutralizes advanced attacks, BEC, and vendor fraud missed by traditional solutions. It reduces incidents, false positives, and operational costs for CISO and CIO teams.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity print-document mobility networks-and-telecoms\" style=\"z-index:9997\" data-exhibitor-name=\"acco-brands-esselte-kensington\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a547d0be-db63-4b3d-846d-2000b3b8e6b6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ACCO BRANDS (ESSELTE) - KENSINGTON<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.accobrands.com%20\" target=\"_blank\">www.accobrands.com <\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J27-J29<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Kensington, est leader dans la s\u00e9curit\u00e9 physique des environnements IT, et l'inventeur du cable de s\u00e9curit\u00e9 pour PC. Nous proposons des solutions qui favorisent la s\u00e9curit\u00e9 des postes IT  (Filtres \u00e9crans, claviers, casques, souris, bras ecrans, sacoches, cl\u00e9s biometriques, webcams, station acceuil PC universelles) et conformes \u00e0 la norme NIS2.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PRINT \/ DOCUMENT <\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9996\" data-exhibitor-name=\"acknowledge\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d33a5a4b-77c1-40d3-9fed-7514438efe35.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ACKNOWLEDGE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.acknowledge.fr\" target=\"_blank\">www.acknowledge.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ACKnowledge is a cybersecurity integrator specializing in Zero Trust, SOC, and Cloud Security. The company helps organizations protect their systems, detect threats, and secure their IT environments, leveraging leading vendors and strong field expertise.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9995\" data-exhibitor-name=\"action1\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/39e6b406-eaa9-492d-b469-78fcff166d3f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ACTION1<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.action1.com\/\" target=\"_blank\">https:\/\/www.action1.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H38<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Action1 is an autonomous endpoint management platform trusted by many Fortune 500 companies. It automates OS and third-party patching through peer-to-peer distribution and real-time vulnerability assessment, with no VPN required. Cloud-native, infinitely scalable, highly secure, and configurable in 5 minutes\u2014it just works and is free for the first <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9994\" data-exhibitor-name=\"adista\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/0ae4556c-ed2b-4b6f-9b51-83ceef23eeb2.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ADISTA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.adista.fr\" target=\"_blank\">www.adista.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D16<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Your IT is our business.<br \/>\r\n<br \/>\r\nOur expertise in cloud, connectivity, cybersecurity, communication, and collaboration delivers value across the entire technical chain of your Information System.<br \/>\r\n<br \/>\r\nExpertise strengthened with Devensys Cybersecurity and Upper-Link.<br \/>\r\n<br \/>\r\n40 local agencies<br \/>\r\n1,000+ employees<br \/>\r\n16 sovereign data centers<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9993\" data-exhibitor-name=\"aisi\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/00d6e430-91fd-4cbb-94e0-e434fd07fad4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AISI<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.aisi.fr\" target=\"_blank\">www.aisi.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> AISI is an independent cybersecurity player specializing in cybersecurity support and protection for SMEs, mid-sized companies, and public institutions.<br \/>\r\nWith 10 years of experience, a multidisciplinary team of experts, and a capacity for innovation, AISI is the partner of choice for organizations most vulnerable to cyber threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9992\" data-exhibitor-name=\"akamai\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b3558ec4-1f1a-4884-9908-cefe0859a958.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AKAMAI <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.akamai.fr\" target=\"_blank\">www.akamai.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F16-G15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Akamai is the cybersecurity and cloud computing company that powers and protects business online. Our market-leading security solutions, superior threat intelligence, and global operations team provide defense in depth to safeguard enterprise data and applications everywhere. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9991\" data-exhibitor-name=\"algosecure\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/cef6ddc0-d78e-445d-ab6e-b3c21d2c13bb.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ALGOSECURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.algosecure.fr\/\" target=\"_blank\">https:\/\/www.algosecure.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> AlgoSecure, an independent French cybersecurity expert since 2008, PASSI-qualified and ISO 27001-certified. We support IT and information security managers with pragmatic and efficient cybersecurity, based on personalised support to reduce real risks and secure what matters most.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9990\" data-exhibitor-name=\"all4tec\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6c1c2041-5006-4868-8aa4-0268ac1ab4a6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ALL4TEC<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.all4tec.com\" target=\"_blank\">www.all4tec.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ALL4TEC, a leading French software vendor in cyber risk management, offers Agile Risk Manager, the first ANSSI-certified platform based on the EBIOS Risk Manager method. Used across Defense, Space, Banking, and Healthcare, it supports your Governance, Risk, and Compliance strategy.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9989\" data-exhibitor-name=\"allentis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/27ff50ec-6877-4b51-9094-de9b31c27927.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ALLENTIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.allentis.eu\" target=\"_blank\">www.allentis.eu<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A16<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> allentis is a French company providing cybersecurity solutions. Their solutions are designed to collect IP traffic for visibility and threat detections. allentis provides Virtual Tap, Qualified Tap, security appliance, Netflow appliance and applications performance appliance. Most of their solutions are ANSSI elementary qualified and CSPN<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9988\" data-exhibitor-name=\"anozr-way\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/86206aa3-9acd-4971-aae4-c4306cda6c15.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ANOZR WAY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/anozrway.com\/fr\/\" target=\"_blank\">https:\/\/anozrway.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ANOZR WAY is a software editor specialising in the Human Risk Management. ANOZR WAY software solutions enable CISOs to assess and reduce cyber human risks and involve managers and employees in mitigating their professional and personal vulnerabilities.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9987\" data-exhibitor-name=\"antemeta-netapp\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f5cf3fed-8a1d-42b9-871e-ef54b2f72506.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ANTEMETA \/ NETAPP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.antemeta.fr\" target=\"_blank\">www.antemeta.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B28<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> AntemetA is one of the French leaders in digital performance and resilience. Sovereign by design, AntemetA designs, hosts, and operates trusted infrastructures, cloud services, cyber-resilience, and AI solutions in France, ensuring data control, business continuity, and the strategic independence of critical systems.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9986\" data-exhibitor-name=\"apixit\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5cc988e7-060d-40f8-ad25-e69a2470caaf.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">APIXIT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.apixit.fr\" target=\"_blank\">www.apixit.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F10-G09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> With over 30 years of expertise in infrastructure and cybersecurity solutions, APIXIT supports the implementation of IT resources required for the activities of mid-sized companies and large public and private accounts through a tailored range of solutions and services: Consulting, Project Management, Integration, Managed Services.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9985\" data-exhibitor-name=\"arcad-software\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/71745434-7723-4cbd-a374-6deec5ed1482.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ARCAD SOFTWARE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.arcadsoftware.fr\/\" target=\"_blank\">https:\/\/www.arcadsoftware.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A French software publisher for 34 years, ARCAD Software helps organizations protect personal data. DOT Anonymizer automatically anonymizes data while preserving its usability. Powered by AI, it generates accurate scripts and adapts to Cloud or On-Premise requirements, ensuring GDPR compliance.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9984\" data-exhibitor-name=\"armis-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e783e08e-c238-41f2-8c5b-9805c872494b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ARMIS SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.armis.com\" target=\"_blank\">https:\/\/www.armis.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C19<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Armis, the cyber exposure management & security company, protects the entire attack surface and manages the organization\u2019s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, protect and manage all critical assets \u2013 from the ground to the cloud.  <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9983\" data-exhibitor-name=\"aucae\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/728e2617-6786-451f-a63e-1223fb341c72.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AUCAE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/aucae.com\" target=\"_blank\">https:\/\/aucae.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J32<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> AUCAE is a French SaaS software provider offering sovereign solutions for cyber crisis management and operational resilience. AUCAE supports public and private organizations through Digital crisis response and crisis response simulator, two IT-independent platforms designed to manage, simulate and strengthen cyber crisis response.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9982\" data-exhibitor-name=\"ava6-x-watchguard\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/fee05cbf-f240-4e7a-b773-6efae49d337c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AVA6 X WATCHGUARD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.ava6.fr\" target=\"_blank\">https:\/\/www.ava6.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> AVA6 is a leading French IT services provider, specializing in cybersecurity, infrastructure, managed services, and Cloud solutions.<br \/>\r\nSince 2008, we have supported businesses and public organizations with proximity, expertise, and commitment, delivering tailored solutions to drive their digital transformation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9981\" data-exhibitor-name=\"avanade-accenture\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/35560962-3d23-48e1-b131-fd2b41590d76.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AVANADE ACCENTURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.avanade.com\/fr\" target=\"_blank\">www.avanade.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J40<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Avanade, a global leader and expert in Microsoft digital solutions, is the trusted partner of more than 5,000 clients worldwide. As a Microsoft Global Systems Integrator (Global SI Partner), we combine a global approach with strong local expertise in AI, cloud, data analytics, cybersecurity, and ERP to create impactful, secure. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9980\" data-exhibitor-name=\"avanoo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/241c24fc-54cd-43cd-a92d-8d3a5c233998.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AVANOO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/avanoo.ai\/\" target=\"_blank\">https:\/\/avanoo.ai\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H29<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Avanoo helps enterprises regain control over their SaaS and AI stack. Full visibility, cost reduction, compliance, and usage governance. A platform built for CIOs, CISOs, and IT teams facing Shadow IT and Shadow AI.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity networks-and-telecoms\" style=\"z-index:9979\" data-exhibitor-name=\"axians-druva-sectigo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6de61bbf-2c36-42cd-ad83-8133abdb7c4e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AXIANS | DRUVA | SECTIGO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.axians.com\" target=\"_blank\">www.axians.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I29<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Axians improves the performance of organisations with tailored ICT solutions. The company offers effective, innovative, scalable and sustainable solutions, and supports various sectors in the evolution of their digital infrastructures and solutions, with expertise in telecoms, cloud, cybersecurity and more.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9978\" data-exhibitor-name=\"bconnex\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/93865c19-f044-4394-9a21-3f9d7badeb73.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BCONNEX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/bconnex.fr\/\" target=\"_blank\">https:\/\/bconnex.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Bconnex, a software provider and IT asset management expert, helps companies optimize the entire lifecycle of their equipment \u2014 from supply to recycling.<br \/>\r\nWith our SaaS solution Mobilehub, our clients save money, reduce their carbon footprint, and secure their mobile devices through centralized management.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center print-document\" style=\"z-index:9977\" data-exhibitor-name=\"beta-systems-software-sarl\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6b47e019-486d-41a6-9c15-811dd5d28b36.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BETA SYSTEMS SOFTWARE SARL <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.betasystems.com\" target=\"_blank\">www.betasystems.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Beta Systems is a German software editor, present in France since 1989. We develop software for the automation, operation and security of IT production. For 40 years, major players in all sectors (finance, industry, transportation, retail, public, etc.) have trusted Beta Systems to manage, optimize and secure their IT processes and infrastructure.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>PRINT \/ DOCUMENT <\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9976\" data-exhibitor-name=\"beyondtrust\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/231dddc4-c5cf-46f1-a974-34949724dc23.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BEYONDTRUST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.beyondtrust.com\/fr\" target=\"_blank\">www.beyondtrust.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> BeyondTrust is the global identity security leader protecting Paths to Privilege\u2122. Our<br \/>\r\nidentity centric approach goes beyond securing privileges and access, empowering<br \/>\r\norganizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9975\" data-exhibitor-name=\"bitdefender\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/056a3d48-e233-4c99-9cbe-9ca28102b881.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BITDEFENDER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.bitdefender.fr\" target=\"_blank\">www.bitdefender.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D20-E21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Bitdefender is a leading European cybersecurity publisher that provides cutting-edge solutions for threat prevention, detection, and response. With a view to sovereignty, Bitdefender partnered with OVHcloud in 2025 to host its security platform in France.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity managed-services\" style=\"z-index:9974\" data-exhibitor-name=\"blue-soft-empower\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9cdd48b7-4272-480c-9115-f75c23d005c4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BLUE SOFT EMPOWER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/empower.bluesoft-group.com\/\" target=\"_blank\">https:\/\/empower.bluesoft-group.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H28<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Blue Soft Empower supports organizations and businesses in transforming their ways of working through Microsoft technologies: AI, Copilot, cloud, data, security, Power Platform, and M365. Visit our booth to discover concrete use cases, real\u2011world feedback, and how to accelerate your projects with our experts.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9973\" data-exhibitor-name=\"bluefiles\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ffdd2f28-a5ab-40b2-ae37-f8ac33d4b49a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BLUEFILES<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/bluefiles.com\/fr\" target=\"_blank\">https:\/\/bluefiles.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Forecomm is a 100% French software publisher that publishes the BlueFiles solution to secure files and messages exchanges with end-to-end encryption.BlueFiles received an ANSSI security visa and is hosted SecNumCloud and HDS certified.The values of BlueFiles are based on 4 S: Security, Simplicity, Sovereignty, Sobriety.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9972\" data-exhibitor-name=\"bluesecure\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/999f1972-5a60-4e9b-b1f7-d746c0875e27.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BLUESECURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.bluesecure.fr\/\" target=\"_blank\">https:\/\/www.bluesecure.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J34<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> BlueSecure, a 100% French company and cybersecurity pure player, offers a turnkey platform for personalized awareness programs with engaging content (cybergames, micro-learning, etc.), multi-channel phishing simulations (email, QR code, deepfake, phone calls, etc.), risk monitoring, and innovative in-person training (VR, games, conferences, demo).<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9971\" data-exhibitor-name=\"board-of-cyber\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/771a9727-f0a0-46eb-bbce-34d4c2fdfe64.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BOARD OF CYBER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.boardofcyber.io\/fr\" target=\"_blank\">www.boardofcyber.io\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J02-K03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Board of Cyber resolves a critical paradox: how can you manage your security when 60% of cyberattacks originate from your third-party ecosystem?<br \/>\r\n<br \/>\r\nBoard of Cyber is the only French platform that combines continuous self-assessment with automated TPRM to provide a 360\u00b0 view of the cyber risk facing both the organization and its ecosystem.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity mobility managed-services\" style=\"z-index:9970\" data-exhibitor-name=\"bycyb\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b391e59e-e249-4ee3-bd08-9ac93377d07c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BYCYB<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/bycyb.com\/\" target=\"_blank\">https:\/\/bycyb.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> BYCYB was born from the combination of expertise from LNE and CRYPT.ON IT. It supports players in the middle market and large accounts with a comprehensive and unique offering: certification of systems and products, security audits and testing, consulting and training, complemented by tool-based hardening of OS and Active Directory environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity managed-services\" style=\"z-index:9969\" data-exhibitor-name=\"cegedim\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/48977da3-a957-4c60-83d0-ac2f8dfce87e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CEGEDIM <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cegedim-outsourcing.fr\/\" target=\"_blank\">https:\/\/www.cegedim-outsourcing.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B20<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cegedim, the leading French healthcare software publisher since 1969.<br \/>\r\nCegedim Outsourcing: IT services and solutions focused on workstation management, cybersecurity, managed services, and ITSM.<br \/>\r\nCegedim.cloud: Sovereign Cloud Provider. IaaS and PaaS hosting, managed services, colocation\/housing. SecNumCloud qualification, ISO and HDS certifications<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training networks-and-telecoms managed-services\" style=\"z-index:9968\" data-exhibitor-name=\"centreon-orsenna\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ed388922-f1c4-4fc4-8f24-39e1d0af96a2.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CENTREON - ORSENNA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.orsenna.fr\/\" target=\"_blank\">http:\/\/www.orsenna.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J26<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Centreon and Orsenna combine their expertise to deliver end to end infrastructure monitoring and managed services. Centreon provides an IT Monitoring and Observability platform, while Orsenna delivers hosting, managed services and infrastructure operations, ensuring performance, resilience and security.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9967\" data-exhibitor-name=\"chainguard-inc\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/3eae0a74-fa26-429d-b639-762d478e861c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CHAINGUARD INC<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/chainguard.dev\" target=\"_blank\">https:\/\/chainguard.dev<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J41<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Chainguard is the trusted source for open source. By delivering hardened, secure, and production-ready builds of all the open source software engineers rely on, we help organisations build faster, stay compliant, and eliminate risk. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing managed-services mobility\" style=\"z-index:9966\" data-exhibitor-name=\"chrome-enterprise\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/540d9a35-1526-48ac-924d-40ee42e9b82e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CHROME ENTERPRISE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.google.fr\" target=\"_blank\">www.google.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H42<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Google offers a comprehensive range of modern workstations.<br \/>\r\n<br \/>\r\nWith ChromeOS, businesses benefit from a cloud-native environment that is secure by design and easy to administer. Chrome Enterprise provides the control and governance you need. Finally, Cameyo allows you to run legacy Windows applications without the complexity of VDI.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>MANAGED SERVICES<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9965\" data-exhibitor-name=\"cloudflare\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/688ace72-2a3d-415b-9313-7ecc70e60227.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CLOUDFLARE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cloudflare.com\/fr-fr\/\" target=\"_blank\">www.cloudflare.com\/fr-fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D12-E13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity networks-and-telecoms\" style=\"z-index:9964\" data-exhibitor-name=\"club-informatique-provence-mediterranee\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/054be4b5-f1c6-4ba0-9ede-c7cdbb75b8d4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CLUB INFORMATIQUE PROVENCE M\u00c9DITERRAN\u00c9E<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cip-paca.org\" target=\"_blank\">www.cip-paca.org<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> The IT Decision-Makers Club and their Partners in the South Region.<br \/>\r\n<br \/>\r\n40 events that bring together more than 2,000 participants: after-work gatherings, IT-focused dinners, themed days, etc.<br \/>\r\n400 members<br \/>\r\n4 regions: Alpes-Maritimes, Bouches-du-Rh\u00f4ne, Var, Vaucluse<br \/>\r\n6,200 social media followers<br \/>\r\n24 sponsors per year<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9963\" data-exhibitor-name=\"cohesity\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/68037ca4-c1db-4625-8ebc-2601be64b1ab.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">COHESITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cohesity.com\/FR\" target=\"_blank\">www.cohesity.com\/FR<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I30<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cohesity protects, secures, and provides insights into the world\u2019s data. The leader in AI-powered data security, Cohesity helps organizations strengthen resilience, accelerate recovery, and reduce IT costs. With Zero Trust security and advanced AI\/ML, Cohesity Data Cloud is trusted by customers across the globe, including 70% of the Global 500.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9962\" data-exhibitor-name=\"coreupdate\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/109a99b8-feb9-4088-84bd-37aff1c1d932.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">COREUPDATE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/coreupdate.com\/\" target=\"_blank\">https:\/\/coreupdate.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> CoreUpdate automates Patch Management for third-party software (7-Zip, Adobe, VLC, Firefox, Chrome, etc.).<br \/>\r\nOur SaaS solution integrates agentless with your environment to manage all your apps.<br \/>\r\nCoreUpdate can connect to the leading tools on the market, such as Intune, MECM\/SCCM, Cyberwatch, SentinelOne, VMware, AWS, GCP, Azure, etc.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9961\" data-exhibitor-name=\"coreview\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/bf57219e-3caf-4ede-9fcb-c12b1f896818.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">COREVIEW<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.coreview.com\" target=\"_blank\">www.coreview.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H32<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> CoreView delivers enterprise cyber resilience for Microsoft 365, simplifying and automating admin tasks, detecting wasted spend, and securing single or multi-tenant environments. Trusted by 4,000+ organizations to manage and protect even the world\u2019s largest M365 tenants.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9960\" data-exhibitor-name=\"cribl\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/13e8f630-cf69-4fd9-a93f-2ae0f2d93b30.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CRIBL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cribl.io\/\" target=\"_blank\">https:\/\/www.cribl.io\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cribl helps organisations take control of their data with flexible, vendor-neutral pipelines that route, reduce and enrich telemetry at scale. With Cribl, teams gain visibility, cut costs and accelerate security and observability outcomes while building an AI-ready data foundation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9959\" data-exhibitor-name=\"crowdstrike\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b00b1f84-9abb-40f1-9c21-a708644054ed.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CROWDSTRIKE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.crowdstrike.fr\" target=\"_blank\">https:\/\/www.crowdstrike.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A14-B11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> CrowdStrike, a global cybersecurity leader, has redefined modern security with the world\u2019s most advanced cloud-native platform for protecting critical areas of enterprise risk \u2013 endpoints and cloud workloads, identity and data.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9958\" data-exhibitor-name=\"cybelangel\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/876202fe-7ab1-4f47-abd5-6bf205b64d6b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBELANGEL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/cybelangel.com\/\" target=\"_blank\">https:\/\/cybelangel.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A08-B09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> CybelAngel combines artificial intelligence and human expertise to help businesses across all sectors detect, analyze, and effectively counter cyber threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9957\" data-exhibitor-name=\"cybereason\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9ab175dd-fa10-46c3-9f06-746cfd42d998.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBEREASON<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cybereason.com\" target=\"_blank\">www.cybereason.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cybereason is a cybersecurity company specializing in endpoint protection and advanced threat detection. Its XDR platform analyzes behavior in real time to identify, block, and neutralize attacks, providing clear visibility and rapid response to cyber threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9956\" data-exhibitor-name=\"cyberproof-a-ust-company\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f5ec042f-2b8e-46d1-8f0a-d2edeafbd0f7.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERPROOF A UST COMPANY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cyberproof.com\" target=\"_blank\">www.cyberproof.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Fortify your enterprise with cloud security transformation. CyberProof, a UST company, helps enterprises migrate to cloud-native security operations with advanced Managed Detection & Response services that allow you to protect, detect, and respond to new and existing cyber threats faster and more effectively. Our team of nation-state trained expert<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9955\" data-exhibitor-name=\"cybershen\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/54dcaf91-2d05-4c4d-a7ee-799714c0dc0a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERSHEN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cybershen.com\" target=\"_blank\">https:\/\/www.cybershen.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H20<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cybershen secures SMEs, mid-market companies, and local authorities with technologies often reserved for large accounts.<br \/>\r\nThis operational and sovereign cybersecurity platform is designed to defend organizations against modern threats, combining a lightweight agent and a SaaS platform to protect workstations, collaborative tools, and more.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9954\" data-exhibitor-name=\"cyberun\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/26034bc3-f447-4613-b605-bd00e978d053.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERUN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cyberun.net\/\" target=\"_blank\">https:\/\/www.cyberun.net\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand PARTENAIRE<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyber professionals, join CYBERUN for its eighth season!<br \/>\r\nWith over 5,700 subscribers (+10k followers on LinkedIn), CYBERUN is THE magazine of CISOs and CIOs. Each issue focuses on a single in-depth topic (no news): a unique opportunity to share your expertise! Receive the magazine free of charge by entering your email address at cyberun.net.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9953\" data-exhibitor-name=\"cyberwatch\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e0702d98-677a-47ee-a407-4227e6510817.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERWATCH<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/cyberwatch.fr\/\" target=\"_blank\">https:\/\/cyberwatch.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F22-G16<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyberwatch is a French software publisher specializing in cybersecurity. It supports businesses, government organizations, Operators of Vital Importance (OIV), and Essential Service Operators (OSE) in reducing their IT risks through continuous analysis and insightful reports tailored to their specific business environments.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity consulting-and-training\" style=\"z-index:9952\" data-exhibitor-name=\"cyblex-consulting\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a793cf85-84bb-4104-97ed-5c8474f1ebda.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBLEX CONSULTING<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cyblex-consulting.com\/\" target=\"_blank\">https:\/\/www.cyblex-consulting.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cybersecurity Audit and Consulting, PASSI Qualified.<br \/>\r\nFor public and private.<br \/>\r\nTime-shared CISO\/DPO, Pentest IT\/OT, purple\/redteam, Phishing, Internal Audits, Training, Technical Audits, Governance, Risk Analysis, Crisis management exercise. Compliance (DORA, PART IS, ISO 27001, HDS, NIS 1\/2, ii901, IGI1300,...), PCA, BIA, PSSI, Directives.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9951\" data-exhibitor-name=\"cyera\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/70e57c1b-062b-41fd-8a78-e5bc324efba0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYERA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cyera.io\/fr\" target=\"_blank\">https:\/\/www.cyera.io\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> As an AI-powered data security platform, Cyera provides organizations with complete visibility into where their data resides, how it\u2019s used, and how to protect it \u2014 helping reduce risk and unlock the full value of their data, wherever it lives.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity data-center\" style=\"z-index:9950\" data-exhibitor-name=\"datacore-logiciels\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/36a838c3-a85e-4551-8fbf-665519738b07.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DATACORE LOGICIELS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.datacore.com\/fr\" target=\"_blank\">www.datacore.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> DataCore delivers intelligent software-defined storage solutions for data infrastructures across core, edge, and cloud environments. Our portfolio spans resilient block storage for mission-critical applications, scalable object storage for long-term retention and compliance, high-performance file systems and persistent storage for containers.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>DATA CENTER<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity managed-services\" style=\"z-index:9949\" data-exhibitor-name=\"dbsqware\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/38b26acd-3bc2-47d7-918a-ce776a15a780.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DBSQWARE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.dbsqware.com\/\" target=\"_blank\">https:\/\/www.dbsqware.com\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69208\/dbsqware\">See conferences organized by DBSQWARE<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A20-B19 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> dbSQWare is a software publisher specializing in the operation and maintenance of databases engines of all types. <br \/>\r\nOur business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL). <br \/>\r\nWe also carry out databases expertise missions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9948\" data-exhibitor-name=\"delinea\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e8bed6e5-6cda-407d-9001-23e7b9d34885.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DELINEA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/delinea.com\/fr\/\" target=\"_blank\">https:\/\/delinea.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Delinea secures identities with centralized authorization, ensuring seamless governance. The Delinea Platform eliminates threats across cloud and traditional infrastructures and SaaS applications. With rapid deployment, 90% fewer resources needed, and 99.99% uptime, Delinea is the most reliable solution. Learn more at delinea.com.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services consulting-and-training\" style=\"z-index:9947\" data-exhibitor-name=\"devensys\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/fe412acd-390d-4db5-b658-796cb0b9cbbf.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DEVENSYS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.devensys.com\/\" target=\"_blank\">www.devensys.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Devensys Cybersecurity is a French company specializing in cybersecurity.<br \/>\r\n<br \/>\r\nExpertise:<br \/>\r\n- Red Team: Logical, social, and physical intrusions.<br \/>\r\n- Blue Team: MXDR, 30 min SLA, teams in France and Martinique.<br \/>\r\n- Purple Team: Incident response, predictive protection.<br \/>\r\n- Build Team : Projects & MCS<br \/>\r\n- Training: Qualiopi certified center.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity managed-services\" style=\"z-index:9946\" data-exhibitor-name=\"difenso\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a52a0835-ecb0-4c1b-b34d-3f0989bbb9fb.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DIFENSO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.difenso.com\/fr\" target=\"_blank\">https:\/\/www.difenso.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span>  Difenso is a security services software vendor founded in 2015 by a team of cybersecurity experts.<br \/>\r\n<br \/>\r\nOur positioning is to provide the ability to encrypt sensitive data handled by all types of applications and services, relying on a breakthrough technology certified by the French National Cybersecurity Agency (ANSSI).<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9945\" data-exhibitor-name=\"digicert\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c8a0bac4-65db-4f42-831c-6df3b1603936.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DIGICERT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.digicert.com\/fr\" target=\"_blank\">https:\/\/www.digicert.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J38<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> DigiCert is a global leader in digital trust, enabling secure online interactions. Our AI-powered DigiCert ONE platform unifies PKI, DNS and certificate lifecycle management to protect infrastructure, software, devices and digital content, helping organizations stay secure today and ready for a quantum-safe future.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center\" style=\"z-index:9944\" data-exhibitor-name=\"digital-realty\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/006bcbfa-fb75-4e3a-99af-7c722addf79c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DIGITAL REALTY <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.digitalrealty.fr\" target=\"_blank\">www.digitalrealty.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Digital Realty offers the world\u2019s largest data center platform, providing secure environments where companies and data come together in bold new ways to shape the digital future. The company offers a full range of data center, colocation, and interconnection solutions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing\" style=\"z-index:9943\" data-exhibitor-name=\"easyvista\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b1d4439f-8302-43a1-ae76-4a9bbfcfea61.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EASYVISTA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.easyvista.com\/fr\/\" target=\"_blank\">https:\/\/www.easyvista.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EasyVista is the European Champion in AI-Powered ITSM, bringing together service management, monitoring, automation, and remote support in one seamless platform. We focus on delivering AI that delivers value, empowering enterprises to transform data governance into a competitive advantage, automate IT operations, and accelerate innovation at scale.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center\" style=\"z-index:9942\" data-exhibitor-name=\"eaton-industries-france-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4bf10c97-46c6-45ca-905d-27656e2fe8f1.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EATON INDUSTRIES (FRANCE) SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.eaton.com\" target=\"_blank\">www.eaton.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F19<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Eaton, a global leader in energy management, supports businesses in their transition to innovative, efficient, and safe solutions. We transform how energy is used to cut costs, boost performance, and protect the planet.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity mobility networks-and-telecoms\" style=\"z-index:9941\" data-exhibitor-name=\"efficient-ip\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ce14c27e-0831-4931-9108-2276c2b4a228.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EFFICIENT IP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.efficientip.com\" target=\"_blank\">www.efficientip.com<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69076\/efficient-ip\">See conferences organized by EFFICIENT IP<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B02 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EfficientIP is a network security and automation company specialized in DDI (DNS, DHCP, IPAM). We help organizations ensure business continuity and efficiency with agile, reliable infrastructures, unified DDI management, advanced automation, and a 360\u00b0 DNS security protecting against modern threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity\" style=\"z-index:9940\" data-exhibitor-name=\"elastic\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/35b93d7e-ee78-4a19-b567-5c62f9956699.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ELASTIC<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.elastic.co\/fr\" target=\"_blank\">www.elastic.co\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Elastic, the Search AI Company, integrates its deep expertise in search technology with artificial intelligence to help everyone transform all of their data into answers, actions, and outcomes. Elastic's Search AI Platform, the foundation for its search, observability, and security solutions,  is used by thousands of companies.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9939\" data-exhibitor-name=\"elba-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5a96a4e5-6f13-41f9-997f-e7722cf77c5e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ELBA SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.elba.security\/\" target=\"_blank\">https:\/\/www.elba.security\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand K06-L05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Elba secures SaaS, AI environments and browsers (Copilot, Claude, ChatGPT, etc.), helping mid-market companies navigate insider threats and Shadow AI. Our platform detects unauthorized AI usage, protects sensitive data (real-time DLP), identifies access anomalies, and remediates automatically. Deployed in 2 hours, fully automated remediation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9938\" data-exhibitor-name=\"enforcis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/61dd0254-0ca9-41a3-9517-3df133c14492.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ENFORCIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/enforcis.com\/fr\/\" target=\"_blank\">https:\/\/enforcis.com\/fr\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/71991\/enforcis\">See conferences organized by ENFORCIS<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J33 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ENFORCIS prevents data leakage by continuously identifying, mapping, and securing potential data exfiltration vectors through its \u201cDATA LEAK ACTIVE TESTING\u201d software platform.<br \/>\r\n<br \/>\r\nENFORCIS is an innovative French cybersecurity startup delivering a novel, proactive approach to mitigating the risk of large-scale data exfiltration and mass data theft.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"mobility networks-and-telecoms\" style=\"z-index:9937\" data-exhibitor-name=\"epos\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/72d760c5-c829-4107-8bdd-f9ca4f4fecd5.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EPOS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.eposaudio.com\/fr\/fr\" target=\"_blank\">www.eposaudio.com\/fr\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EPOS is a brand specialized in professional audio solutions designed for modern work environments.<br \/>\r\n<br \/>\r\nOur mission: to deliver impeccable sound quality, optimal communication clarity, and a seamless user experience, helping every employee work more efficiently, stay more focused, and remain better connected.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"networks-and-telecoms\" style=\"z-index:9936\" data-exhibitor-name=\"ericsson-enterprise-wireless-solutions-france-s-a-s\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a982574b-f021-4d44-ac95-99efad683c1b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ERICSSON ENTERPRISE WIRELESS SOLUTIONS FRANCE S.A.S.<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/cradlepoint.com\/\" target=\"_blank\">https:\/\/cradlepoint.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Ericsson delivers high-performing networks connecting billions daily. For 150 years, we\u2019ve pioneered communication technology, offering mobile solutions for service providers and enterprises. Together with our customers and partners, we make the digital world of tomorrow a reality.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9935\" data-exhibitor-name=\"erium\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4aee0577-1127-4abd-94d8-55a4663361bc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ERIUM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.erium.fr\/\" target=\"_blank\">https:\/\/www.erium.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ERIUM delivers cyber training at the right intensity (\u201cFrom attack to readiness\u201d): <br \/>\r\n- ERIUM Awareness (Cyber Investigation)<br \/>\r\n- ERIUM Attack Lab (BlackNoise)<br \/>\r\n- ERIUM Crisis (exercises via Cyber Investigation + BlackNoise or led by our 30 experts) + Cyber Readiness Score. We help 1.5M users, 110 countries, 50% CAC40, 15 languages & 97% satisfaction.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9934\" data-exhibitor-name=\"eset\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f001ac58-7ca4-4554-98af-51962b34055a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ESET<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.eset.com\/fr\/\" target=\"_blank\">www.eset.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ESET, founded in 1987 in Slovakia, is a world leader in cybersecurity. Historically known for NOD32 Antivirus, the company now offers a complete range of solutions enabling businesses and individuals to combat digital threats. Innovative, it is a major player in cybersecurity research and education, operating in over 200 countries. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center\" style=\"z-index:9933\" data-exhibitor-name=\"etix\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/87f45e7e-03f3-42b6-806f-f3ff49b2413b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ETIX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.etixeverywhere.com\" target=\"_blank\">www.etixeverywhere.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J28<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ETIX, Ethical Internet Exchange, is France\u2019s leading edge data center provider, operating more than 15 sites. With a French foundation and driven by European ambition, ETIX embodies the European alternative, backed by exclusively European investors, Infranity and Eurazeo, and by neutral, responsible infrastructures. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center networks-and-telecoms managed-services\" style=\"z-index:9932\" data-exhibitor-name=\"eurofiber-cloud-infra\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c975f241-1815-4079-b7ab-25b917640b88.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EUROFIBER CLOUD INFRA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.eurofibercloudinfra.fr\" target=\"_blank\">https:\/\/www.eurofibercloudinfra.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> With Eurofiber Cloud Infra, you benefit from a sovereign, high-performance, and secure cloud designed to ensure the resilience and long-term continuity of your services\u2014so you can stay focused on your core business.<br \/>\r\nOur flexible solutions, certified ISO 27001 & HDS: private cloud, IaaS, CaaS : managed Kubernetes ou Docker, S3 storage. 24\/7 support.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing data-center managed-services\" style=\"z-index:9931\" data-exhibitor-name=\"everpure\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/15e8ba6b-65e1-4b3b-b219-2f2f1a77b57b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EVERPURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.purestorage.com\/fr\/\" target=\"_blank\">https:\/\/www.purestorage.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Everpure (NYSE: PSTG) empowers organizations to unlock the power of their data with a scalable, AI-ready storage platform. We simplify data management while boosting performance and reducing energy consumption for the world\u2019s most innovative firms. Learn more at www.Everpuredata.com.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity\" style=\"z-index:9930\" data-exhibitor-name=\"eviden\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/06c3534c-d758-41ef-a853-1a81bdd10419.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EVIDEN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/eviden.com\/fr-fr\/solutions\/cybersecurite\/\" target=\"_blank\">https:\/\/eviden.com\/fr-fr\/solutions\/cybersecurite\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N08<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Eviden offers a sovereign portfolio of cybersecurity products built on three core areas of expertise: data protection and encryption, identity and access management, and digital identity. Developed in Europe and certified against the highest European standards, these technologies protect sensitive data and secure identities.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing networks-and-telecoms managed-services\" style=\"z-index:9929\" data-exhibitor-name=\"evobserve\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e479168d-a52b-45f5-8c4e-0dcc75c1cb9b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EVOBSERVE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.easyvista.com\/fr\" target=\"_blank\">www.easyvista.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EV Observe is a SaaS and on-premises monitoring platform for IT infrastructure and networks, the Internet of Things (IoT), cloud environments, and applications.<br \/>\r\nEV Observe delivers a proactive and predictive monitoring experience. Anticipate and prevent service disruptions with 360\u00b0 monitoring and AIOps.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9928\" data-exhibitor-name=\"exabeam\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/efde7d26-9bc6-47b3-9c79-5293c581170b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EXABEAM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.exabeam.com\" target=\"_blank\">http:\/\/www.exabeam.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Exabeam powers security operations with AI and automation for faster, smarter threat detection, investigation and response.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9927\" data-exhibitor-name=\"excube\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ac22e797-1dbb-465d-90a9-26da02292660.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EXCUBE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.excube.fr\/\" target=\"_blank\">https:\/\/www.excube.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EXCUBE is an independent cybersecurity consulting firm with 40 consultants, based in Paris and Lyon. We support companies through following offers : GRC, Cyberdefense (consulting and SOC project management assistance and tools, purple team, SECOP), Cyber-resilience (DRP\/BCP and cyber crisis exercises) and Audits \/ pentests \/ red team services.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity networks-and-telecoms\" style=\"z-index:9926\" data-exhibitor-name=\"f24\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/77b457bb-ab32-442a-a09e-2d4776e3c3c7.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">F24<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/f24.com\/fr\/\" target=\"_blank\">https:\/\/f24.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L20<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> F24 is the leading provider of SaaS software for 25 years, for resilience: from emergency notification to crisis management, including GRC, BCM and BIA. Equip yourself to deal with a cyber incident or crisis with a resilient solution for business continuity plans,  to alert your employees and digitise your crisis unit. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity mobility\" style=\"z-index:9925\" data-exhibitor-name=\"fidens-by-tvh-consulting\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/144bcb28-f391-4b3e-a848-993480154d89.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FIDENS BY TVH CONSULTING<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.tvhconsulting.fr%20%20%20\" target=\"_blank\">www.tvhconsulting.fr   <\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I36<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A cybersecurity expert since 2002, Fidens supports organizations in securing their information systems through regulatory compliance (NIS2, GDPR), technical and organizational audits, cyber resilience, and governance. Fidens is a member of the TVH Consulting Group, supporting ERP, CRM, BI\/data\/AI and cybersecurity projects.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9924\" data-exhibitor-name=\"forescout-technologies\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/46b78b05-7724-4958-9ea1-93e930fc384e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FORESCOUT TECHNOLOGIES<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.forescout.fr\" target=\"_blank\">www.forescout.fr\t<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D22-E23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Forescout provides comprehensive asset intelligence and control across IT, OT, and IoT. Trusted by Fortune 100 companies, governments, and large enterprises for over 20 years, it manages cyber risk, ensures compliance, and mitigates threats. Vedere Labs adds proprietary device and threat intelligence, enhancing platform effectiveness.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9923\" data-exhibitor-name=\"fortinet\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1efad06f-df30-4e89-885d-3929926f92e8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FORTINET<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.fortinet.com\/fr\" target=\"_blank\">www.fortinet.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> For 25 years, Fortinet has been a driving force in the evolution of cybersecurity. + 900,000 customers trust our solutions, which are among the most patented and validated in the industry. FortiGuard Labs develops and utilizes leading-edge machine learning and AI technologies to provide customers with timely and consistently top-rated protection.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9922\" data-exhibitor-name=\"free-pro\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7aac5d27-1ba6-4a0a-a2cd-40953876cdc9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FREE PRO <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/xpr.freepro.com\/\" target=\"_blank\">https:\/\/xpr.freepro.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Free Pro, a B2B subsidiary of the iliad Group,  Free Pro meets the telecoms, IT, cloud, and cybersecurity needs  of large enterprises. <br \/>\r\nWith over twenty years of expertise in connectivity and data, Free Pro manages the entire data value chain for organizations, from collection and transport to security and hosting.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9921\" data-exhibitor-name=\"galink\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6b6b8fa6-c057-43a2-b5b9-964a99e8dbd4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GALINK<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.galink.com\/\" target=\"_blank\">https:\/\/www.galink.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> 45% of companies have already suffered an attack through a supplier, yet 85% of them have never used AI to address this issue. However, AI is the key to dealing with time-consuming processes and limited visibility. With its customized AI, Galink automates 90% of the manual tasks related to supplier cyber risks.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9920\" data-exhibitor-name=\"gatewatcher\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/280a4325-3829-4a52-8389-8973081d311d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GATEWATCHER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.gatewatcher.com\" target=\"_blank\">www.gatewatcher.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A leader in cyber threat detection, Gatewatcher has been protecting corporate and public institution networks since 2015. Our NDR platform revolutionizes SOC operations through contextualized analysis and alert triage, enabling faster decision-making for each threat while providing total visibility of the network, both in the cloud and on-premises<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9919\" data-exhibitor-name=\"glimps\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ceb6cd68-1b85-4721-b345-5d899a849a6a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GLIMPS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.glimps.fr\/\" target=\"_blank\">https:\/\/www.glimps.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> GLIMPS specializes in deep file analysis to detect and characterize the most sophisticated malware in a matter of seconds, thanks to its Deep Learning-based Artificial Intelligence engine.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity networks-and-telecoms\" style=\"z-index:9918\" data-exhibitor-name=\"global-security-mag-levas-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a0f635d0-1d6f-4d1b-9d4d-b236d0a4fe2a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GLOBAL SECURITY MAG LEVAS SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.globalsecuritymag.fr\" target=\"_blank\">www.globalsecuritymag.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Partner<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Global Security Mag is a brand of LEVAS SAS, providing Information about Cybersecurity and Data Protection (Storage, Backup, Restoration, Archiving, Data Centers), via .fr .com .de , and via Global Security Mag Magazine in paper and digital. Its GS days annual event in Paris is a place to be for the cyber and Cybersecurity ecosystem. www.gsdays.fr <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing networks-and-telecoms managed-services mobility\" style=\"z-index:9917\" data-exhibitor-name=\"groupe-convergence\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a0ce47a2-5ab2-473a-a66a-14011b3f771b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GROUPE CONVERGENCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.groupe-convergence.com\" target=\"_blank\">www.groupe-convergence.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Convergence is your preferred partner for the integration of customised solutions in telecommunications, cybersecurity and cloud computing. Whatever the size of your organisation, our experts are here to support you in your technological development. With more than 160 branches throughout the country, our network guarantees you local services.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9916\" data-exhibitor-name=\"guardsix\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1e5e9fd5-02cd-4b0c-af80-45141c80bcf9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">GUARDSIX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/guardsix.com\/\" target=\"_blank\">https:\/\/guardsix.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> guardsix is a European cybersecurity company headquartered in Denmark, providing a sovereign security operations platform for MSSPs and regulated organisations. Its unified platform combines SIEM, NDR, SOAR and fleet management capabilities to help you achieve audit readiness, detect advanced threats and scale security operations with confidence.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9915\" data-exhibitor-name=\"hardis-tech-services\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6ae53d1f-eb26-4225-a4dd-077a4c8beccd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HARDIS TECH SERVICES<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.hardis-group.com\/\" target=\"_blank\">https:\/\/www.hardis-group.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hardis Tech Services is a consulting and IT services company that supports its clients in their digital transformation with a \u201cTech for Business\u201d approach focused on creating business value. Its offering is structured around four key areas: data, artificial intelligence, cybersecurity, and cloud.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9914\" data-exhibitor-name=\"harfanglab\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/cd03b2db-bccb-43a2-9cd4-1e442f6b5053.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HARFANGLAB<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.harfanglab.io\" target=\"_blank\">www.harfanglab.io<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> HarfangLab is a global cybersecurity provider specialized in endpoint protection against known and unknown threats. Performance, innovation, and transparency are at the core of its development processes. Certified by ANSSI and BSI, its EDR, EPP, and ASM solutions, integrating AI models, can be deployed in the Cloud, SecNumCloud, or on-premises.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9913\" data-exhibitor-name=\"heliaq-solutions\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d9190759-b205-49d6-adcf-b0dffddaad68.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HELIAQ SOLUTIONS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/heliaq.fr\/\" target=\"_blank\">https:\/\/heliaq.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Heliaq Solutions, a specialized subsidiary of the Heliaq group, supports companies in cybersecurity, cloud computing, and managed services. As a true technology partner, we guarantee the continuity, performance, and security of information systems. Our mission: to make digital technology a lever for trust, agility, and resilience.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity data-center networks-and-telecoms\" style=\"z-index:9912\" data-exhibitor-name=\"hewlett-packard-enterprise-hpe-networking\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d4d6f07a-eb8d-4bf3-ae1a-998410ad7fbb.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HEWLETT PACKARD ENTERPRISE (HPE) NETWORKING<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.hpe.com\/fr\/\" target=\"_blank\">https:\/\/www.hpe.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E26-F21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hewlett Packard Enterprise Networking combines the best of Juniper Networks and Aruba Networks: secure AI-native networking, the market-leading Mist platform, and a complete computing stack integrated with GreenLake. Accelerated innovation for AI (intelligent networks + datacenter infrastructure), expanded LAN\/WAN solutions, and enhanced security.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>DATA CENTER<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9911\" data-exhibitor-name=\"hexanet\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/363eab1d-d6c8-42fa-be03-908e55695f2a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HEXANET<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.hexanet.fr\" target=\"_blank\">www.hexanet.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hexanet is a global IT player that supports companies with reliable, clear, and sovereign digital solutions.<br \/>\r\n<br \/>\r\nCloud, Cybersecurity, Connectivity, Managed Services\u2026<br \/>\r\nWe design and operate solutions that simplify everyday life, support growth, and strengthen trust in IT.<br \/>\r\n<br \/>\r\nOur strength?<br \/>\r\nProximity and support.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9910\" data-exhibitor-name=\"hornetsecurity\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/8863a777-b89b-49e7-a14f-9542b9b4bcc0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HORNETSECURITY <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.hornetsecurity.com\/fr\/\" target=\"_blank\">https:\/\/www.hornetsecurity.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C14-D15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hornetsecurity by Proofpoint is the business unit dedicated to MSPs and SMBs, delivering cloud-based cybersecurity, compliance, backup and security awareness solutions. Its flagship product, 365 Total Protection, secures Microsoft 365. Active in 120+ countries, it supports 125,000 customers through 12,000 partners.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity print-document managed-services\" style=\"z-index:9909\" data-exhibitor-name=\"hp\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/147b44bc-fcd3-478c-b305-82ca35c8ca1b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.hp.com\/fr-fr\/home.html\" target=\"_blank\">https:\/\/www.hp.com\/fr-fr\/home.html<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Discover HP Inc.\u2019s vision of the Future of Work. Digital friction in IT is a major source of employee dissatisfaction and can hinder business performance. Our solutions deliver visibility, control, strengthened security posture, and an enhanced digital workplace experience from PCs to collaboration and meeting tools, all the way to printing systems<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PRINT \/ DOCUMENT <\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity managed-services\" style=\"z-index:9908\" data-exhibitor-name=\"hpe\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/2ddba1cb-f47d-4ea4-9fb8-c9c7409f75a3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HPE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.hpe.com\" target=\"_blank\">www.hpe.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E26-F21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> HPE is a global leader in enterprise technology, bringing together AI, cloud and networking to help organizations accelerate innovation, optimize operations and transform data into insight. HPE empowers customers across industries to achieve their boldest ambitions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9907\" data-exhibitor-name=\"hub-one-sysdream\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9214a563-2888-4031-8d87-3410e7b032e9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HUB ONE - SYSDREAM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/sysdream.com\/\" target=\"_blank\">https:\/\/sysdream.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I26<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SysDream supports organizations in securing and strengthening the resilience of their infrastructures: audits and pentests, strategic consulting, training and awareness, sovereign managed SOC services (SIEM, EDR, incident response). With Hub One SASE, we secure access and network flows (SD-WAN\/SASE) in compliance with NIS2 and GDPR.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9906\" data-exhibitor-name=\"hucency\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9cec6e64-1867-4f71-96fe-31112858f64f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HUCENCY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/avantdecliquer.com\/\" target=\"_blank\">https:\/\/avantdecliquer.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hucency is a French human-centric cybersecurity company. It strengthens organizations\u2019 digital security by actively involving employees through phishing\/vishing audits, threat awareness, internal error prevention, and management tools for CIOs\/CISOs. ISO 27001 certified.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9905\" data-exhibitor-name=\"i-tracing\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/953630b3-49f2-4387-af04-8bb4905fa90c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">I-TRACING<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.i-tracing.com\" target=\"_blank\">https:\/\/www.i-tracing.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J31<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> With I-TRACING, benefit from a full range of cybersecurity services, from consulting and integration to managed services, SOC and CERT, backed by 20 years of technical expertise. We support over 600 clients in managing cyber risks, from anticipating threats to responding to attacks. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9904\" data-exhibitor-name=\"ibm\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1c90ba83-303b-46e5-8d4c-9cb0a1bb4eb6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IBM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.ibm.com\/fr-fr\/solutions\/it-infrastructure\" target=\"_blank\">https:\/\/www.ibm.com\/fr-fr\/solutions\/it-infrastructure<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I28<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> IBM, the global leader in hybrid cloud and AI, is the trusted partner of organizations that, in a highly competitive and threatening environment, must constantly reinvent themselves by leveraging cloud platforms and artificial intelligence platforms, while ensuring complete data resilience.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9903\" data-exhibitor-name=\"ic-consult-transmit\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/613362bb-05d1-442f-b6b7-dabe7989b139.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IC CONSULT - TRANSMIT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/ic-consult.com\/fr\/%20et%20https:\/\/transmitsecurity.com\" target=\"_blank\">https:\/\/ic-consult.com\/fr\/ et https:\/\/transmitsecurity.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> iC Consult is the world\u2019s largest independent consultancy, systems integrator, and managed services provider for identity security.  <br \/>\r\nTransmit Security is redefining identity security by unifying identity management, authentication, fraud prevention, and identity verification into one resilient platform powered by Predictive AI technology.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity\" style=\"z-index:9902\" data-exhibitor-name=\"idecsi\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/3d3646ea-33f2-4505-9993-7d34b38a368e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IDECSI<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.idecsi.com\" target=\"_blank\">https:\/\/www.idecsi.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> IDECSI is the French leader in data protection and governance in Microsoft 365 and file servers. The security platform offers complete visibility into Microsoft 365 to identify risks, detect suspicious behavior, and overexposed data. With the solution DETOX, eliminate risks related to access, rights, and sharing.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9901\" data-exhibitor-name=\"idna-nxo-fayat\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/05b882ac-5521-4c74-8985-72b57c879f4e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IDNA - NXO FAYAT <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.idna.fr\/\" target=\"_blank\">https:\/\/www.idna.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> NXO supports companies in the design, deployment, and outsourcing of secure digital infrastructures and sovereign cloud solutions. In early 2026, the group strengthened its offering with iDNA, an entity specializing in cybersecurity, dedicated to IT protection, risk management, and regulatory and operational compliance.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9900\" data-exhibitor-name=\"igel\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/29d446b8-8844-4fa9-8ab6-cd7a5629f95f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IGEL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.igel.com\" target=\"_blank\">www.igel.com\t<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I39<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A modern, resilient, and future-ready endpoint strategy. The secure-by-design OS platform for your endpoints.<br \/>\r\nSimplify management, reduce attack surface, and eliminate recovery blind spots at the device level. IGEL delivers secure, high-performance, and controlled access to VDI, AVD, SaaS, and ZTA strategies while extending HW lifecycle. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9899\" data-exhibitor-name=\"imprivata\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/069b988a-5b09-4ab5-b2cd-053a08af89f4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IMPRIVATA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.imprivata.com\/fr\" target=\"_blank\">http:\/\/www.imprivata.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H26<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Imprivata is a software provider specializing in digital identity, authentication, and access management for organizations in critical sectors. Its interoperable platform secures internal and third-party identities in more than 45 countries, protecting data and applications without disrupting workflows.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9898\" data-exhibitor-name=\"ims-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/bb95d446-16fb-4e05-9c82-5c084201be64.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IMS NETWORKS <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.imsnetworks.com\/\" target=\"_blank\">https:\/\/www.imsnetworks.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> At IMS Networks, we strengthen the resilience and sovereignty of critical digital infrastructures. As experts in network engineering and cybersecurity, we integrate, operate, and monitor environments 24\/7 using carefully selected technologies and 100% France-based teams\u2014with no outsourcing.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing networks-and-telecoms managed-services consulting-and-training\" style=\"z-index:9897\" data-exhibitor-name=\"inetum-x-ignimission\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/31674861-3691-4bc5-842c-62d92c4e8dc8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INETUM X IGNIMISSION<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.inetum.com\/fr%20\" target=\"_blank\">https:\/\/www.inetum.com\/fr <\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I33<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Inetum and Ignimission combine cybersecurity expertise with the French SecNumCloud platform to accelerate the digitalisation and automation of cyber processes. Their joint approach makes it possible to structure governance, ensure data reliability, automate controls and manage information security in complex, multi-entity environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9896\" data-exhibitor-name=\"infinigate-barracuda\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/21295e0c-30a7-4675-8261-bca78e8d01e3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFINIGATE \/ BARRACUDA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.barracuda.com\" target=\"_blank\">www.barracuda.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08-D07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Barracuda Barracuda is a leading global cybersecurity company providing<br \/>\r\ncomplete protection against complex threats for all size business. Our AI-<br \/>\r\npowered BarracudaONE platform secures email, data, applications, and<br \/>\r\nnetworks with innovative solutions, managed XDR and a centralized<br \/>\r\ndashboard to maximize protection and strengthen cyber resilience. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9895\" data-exhibitor-name=\"infinigate-check-point\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/bf6f9a38-7aac-4cfd-a1ff-95eda61c2e31.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFINIGATE \/ CHECK POINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.checkpoint.com\/fr\/\" target=\"_blank\">https:\/\/www.checkpoint.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08-D07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Check Point is a leading provider of AI-powered, cloud-delivered cybersecurity platforms, protecting over 100,000 organizations worldwide. Check Point harnesses the power of AI to improve cybersecurity effectiveness through its Infinity platform, with unmatched capture rates enabling proactive threat anticipation.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms\" style=\"z-index:9894\" data-exhibitor-name=\"infinigate-versa-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/752bb19f-9b1c-4ae4-9390-47abbf3f3a43.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFINIGATE \/ VERSA NETWORKS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.versa-networks.com\" target=\"_blank\">www.versa-networks.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08-D07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Versa enables organizations to create self-protecting networks that radically simplify and automate their network and security infrastructure. Powered by AI, the VersaONE Universal SASE platform delivers converged SSE, FW,SD-WAN, and SD-LAN solutions that protect data and defend against cyber threats while delivering a superior digital experience.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9893\" data-exhibitor-name=\"infinigate-yubico\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/28da6ccc-6a82-4f2a-96f4-0d4cf5f2fe8d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFINIGATE \/ YUBICO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/infinigate.fr\/\" target=\"_blank\">https:\/\/infinigate.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08-D07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Yubico is a european key player in cybersecurity, specializing in hardware-based strong authentication. With YubiKeys and FIDO2\/WebAuthn standards, the company delivers phishing-resistant MFA and passwordless solutions to secure access, identities, and critical infrastructures.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9892\" data-exhibitor-name=\"infoblox\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ff5ab53b-388b-48ff-b346-567ea38f0dcf.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFOBLOX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.infoblox.com\" target=\"_blank\">www.infoblox.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Infoblox unites cloud, networking and security to deliver unmatched performance and protection. With Infoblox, Organizations can accelerate their digital transformation, optimize their critical network services, and proactively protect their businesses against AI-powered threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity mobility\" style=\"z-index:9891\" data-exhibitor-name=\"informations-entreprise\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a413ddd0-1706-4b75-8f22-04c46356ab55.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INFORMATIONS ENTREPRISE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.info-entreprise.com\/\" target=\"_blank\">https:\/\/www.info-entreprise.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Partner<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Informations Entreprise is an essential tool for executives and decision-makers in SMEs and large companies. It takes a very pragmatic approach to the problems encountered by executives in their daily professional lives. It also aims to reflect on major issues and new international trends.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9890\" data-exhibitor-name=\"integrity360-france\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d76f7793-ea73-44af-b4d3-5010ce77812e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">INTEGRITY360 FRANCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.integrity360.com\/fr\/\" target=\"_blank\">https:\/\/www.integrity360.com\/fr\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69200\/integrity360-france\">See conferences organized by INTEGRITY360 FRANCE<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand K04-L03 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> As an independent cybersecurity leader across Europe & Africa, Integrity360 provides a comprehensive range of cybersecurity services & solutions to more than 3,000 clients worldwide. We offer dedicated experts to support you with consulting, auditing, pentest, managed services, and incident response across both IT and OT cybersecurity environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity mobility managed-services\" style=\"z-index:9889\" data-exhibitor-name=\"ipacs\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/aaff6840-bbe6-449d-82fb-4abaa4f59d41.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IPACS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ipacs.fr\" target=\"_blank\">www.ipacs.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> For over 23 years, IPACS, as an integrator and operator, has supported businesses in designing and securing their information systems. Connectivity, telephony, networks, cloud and cybersecurity now come together around our new MXDR service to protect critical operations and ensure business continuity.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity data-center consulting-and-training\" style=\"z-index:9888\" data-exhibitor-name=\"iron-mountain\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/50996a35-5a2f-44d7-b1b5-01d9a4374e88.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IRON MOUNTAIN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ironmountain.fr\" target=\"_blank\">www.ironmountain.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J37<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Enhance the value of your assets and secure your data. Transform your IT strategy with our expert solutions in Asset Lifecycle Management (ALM) and Data Management. We buy back your equipment (innovation & CSR budget) and guarantee the integrity and protection of your critical information.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>DATA CENTER<\/li><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9887\" data-exhibitor-name=\"its-ibelem\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/db3227c1-d335-412d-8529-d2649401dafe.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ITS IBELEM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ibelem.com%20\/%20www.itsgroup.fr\" target=\"_blank\">www.ibelem.com \/ www.itsgroup.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> For over 20 years, ITS Ibelem has been integrating mobility solutions and supporting companies in managing mobility (EMM, UEM) and modern workplace projects. Our experts provide end-to-end support \u2014 from audit and preparation (mastering, deployment) to ongoing operational maintenance.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility networks-and-telecoms\" style=\"z-index:9886\" data-exhibitor-name=\"ivanti-france-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/8e5f8a00-7ed3-4ca4-977c-0ea15ad1daf2.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IVANTI FRANCE SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ivanti.com\" target=\"_blank\">http:\/\/www.ivanti.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Ivanti is an international IT and security software company that helps companies manage, automate, and secure their data and systems. With its \u201cSecure by Design\u201d approach, Ivanti helps IT and security teams improve operational efficiency, reduce costs, and anticipate threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"mobility networks-and-telecoms\" style=\"z-index:9885\" data-exhibitor-name=\"jabra\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6ac485dc-9b7d-444b-8259-4731866b327a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">JABRA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.jabra.com\/fr-fr\/\" target=\"_blank\">https:\/\/www.jabra.com\/fr-fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Jabra is a world-leading brand of audio\/video collaboration solutions, designed to optimize hybrid ways of working. We create integrated tools for contact centers, offices and collaboration to help professionals work more productively wherever they are.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9884\" data-exhibitor-name=\"jiliti\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/33d6fe73-7aea-4689-9643-d8505ecfc0bb.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">JILITI<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.jiliti-group.com\/\" target=\"_blank\">https:\/\/www.jiliti-group.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand K02-L01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Jiliti is a 100% French cloud and cybersecurity expert. Operator, host and integrator, we provide managed services to support you in outsourcing and the evolution of your IT infrastructures.<br \/>\r\nOur services range from consulting to maintenance through transformation both in physical infrastructures and in the cloud.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9883\" data-exhibitor-name=\"kamae\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/92a0f63b-7268-4e62-9cb3-ed9444f66ea1.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KAMA\u00c9<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/kamae.fr\/\" target=\"_blank\">https:\/\/kamae.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Protect. Comply. Gamify.<br \/>\r\n<br \/>\r\nThrough the leading Security Awareness Training platform, turn your users into cyber black belts and make security cool.<br \/>\r\n<br \/>\r\nFast, Automated, Effortless.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity managed-services\" style=\"z-index:9882\" data-exhibitor-name=\"kddi-france\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/51aeff4c-77ac-4a68-8fb8-de378e993529.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KDDI FRANCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.fr.kddi.com\/fr\/\" target=\"_blank\">https:\/\/www.fr.kddi.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E29<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> KDDI France, a subsidiary of the KDDI Group, a Japanese telecommunications giant ranked among the world\u2019s top 500 companies, has been supporting French businesses in their digital transformation for nearly 30 years.<br \/>\r\nA specialist in advanced and secure IT solutions for high-performance cloud environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9881\" data-exhibitor-name=\"keeper-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/138ad193-7925-4a2e-a916-8b7533f5d8fd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KEEPER SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.keepersecurity.com\/fr_FR\/\" target=\"_blank\">https:\/\/www.keepersecurity.com\/fr_FR\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Recognised for its innovation in the Gartner Magic Quadrant for Privileged Access Management (PAM), Keeper Security secures passwords and passkeys, infrastructure secrets, remote connections and endpoints with role-based enforcement policies, least privilege and just-in-time access. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity\" style=\"z-index:9880\" data-exhibitor-name=\"keepit\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d6634629-48bd-4f3e-92db-2c877af09d76.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KEEPIT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.keepit.com\/\" target=\"_blank\">https:\/\/www.keepit.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Keepit: The native SaaS data protection solution \u2014 European, independent, with predictable costs and an intuitive interface \u2014 designed to safeguard your most essential SaaS applications such as Microsoft 365, Microsoft Entra ID, Salesforce, Google Workspace, Okta, Confluence, and many more.<br \/>\r\nAn independent technology, designed for the cloud.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9879\" data-exhibitor-name=\"kerys-software\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9051d1b8-1a2c-4887-807a-e3d309817212.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KERYS SOFTWARE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/kerys.software\/fr\" target=\"_blank\">https:\/\/kerys.software\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I35<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Kerys Software is the only company that enables complete isolation of multiple environments on a single computer, with zero friction for the user.<br \/>\r\nAs regulations increasingly require isolation of administrative IT systems and IT\/OT convergence accelerates, Kerys offers a unique approach to micro-segmenting your information system.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity managed-services\" style=\"z-index:9878\" data-exhibitor-name=\"klee-group\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/212ccde6-4304-4d7c-b7e8-630d7428046f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KLEE GROUP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.kleegroup.com\" target=\"_blank\">www.kleegroup.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F06-G07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> As a creator of digital business solutions, Klee Group provides the digital answer to complex projects. We design solutions for business excellence, experience and commitment, financial performance, data enhancement and collective efficiency. Klee Group has 1100 employees and a turnover of \u20ac145 million in 2024.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity\" style=\"z-index:9877\" data-exhibitor-name=\"knowbe4\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/cfce0026-9386-42b5-a1c4-d15021c2dc41.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KNOWBE4<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\">https:\/\/www.knowbe4.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J19<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> KnowBe4 empowers your workforce to make smarter security decisions every day.<br \/>\r\nOver 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9876\" data-exhibitor-name=\"kyndryl-hpe\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a2ae0cb9-048b-463c-823c-c24c1728c4c0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">KYNDRYL\/HPE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.kyndryl.com\/us\/en\/about-us\/alliances\/hpe\" target=\"_blank\">https:\/\/www.kyndryl.com\/us\/en\/about-us\/alliances\/hpe<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J43<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Kyndryl and HPE are partnering to provide  customers with managed edge-to-cloud, networking and resiliency services. This collaboration combines Kyndryl\u2019s extensive expertise in IT infrastructure consulting and services with HPE's innovative technology solutions. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity mobility networks-and-telecoms\" style=\"z-index:9875\" data-exhibitor-name=\"linformaticien\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b32c1541-e8dd-45df-bb8e-a59abaacdcfe.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">L'INFORMATICIEN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.linformaticien.com\/\" target=\"_blank\">https:\/\/www.linformaticien.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Partner<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> L\u2019INFORMATICIEN is the leading reference media in the field of professional IT: technology choices, implementation of solutions, career and training issues, strategies of market players, innovations, and future perspectives\u2026<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training managed-services\" style=\"z-index:9874\" data-exhibitor-name=\"lemon-learning\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/3582147c-02d4-4143-bb58-c789af8606b9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LEMON LEARNING<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/lemonlearning.com\" target=\"_blank\">https:\/\/lemonlearning.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H30<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Lemon Learning is a digital adoption platform that improves software usage through interactive guides embedded directly inside business applications. It reduces support tickets, speeds up training, and enhances data quality across both web apps and desktop clients.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9873\" data-exhibitor-name=\"leviia\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a60d02f6-fecb-4b53-8abc-b40f65c5a81e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LEVIIA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.leviia.com\" target=\"_blank\">www.leviia.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Leviia is a French data storage provider, certified ISO 27001 and HDS. The company offers two sovereign solutions, hosted in France: Leviia Next, a full-featured collaborative suite based on Nextcloud, and Leviia Storag3, an S3-compatible object storage solution designed for data archiving and backup.          <br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9872\" data-exhibitor-name=\"lexfo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a3cbbf36-32fc-497e-9f4d-033a623b54e9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LEXFO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.lexfo.fr\" target=\"_blank\">www.lexfo.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> LEXFO is an offensive cybersecurity firm, PASSI and PRIS certified and CESTI accredited. We cover the entire attack chain: IT mapping, security audits, code audits and penetration testing, Red Team, organizational audits, reverse engineering, incident response, data leak monitoring, training, and awareness.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9871\" data-exhibitor-name=\"linkt\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/00c85fe1-bb54-4a79-b4e3-43889edb0f47.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LINKT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.linkt.fr\/\" target=\"_blank\">www.linkt.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F12<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> 100% B2B Telecommunications Services Operator<br \/>\r\n<br \/>\r\nLinkt is an infrastructure aggregator addressing the critical needs of businesses and public-sector organizations through telecommunications services, systems integration, cybersecurity, and Cloud solutions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9870\" data-exhibitor-name=\"lockself\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/0eb2f52d-a90c-4ce9-8fe1-a3effb5c7f9b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LOCKSELF<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.lockself.com\/\" target=\"_blank\">https:\/\/www.lockself.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> LockSelf deploys a suite of encryption solutions for password management and secure document sharing.<br \/>\r\n<br \/>\r\nCertified CSPN by the French National Cybersecurity Agency (ANSSI), LockSelf is a leading provider of data protection solutions for businesses and supports thousands of private and public organizations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9869\" data-exhibitor-name=\"lutessa\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/341f459e-949a-4341-b401-735ab57fd8a0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">LUTESSA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.lutessa.com\" target=\"_blank\">www.lutessa.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D22-E23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Since 2012, LUTESSA\u2019s 150 experts secure your IT (Network, Cyber, Cloud, GRC). We now drive your projects with AI applied to preventive cybersecurity and automation. Available via staff augmentation or fixed-price projects, we master cutting-edge tools (EDR, PAM, Firewalls) to ensure your digital resilience.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing networks-and-telecoms managed-services\" style=\"z-index:9868\" data-exhibitor-name=\"maltem-insight-performance\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/95bc69ba-782c-4ddb-a997-3990e14de588.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MALTEM INSIGHT PERFORMANCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.insight-performance.com\" target=\"_blank\">www.insight-performance.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H12<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> The MALTEM INSIGHT PERFORMANCE monitoring platform provides a unified view of your IT services performance while reducing your operational costs. With 24\/7 observability, you can detect anomalies faster, anticipate incidents, and ensure flawless user experience and reliable IT services.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9867\" data-exhibitor-name=\"manageengine\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4e1ee934-cdcb-4594-83d0-8330274bedd5.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MANAGEENGINE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.manageengine.com\/fr\/\" target=\"_blank\">www.manageengine.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9866\" data-exhibitor-name=\"mantra-by-cyber-guru\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6fa525e4-dede-4e40-9ea6-bdf36cd179a9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MANTRA BY CYBER GURU <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.mantra.ms\/\" target=\"_blank\">https:\/\/www.mantra.ms\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Mantra is a next generation cyber awareness platform.<br \/>\r\nEducate and protect your collaborators in real time on all your users\u2019 devices (desktop, mobile, email) thanks to the integration of the latest IA (GenAI) innovationTrusted by over 1,500 companies.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9865\" data-exhibitor-name=\"matrix42\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9006d191-fcbe-46e2-9adc-11f4d2e0c683.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MATRIX42<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.matrix42.com\/fr\" target=\"_blank\">www.matrix42.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Matrix42 is the unified European platform for managing your services, assets, licenses, and SaaS applications within a modern, intuitive, and sovereign environment.<br \/>\r\n<br \/>\r\nITSM, ITAM, CMDB, SAM, SaaS Management, and Remote Control: everything is integrated to reduce complexity, control costs, and boost the efficiency of your IT and your company.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center networks-and-telecoms\" style=\"z-index:9864\" data-exhibitor-name=\"megaport\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f6905092-26fd-40f4-beb4-8c9b6c408d5e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MEGAPORT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.megaport.com\/fr\" target=\"_blank\">https:\/\/www.megaport.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J36<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Megaport is changing how businesses connect their infrastructure. Build secure, scalable, and agile networks in just a few clicks, accessing global endpoints and creating private paths in minutes. Megaport partners with global service providers, DC operators, systems integrators, and managed services companies, and operates in 1000+ locations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9863\" data-exhibitor-name=\"memority\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6a702d1f-a64c-4be3-adcd-9f18ce0d5ca3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MEMORITY\t<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.memority.com\" target=\"_blank\">www.memority.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J06-K05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Memority is a software vendor that markets a SaaS identity and access management (IDaaS) platform. Its \u201cIdentity Factory 360\u00b0\u201d solution covers all types of identities and its IGA, CIAM, SSO, and MFA solutions improve performance, user experience, and security. Memority aims to become the European leader in IDaaS.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity networks-and-telecoms\" style=\"z-index:9862\" data-exhibitor-name=\"merox\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/668f423f-584f-49b6-aebd-d535e7bdc8e0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MEROX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.merox.io\/fr\/\" target=\"_blank\">https:\/\/www.merox.io\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D26<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Merox enhances the security and deliverability of your emails through an innovative solution combining an intuitive software and a network of cybersecurity experts. Our support guarantees an optimal implementation of DNS protocols (SPF, DKIM, DMARC, MTA-STS, BIMI) to ensure your compliance and protect your brand against spoofing.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9861\" data-exhibitor-name=\"metacompliance\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d8521ccc-bb64-4d8d-b2c1-10e3e8c8fc32.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">METACOMPLIANCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.metacompliance.com\" target=\"_blank\">http:\/\/www.metacompliance.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H40-I37<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> MetaCompliance is the all-in-one platform that helps organisations manage their human risk and establish a strong, lasting security culture. Trusted by enterprises worldwide, MetaCompliance turns human risk from an abstract problem into something practical, measurable and manageable at scale.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9860\" data-exhibitor-name=\"metsys\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/94c7a331-f342-41c4-b49b-cd6b952dd600.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">METSYS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.metsys.fr\/\" target=\"_blank\">www.metsys.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C22-D23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Metsys offers a comprehensive approach to cybersecurity: Governance, Risk, and Compliance (GRC), Zero Trust, cloud protection, 24\/7 SOC, access control, threat detection, and NIS2 compliance. Comprehensive expertise to secure your critical data, systems, and environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9859\" data-exhibitor-name=\"mimecast-france-sarl\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a4d7fe00-8eaf-45e8-893d-79bcea2f69cd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MIMECAST FRANCE SARL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.mimecast.com\" target=\"_blank\">www.mimecast.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Mimecast is a global cybersecurity leader redefining how organizations secure human risk through precision-engineered AI. Its API-enabled connected human risk platform is purpose-built to protect organizations from the spectrum of cyber threats. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9858\" data-exhibitor-name=\"misc-magazine-base-documentaire\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d4beb684-0ee3-4f77-912c-41acabfe446d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MISC MAGAZINE & BASE DOCUMENTAIRE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/boutique.ed-diamond.com\/\" target=\"_blank\">https:\/\/boutique.ed-diamond.com\/\t<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Faced with the digital transformation of our society and the increase in threats, cybersecurity is now a priority for many organizations. After nearly 20 years of publications and feedback, MISC provides an essential source of technical information for a better understanding of this field.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9857\" data-exhibitor-name=\"mobeta\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/40c0f5a9-00f1-4187-b355-b82734c4681c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MOBETA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/mobeta.fr\/\" target=\"_blank\">https:\/\/mobeta.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Mobeta combines penetration testing services with Rigma, a platform designed to industrialize the tracking of vulnerabilities identified during pentests.<br \/>\r\n<br \/>\r\nRigma extends pentests performed by Mobeta or third-party providers by ensuring continuous and measurable follow-up, without relying on manual re-audits.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity networks-and-telecoms\" style=\"z-index:9856\" data-exhibitor-name=\"nameshield\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b01c2d50-46aa-461b-9bc4-1eca65640602.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NAMESHIELD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.nameshield.com\/\" target=\"_blank\">https:\/\/www.nameshield.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> For 30 years, Nameshield, a software publisher, protects its customers' strategic domain names against cyber threats.<br \/>\r\n<br \/>\r\nAs a sovereign registrar, ISO27001 certified and with its own CERT, Nameshield is evolving in the heart of the cybersecurity ecosystem and anticipates the current and future challenges faced by companies and public administrations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity networks-and-telecoms\" style=\"z-index:9855\" data-exhibitor-name=\"nbs-system\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b5e0ad54-bd96-4c6d-8e0d-0b59c16aaa07.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NBS SYSTEM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.nbs-system.com\/\" target=\"_blank\">https:\/\/www.nbs-system.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I32<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> NBS System offers a proactive approach to IT security in order to effectively protect your information system. With more than 25 years of expertise and an offensive cybersecurity subsidiary of the CELESTE group, we support you through complementary cybersecurity offers and services for the protection of your critical data.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity managed-services\" style=\"z-index:9854\" data-exhibitor-name=\"neotrust\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5fe15992-3a70-486c-a9cf-b1677613a325.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NEOTRUST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.neotrust.io\" target=\"_blank\">www.neotrust.io<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E27<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Neotrust is an independent French cybersecurity expert founded by a CISO (consulting, audits, expertise, integration, and managed services). We support CIOs\/CISOs from startups to large enterprises in their cybersecurity transformation with a pragmatic, risk-reduction approach: governance, compliance, cyber defense, and resilience.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9853\" data-exhibitor-name=\"netmetrix\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e47633be-e899-4b94-b3d7-63b55880150b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NETMETRIX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/netmetrix-france.fr\/\" target=\"_blank\">https:\/\/netmetrix-france.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Netmetrix offers solutions and services for IT performance and cybersecurity. We will be accompanied by our partner Invicti, a leader in the detection and management of vulnerabilities in applications, websites, and APIs during the Dev and Run phases, with a solution that brings together :<br \/>\r\nDAST<br \/>\r\nIAST<br \/>\r\nSAST<br \/>\r\nSCA<br \/>\r\nContainers<br \/>\r\nASPM <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9852\" data-exhibitor-name=\"netskope\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/013b82e8-94d8-429b-b216-5d47d17c6dec.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NETSKOPE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.netskope.com\/fr\" target=\"_blank\">www.netskope.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> <br \/>\r\nNetskope, a leader in modern security and networking, addresses the needs of both security and networking teams by providing optimized access and real-time, context-based security for people, devices, and data anywhere they go. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity networks-and-telecoms\" style=\"z-index:9851\" data-exhibitor-name=\"netsystem\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5ffbe262-cff5-4237-b32e-a764e458c8bf.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NETSYSTEM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/netsystem.fr\/\" target=\"_blank\">https:\/\/netsystem.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I31<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Netsystem is an IT audit and consulting firm with strong expertise in IT M&A. It supports organizations in managing and optimizing their information systems. Its areas of expertise include cybersecurity, regulatory compliance, IT and information systems, as well as advisory services for M&A operations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9850\" data-exhibitor-name=\"netwrix\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/975cac6c-8b48-49dd-a0a2-ea124195a261.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NETWRIX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/netwrix.com\/fr\/\" target=\"_blank\">https:\/\/netwrix.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Netwrix unifies identity and data security with its 1Secure\u2122 platform, giving organizations precise visibility into access to sensitive information. Trusted by over 13,000 customers worldwide, Netwrix's solutions protect identities, secure data, and rapidly respond to threats using AI and unmatched flexibility.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9849\" data-exhibitor-name=\"nexpublica\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/44433d85-7fc0-422c-b970-563f0ae5b17e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NEXPUBLICA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ilex.fr\" target=\"_blank\">www.ilex.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> In the field of cybersecurity, Nexpublica supports its clients in their IAM strategy through the Ilex Identity & Access Management platform. This comprehensive offering comes in 4 product lines: Ilex Access Management, Ilex Identity Management, Ilex Customer IAM, and Ilex CMS. Available in SaaS, on-premise, and hybrid modes.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9848\" data-exhibitor-name=\"ninjaone\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/83cc76be-df74-4dae-a4cc-2f91973dea96.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NINJAONE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ninjaone.fr\" target=\"_blank\">www.ninjaone.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries by delivering endpoint management, autonomous patching, backup, and remote access in one platform.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9847\" data-exhibitor-name=\"nozomi-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ad4ac88b-0282-4388-9cf3-0742874dac60.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">NOZOMI NETWORKS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/fr.nozominetworks.com\/\" target=\"_blank\">https:\/\/fr.nozominetworks.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Nozomi Networks is the global leader in OT and IoT cybersecurity for critical infrastructure. Our technology delivers complete asset visibility, advanced threat detection, and AI-powered intelligence to safeguard industrial operations and ensure the continuity and resilience of the world\u2019s most demanding environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9846\" data-exhibitor-name=\"object-first\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/78e75e10-3530-468a-a4fc-ccbbb70cebe5.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OBJECT FIRST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/objectfirst.com\/fr\" target=\"_blank\">https:\/\/objectfirst.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I08-J07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Object First delivers secure, simple, and powerful backup storage purpose-built for Veeam that is absolutely immutable. With the ultimate ransomware defense, you and your organization become Simply Resilient.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training\" style=\"z-index:9845\" data-exhibitor-name=\"oeil-pour-oeil-creations\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c0582fb4-eccf-4e3d-a32e-4ce87cb3f42c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OEIL POUR OEIL CREATIONS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.oeilpouroeilcreations.fr\" target=\"_blank\">www.oeilpouroeilcreations.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> OPO turns cybersecurity into a collective reflex. Our short, immersive digital training programs help companies effectively raise employee awareness of cyber risks, compliance and AI, with measurable impact. Talk to our experts and discover how to sustainably reduce human risk.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9844\" data-exhibitor-name=\"ogo-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7bc0e9d1-f0fc-4f14-bdf8-d0c4037724b1.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OGO SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.ogosecurity.com\" target=\"_blank\">www.ogosecurity.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D28<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> OGO Security is a French company offering protection and acceleration services for websites, applications and APIs. <br \/>\r\nOGO's solution offers complete origin protection by combining WAF\/WAAP, IA, Anti DDOS and international CDN (200 PoP)<br \/>\r\nThe solution, available in SaaS, on-premise or sovereign cloud mode, is RGPD compliant.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9843\" data-exhibitor-name=\"okta\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9af8fef6-ce40-4e7f-9ed2-ad70e6c4b4f4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OKTA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.okta.com\/fr\" target=\"_blank\">https:\/\/www.okta.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L02-M03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Okta manages secure employee access (SSO, MFA), while Auth0 offers a flexible platform for customer and application authentication. Together, they form a complete identity ecosystem.<br \/>\r\n<br \/>\r\nOkta Secure AI, they now secure autonomous agents and detect threats like Deepfakes in real-time.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity networks-and-telecoms\" style=\"z-index:9842\" data-exhibitor-name=\"olfeo-by-ekinops\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/bd287a59-ad38-4fed-8604-d82849074687.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OLFEO BY EKINOPS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.olfeo.com\" target=\"_blank\">www.olfeo.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Olfeo by Ekinops\u2019 cybersecurity offering is aimed at private companies, public-sector organizations, and critical infrastructure entities, and fully addresses European digital sovereignty challenges. It ensures a high level of security while enabling compliance, particularly with European regulations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9841\" data-exhibitor-name=\"one-identity\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5d9f8fed-ed32-4673-a5dd-3f78f03adc76.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ONE IDENTITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.oneidentity.com\/fr-fr\" target=\"_blank\">www.oneidentity.com\/fr-fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> One Identity delivers trusted identity security for enterprises worldwide to protect and simplify access to digital identities. One Identity is a trusted leader in identity governance and administration (IGA), privileged access management (PAM), and access management (AM) for security without compromise.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9840\" data-exhibitor-name=\"oodrive\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1ea226cb-314d-43fd-a7e5-51cc2771b97a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OODRIVE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.oodrive.com\" target=\"_blank\">www.oodrive.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> The first trusted collaborative platform in Europe, certified SecNumCloud by ANSSI. It provides a secure platform for sharing and managing sensitive data, including DR, while ensuring confidentiality and integrity. Independent from internal information systems, it can ensure business continuity in the event of a crisis. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9839\" data-exhibitor-name=\"opswat\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a91ebf37-a565-441e-8304-561e493cfb39.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OPSWAT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.opswat.com\/\" target=\"_blank\">https:\/\/www.opswat.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J35<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> For over 20 years, OPSWAT has led critical infrastructure cybersecurity across IT, OT, and ICS. Guided by its zero-trust mantra\u2014\u2018Trust no file. Trust no device.\u2122\u2019\u2014OPSWAT delivers patented, end-to-end solutions that secure networks, data, and devices, ensure compliance, and protect the systems that power our way of life.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity managed-services\" style=\"z-index:9838\" data-exhibitor-name=\"orange-cyberdefense-france\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/840f96a7-6cbb-4cf5-a185-8c80421059c3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ORANGE CYBERDEFENSE FRANCE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.orangecyberdefense.com\/fr\/\" target=\"_blank\">www.orangecyberdefense.com\/fr\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69233\/orange-cyberdefense-france\">See conferences organized by ORANGE CYBERDEFENSE FRANCE<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C28-D27 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Orange Cyberdefense, the cybersecurity entity of the Orange Group, protects 50,000 businesses across 160 countries. As a European leader, we rely on 3,100 experts, 36 detection centers, and 30 years of experience to anticipate threats and provide a secure digital space, placing people at the heart of our mission.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing networks-and-telecoms managed-services\" style=\"z-index:9837\" data-exhibitor-name=\"overview\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/02fc6016-55e8-420d-a85a-c72e984f284a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OVERVIEW<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.oversoc.com\/\" target=\"_blank\">https:\/\/www.oversoc.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A18-B17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> OverView is a solution developed by Oversoc that aggregates your IT and Cyber data to keep your IT inventory up to date and automate your key compliance indicators. <br \/>\r\n<br \/>\r\nGet a clear, centralized view of the risks present in your IT environment: assets not covered by EDR, obsolete operating systems, vulnerable software, or non-compliant endpoints. Prio<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9836\" data-exhibitor-name=\"own\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5e63c8b1-af09-403c-9bec-4e8e7fe0d7d7.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OWN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.own.security\" target=\"_blank\">www.own.security<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C20<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> We provide advanced expertise covering the entire scope of cybersecurity: Cyber Threat Intelligence, SOC, incident response, penetration testing, and security audits. Our approach is based on the immediate mobilization of operational skills capable of securing, monitoring, and strengthening your IT systems. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity mobility managed-services\" style=\"z-index:9835\" data-exhibitor-name=\"palo-alto-networks-miel\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/dfc5ff9a-31b0-432d-8056-1676c454af5a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PALO ALTO NETWORKS - MIEL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.miel.fr\" target=\"_blank\">www.miel.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> The mission of Palo Alto Networks, global leader distributed by MIEL since 2009, is to make our transformed by AI world each day safer than the day before. Its integrated and innovative platform addresses all cybersecurity challenges: Zero Trust Networking, AI-driven operational security, and real-time security from code to cloud to SOC.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9834\" data-exhibitor-name=\"patrowl-io\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/cf529273-bd66-4bdb-809d-61031513a90e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PATROWL.IO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.patrowl.io\" target=\"_blank\">www.patrowl.io<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69246\/patrowl-io\">See conferences organized by PATROWL.IO<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I14 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Patrowl, SaaS cybersecurity solution, provides continuous protection for your external attack surface exposed on internet. In real-time, it reveals, monitors, and simplify cybersecurity, allowing remediation without complex tool. Anticipate cyber threats and strengthen the efficiency of your organizations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9833\" data-exhibitor-name=\"ping-identity\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/df9a5737-af6f-4355-a511-db69549731f9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PING IDENTITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.pingidentity.com\/fr.html\" target=\"_blank\">https:\/\/www.pingidentity.com\/fr.html<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69111\/ping-identity\">See conferences organized by PING IDENTITY<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J13 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Ping Identity offers an Identity and Access Management platform for customers, employees, partners, and non-human identities. It helps you fight fraud, enable passwordless and verifiable credentials, leverage AI with confidence, and more\u2014with scalability and flexibility. On-site, hybrid or cloud deployment.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing\" style=\"z-index:9832\" data-exhibitor-name=\"pointsharp\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f00d3b45-2efd-40d9-85ab-e97a290f889f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">POINTSHARP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/infinigate.cloud\/\" target=\"_blank\">https:\/\/infinigate.cloud\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Pointsharp is a European cybersecurity company established in 2006. Pointsharp delivers specialized software and services that help organizations secure identities, authorizations, access, and data in a user-friendly way. We believe that user-friendly security solutions are the foundation for a secure, modern digital workplace.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9831\" data-exhibitor-name=\"primx\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/86b2d94b-6245-4b90-afec-8fec4344c3dc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PRIM'X <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.primx.eu\/fr\/\" target=\"_blank\">https:\/\/www.primx.eu\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> PRIM'X, a major player in cybersecurity, ensures data confidentiality on sites, networks and in the cloud. Its global, automatic and transparent encryption protects against loss, theft or espionage. With nationally and internationally certified products, PRIM'X protects the data of thousands of users in Europe. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9830\" data-exhibitor-name=\"proofpoint-nomios\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4264f436-cb81-420c-a5bd-6ee8a6d6600f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PROOFPOINT - NOMIOS <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.proofpoint.com\/fr\" target=\"_blank\">https:\/\/www.proofpoint.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C16-D17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Nomios, a pan-European cybersecurity player since 2004, supports organizations through consulting, integration, and managed services (NOC, SOC, VOC) across IT, OT, and Cloud environments. Proofpoint complements this approach with human-centric cybersecurity solutions that protect people and data using AI.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9829\" data-exhibitor-name=\"qualys\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/78397b5f-1683-4665-8e22-fc5eea9f97dc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">QUALYS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.qualys.com\" target=\"_blank\">www.qualys.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> The Qualys Platform leverages a single agent to deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9828\" data-exhibitor-name=\"query-informatique\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/cd980a55-5736-46a7-87c3-8465104507cf.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">QUERY INFORMATIQUE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/query-informatique.com\/\" target=\"_blank\">https:\/\/query-informatique.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> We distribute software solutions for Windows platforms used by large enterprises, SMEs, and government agencies.<br \/>\r\nOur solutions are innovative and and easy to use to optimize support management, IT asset management, data security, and access to workstations and servers, as well as enabling targeted and customizable pop-up notifications.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9827\" data-exhibitor-name=\"radware\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/26d8f6a6-7c28-449f-8e7b-f95ecd3671cd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RADWARE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.radware.com\" target=\"_blank\">www.radware.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Radware provides large enterprises with AI-driven security solutions that protect applications and infrastructure from evolving threats, ensuring compliance, consistency, and expert defense across hybrid environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9826\" data-exhibitor-name=\"rapid7\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/da7902c7-b176-4dec-a595-520129a848af.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RAPID7\t\t\t<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.rapid7.com\" target=\"_blank\">www.rapid7.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing managed-services\" style=\"z-index:9825\" data-exhibitor-name=\"rcdevs-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/84aabc4c-e042-46d4-8088-1c952f337008.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RCDEVS SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.rcdevs.com\/\" target=\"_blank\">https:\/\/www.rcdevs.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A06-B07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> RCDevs Security delivers European-made on-prem and cloud solutions, uniquely unifying federation of cloud services (IAM & IdPs) with MFA, SSO, PKI, conditional access, NAC, e-signature, SSH key management, and KYC, supporting Push, FIDO2, Passkeys, and hardware tokens.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9824\" data-exhibitor-name=\"reel-it\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9e268e42-d722-41e9-be8f-eb3db439606d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">REEL IT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/reelit.fr\/\" target=\"_blank\">https:\/\/reelit.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Founded by specialists in digital transformation, the Reel IT group now consists of experts from various entities who work together to address all your IT needs. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9823\" data-exhibitor-name=\"riot-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c07759cf-6710-4148-b8ff-e1421dbc7091.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RIOT SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.tryriot.com\" target=\"_blank\">www.tryriot.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B18-C17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Riot is the first real-time employee cybersecurity monitoring platform. Founded at Y Combinator in 2020, it helps companies such as Mistral AI, Veolia, Richemont, and Leroy Merlin turn employees into the first line of defense, protecting over 2 million employees across 2,000 organizations today.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9822\" data-exhibitor-name=\"rubrik-france-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/aaf15da2-7911-41aa-bd37-d33093d762fa.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RUBRIK FRANCE SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.rubrik.com\/FR\" target=\"_blank\">www.rubrik.com\/FR<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Rubrik is a cybersecurity company and our mission is to secure the world\u2019s data. We pioneered Zero Trust Data SecurityTM to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9821\" data-exhibitor-name=\"rubycat\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9be3e055-4f3c-49d2-977c-d9bd143756b9.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RUBYCAT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.rubycat.eu\" target=\"_blank\">www.rubycat.eu<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69041\/rubycat\">See conferences organized by RUBYCAT<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I01 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> PROVE IT by Rubycat is a PAM solution. It controls, traces and records the actions carried out by privileged accounts (internal and external) on your IT system. It is quick to deploy, easy to manage on a daily basis and it is the only solution currently certified by the French Cyber Agency. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9820\" data-exhibitor-name=\"sailpoint-technologies\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/5e4fe961-600f-405e-a159-261c37778a62.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SAILPOINT TECHNOLOGIES<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sailpoint.com\/fr\" target=\"_blank\">www.sailpoint.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E17<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SailPoint delivers unified, identity-first security through an intelligent platform that manages and secures access for all human and digital identities. We empower enterprises to scale securely, defend against evolving threats, boost productivity, and drive transformation. Trusted by the world\u2019s most complex organizations, SailPoint protects the m<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9819\" data-exhibitor-name=\"saporo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/8294fb07-f53e-4ad8-83ca-a6436fad4b5f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SAPORO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.saporo.io\/\" target=\"_blank\">https:\/\/www.saporo.io\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Don\u2019t let your directories be the weak link in your security any longer! <br \/>\r\nSaporo is designed to eliminate vulnerabilities in your hybrid environments by mapping the complex relationships between identities, privileges, and systems. Move from reactive management to proactive governance, aligned with ANSSI, MITRE, NIS2, and other standards. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9818\" data-exhibitor-name=\"scalair\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b1ef12ce-67b0-4395-b5f9-07a30ba2e201.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SCALAIR<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.scalair.fr\" target=\"_blank\">www.scalair.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Scalair is a French service company specialising in cybersecurity and sovereign cloud computing. Awarded Scale Up French Tech and a member of Hexatrust, it relies on a network of low-carbon data centres to deliver managed services that guarantee security, compliance and business continuity.  <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity mobility networks-and-telecoms\" style=\"z-index:9817\" data-exhibitor-name=\"scc-france\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/26b87bb2-99db-4887-9a7a-d4f0170d7ff8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SCC FRANCE <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/france.scc.com\/\" target=\"_blank\">http:\/\/france.scc.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> With a turnover of more than \u20ac2.7 billion and 3,300 employees, SCC supports its customers' digital transformation in 3 areas: the development of uses and user experience, the modernisation of IT infrastructures and opening up to the Cloud, and the deployment of network and security strategies.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9816\" data-exhibitor-name=\"sea-tpi\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/66d15689-0b94-43fd-a9f0-b73c0455127a.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SEA TPI<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.seatpi.com\" target=\"_blank\">www.seatpi.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J08-K07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SEA TPI, a preferred partner of CIOs and a pure player in IT operations.<br \/>\r\nWe support mid-sized and large companies in the creation and management of IT production service centers.<br \/>\r\n<br \/>\r\nManaged operations, digital usage support, cybersecurity, and support for the digital transformation of information systems.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9815\" data-exhibitor-name=\"sewan\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d6c3cf85-a3df-4bf6-b96f-1d1ea784eb51.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SEWAN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sewan.fr\" target=\"_blank\">www.sewan.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sewan simplifies IT management for businesses through a unified approach. Discover advanced cybersecurity solutions (CrowdStrike, Fortinet\u2026), SD-WAN for seamless network control (Fortinet), and sovereign Cloud services certified HDS, all integrated within a complete and scalable IT ecosystem. Let\u2019s discuss your IT challenges at the event.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9814\" data-exhibitor-name=\"sfr-business\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/828156c6-db91-4d3a-ade5-1246158c3fe5.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SFR BUSINESS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sfrbusiness.fr\" target=\"_blank\">www.sfrbusiness.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SFR Business has set itself the mission of offering the best in convergence between telecoms and ICT services to all businesses, from small businesses to multinationals, as well as government agencies. SFR Business brings together unique expertise in the fields of communications and solutions in cybersecurity, networking, collaboration and IoT. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing\" style=\"z-index:9813\" data-exhibitor-name=\"sharekey-swiss-ag\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e8d79c1c-80a0-444e-bde1-20586fd0d7de.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SHAREKEY SWISS AG<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/sharekey.com\/\" target=\"_blank\">https:\/\/sharekey.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SHAREKEY is the Sovereign Collaboration app, fully encrypted and private, that secures Business Privacy.<br \/>\r\n\u2022 All-in-one (messaging, drive, visio, encrypted \"app-to-app\" co-edition,...)<br \/>\r\n\u2022 Very easy to use and with an elegant design<br \/>\r\n\u2022 Created by Executives for Executives, ideal solution for Decision-Makers and ExComs<br \/>\r\n\u2022 Zero Trust & Zero Knowledge<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing data-center managed-services consulting-and-training\" style=\"z-index:9812\" data-exhibitor-name=\"sigma-informatique\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/77e468af-ec7e-4248-8ef6-2bf8f957dee2.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SIGMA INFORMATIQUE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sigma.fr\" target=\"_blank\">www.sigma.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sigma, a sovereign Cloud and Managed Services provider, protects your IT with a full cyber offering: awareness, compliance, M365 governance and a 24\/7 managed SOC. Exaegis Blueprint 2026 leader, Sigma delivers performance, resilience and peace of mind to SMEs, mid\u2011market firms and public bodies.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>MANAGED SERVICES<\/li><li>CONSULTING AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing data-center networks-and-telecoms mobility\" style=\"z-index:9811\" data-exhibitor-name=\"skyhigh-security-2sb\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/92f5f74d-2f22-442e-b425-0af601bb87f3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SKYHIGH SECURITY \/ 2SB<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.2sb.fr\" target=\"_blank\">www.2sb.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H36<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Skyhigh is a data-centric SSE platform securing information across web, cloud, and private apps. By unifying SWG, CASB, ZTNA, and DLP, it blends cloud agility with compliance and governance, making it ideal for sensitive or highly regulated environments. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>NETWORKS AND TELECOMS<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity\" style=\"z-index:9810\" data-exhibitor-name=\"sns-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/25b85541-cf09-4010-b739-06cb55e4d69d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SNS SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sns-security.fr\/\" target=\"_blank\">www.sns-security.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand F11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SNS Security is a leading player in the field of cybersecurity. The company supports SMEs, mid-sized companies, and large enterprises across all industries in securing their digital transformation. For more than 20 years, cybersecurity consulting and managed services (integration, support, and monitoring of security equipment) have been at the core<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing networks-and-telecoms managed-services\" style=\"z-index:9809\" data-exhibitor-name=\"solarwinds\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f4dab8c0-eeb4-463a-98ad-111d6b348b3f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SOLARWINDS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.solarwinds.com\" target=\"_blank\">www.solarwinds.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B12<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SolarWinds is a leading provider of simple, powerful, and secure IT management and observability software. Our solutions, with AIOps-powered capabilities,  give organizations worldwide a unified view of modern, distributed, and hybrid networks to accelerate digital transformation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility networks-and-telecoms managed-services\" style=\"z-index:9808\" data-exhibitor-name=\"sophos\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/15898734-c70b-485c-b727-875aef34da4b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SOPHOS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sophos.fr\" target=\"_blank\">www.sophos.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D24-E25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sophos, a global leader in innovation, offers managed detection and response (MDR) services, as well as a portfolio of cybersecurity, endpoint, network, email and cloud technologies, along with extended detection and response (XDR), identity detection and response (ITDR) and next-generation SIEM solutions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9807\" data-exhibitor-name=\"sosafe\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9a344e4d-344d-4022-9f78-7933ace6076e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SOSAFE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/sosafe-awareness.com\/fr\/\" target=\"_blank\">https:\/\/sosafe-awareness.com\/fr\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69761\/sosafe\">See conferences organized by SOSAFE<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M13 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SoSafe is the adaptive human risk management platform that helps organizations unlock human resilience at scale \u2014 combining behavioral science, global community intelligence, and AI to stay ahead of evolving threats.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9806\" data-exhibitor-name=\"spie-ics\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/240e289b-4537-435b-a974-ba7e14a25df3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SPIE ICS <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.spie-ics.com\" target=\"_blank\">www.spie-ics.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Subsidiary of SPIE France, SPIE ICS is a French digital services company. Expert in integration, IT outsourcing, Cloud, Smart Data, and cybersecurity, it supports the responsible digital transformation of its clients. With 3,200 employees and 60 sites in France, SPIE ICS offers tailored solutions to meet your needs.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9805\" data-exhibitor-name=\"splunk\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e0853028-d637-48ae-b909-10fc3ba64291.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SPLUNK<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.splunk.com\/fr_fr\" target=\"_blank\">https:\/\/www.splunk.com\/fr_fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H18<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Splunk, a Cisco company, helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application issues from becoming major incidents, absorb shocks from digital disruptions, and accelerate digital transformation<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9804\" data-exhibitor-name=\"squad\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/c27c1bc9-e1eb-469c-be97-aaa10bbba59e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SQUAD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.squadgroup.com\/fr\/\" target=\"_blank\">https:\/\/www.squadgroup.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H37<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Since 2011, Squad has established itself as a French leader in cybersecurity, PASSI-certified, offering a 360\u00b0 portfolio (audit, consulting, integration, managed services). The 2024 acquisitions of Newlode and Scassi strengthen its European presence with 1,000 experts across 14 offices and bring revenue to \u20ac125M.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training data-center cybersecurity managed-services\" style=\"z-index:9803\" data-exhibitor-name=\"stordata\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ed10dada-c258-4f29-9c00-d4f209361876.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">STORDATA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.stordata.fr\/\" target=\"_blank\">https:\/\/www.stordata.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J22<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stordata supports companies in modernizing and securing their information systems. We deliver tailor-made solutions to address data management, protection, and resilience challenges, from consulting and design to integration and support, helping build high-performance, resilient, and scalable IT environments.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9802\" data-exhibitor-name=\"stormshield\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f540416a-8a67-4ab3-a9e7-4c6a6b2c9669.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">STORMSHIELD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.stormshield.com\/fr\/\" target=\"_blank\">www.stormshield.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stormshield offers innovative end-to-end security solutions to protect networks , workstations  and data.<br \/>\r\nOur mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center\" style=\"z-index:9801\" data-exhibitor-name=\"suse\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4fab2d04-f3ef-4853-acf3-db5a02a5b7fc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SUSE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.suse.com\/fr-fr\/\" target=\"_blank\">https:\/\/www.suse.com\/fr-fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SUSE is a global leader in innovative, reliable and secure enterprise open source solutions. More than 60% of the Fortune 500 rely on SUSE to power their mission-critical workloads, enabling them to innovate everywhere \u2013 from the data center to the cloud, to the edge and beyond. SUSE puts the \u201copen\u201d back in open source.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity managed-services\" style=\"z-index:9800\" data-exhibitor-name=\"symantec-by-broadcom\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f38cfa3c-517f-4e9e-8f4e-5003c0e88716.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYMANTEC BY BROADCOM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.arrow.com\/globalecs\/fr\/\" target=\"_blank\">https:\/\/www.arrow.com\/globalecs\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J23<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Symantec, integrated into Broadcom\u2019s software portfolio, is described as a long\u2011standing and comprehensive cybersecurity player, covering the protection of endpoints, data, email, network, and cloud. Its role within the Enterprise Security Group strengthens a unified security approach for large enterprises.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9799\" data-exhibitor-name=\"symbiotic-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/24ff734d-47d0-4ffa-9043-d2fd9bd2bca0.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYMBIOTIC SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.symbioticsec.ai\/\" target=\"_blank\">https:\/\/www.symbioticsec.ai\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H35<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Symbiotic Security rethinks DevSecOps in the age of AI-coding, helping Devs and Security teams to:<br \/>\r\n\t1.\tCombine velocity and security through safe, governed use of LLMs (guardrails)<br \/>\r\n\t2.\tDetect and remediate vulnerabilities at the moment they are written (pre-commit)<br \/>\r\n\t3.\tTurn every vulnerability into an opportunity to never repeat it again (training)<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9798\" data-exhibitor-name=\"synetis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/85d75a74-2fb7-408c-8afa-7bda3e352cd4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYNETIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.synetis.com\/\" target=\"_blank\">https:\/\/www.synetis.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A22-B21<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Founded in 2010, Synetis is the leading independent French consulting firm specializing in Information Systems Security (ISS). As a cybersecurity \"pure player,\" Synetis offers a comprehensive end-to-end approach for its clients, ranging from SMEs to large corporations across all industries.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9797\" data-exhibitor-name=\"sysdig\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/11e48410-9820-4871-bc69-fa4417b79bf3.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYSDIG<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/fr.sysdig.com\/\" target=\"_blank\">https:\/\/fr.sysdig.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sysdig specializes in security and monitoring for cloud environments. Its CNAPP includes CSPM, CWPP, CDR, CIEM, Vulnerability Management & real-time attack graphs. Sysdig reduces false alerts, allowing teams to focus on real threats. Sysdig uses real-time application behavior analysis for effective security risk prioritization.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity mobility managed-services\" style=\"z-index:9796\" data-exhibitor-name=\"tanium\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f6ef748b-376e-43fa-8e50-5cb2c8c6bfe4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TANIUM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.tanium.fr\/\" target=\"_blank\">https:\/\/www.tanium.fr\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69237\/tanium\">See conferences organized by TANIUM<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E28-F23 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tanium is the Autonomous IT company. Powered by AI and real\u2011time endpoint intelligence, Tanium enables IT and security teams to make their organizations unstoppable. Trusted by leading global enterprises, our unified platform delivers endpoint management and security at scale with confidence.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center networks-and-telecoms\" style=\"z-index:9795\" data-exhibitor-name=\"tdf\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/79ce2cc2-a73c-4c7c-9588-9b1533b96bb8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TDF<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.tdf.fr\" target=\"_blank\">www.tdf.fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand K08-L07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> As a neutral infrastructure operator, TDF supports digital players in their hosting needs through its six interconnected data centers: Aix-Marseille, Bordeaux, Lille, Paris, Papeete, and Rennes. In addition, data center projects are currently underway in Paris, Toulouse, and Lyon.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9794\" data-exhibitor-name=\"tehtris\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e1b3cc87-e5aa-4052-a144-6030d0fe3617.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TEHTRIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/tehtris.com\/fr\/\" target=\"_blank\">https:\/\/tehtris.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H10-I11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> TEHTRIS develops sovereign technology that detects and neutralises known and unknown threats in real time thanks to our unified XDR platform. We natively integrate: EDR and MTD protection, advanced sandboxes, SOAR with automated playbooks, and a continuously enriched Threat Intelligence platform.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing managed-services\" style=\"z-index:9793\" data-exhibitor-name=\"teleport\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/14494169-0eb2-4ec2-bc52-a79ad61936ac.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TELEPORT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/goteleport.com\" target=\"_blank\">http:\/\/goteleport.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand N10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Teleport is a Zero Trust access platform designed to secure humans, AI agents, and non-human identities (NHI). It replaces VPNs, keys, and secrets with short-lived cryptographic identities issued Just-In-Time. Ideal for workloads, AI agents, and CI\/CD pipelines, with built-in audit and full traceability.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9792\" data-exhibitor-name=\"tenable\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f95f6fa7-475e-47b1-b805-5b59da22774c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TENABLE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/fr.tenable.com\/\" target=\"_blank\">https:\/\/fr.tenable.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I20<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A world leader in Exposure Management according to Gartner, Tenable isolates and eradicates risks threatening businesses. <br \/>\r\nIts AI-powered platform, Tenable One, unifies vision, intelligence, and action across the attack surface\u2014IT, OT, Cloud, and AI. <br \/>\r\nTenable serves over 44,000 customers worldwide.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9791\" data-exhibitor-name=\"tenacy\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/409dfab2-3bd8-4817-a155-55744750fd1c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TENACY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.tenacy.io\/\" target=\"_blank\">https:\/\/www.tenacy.io\/<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/conference\/69422\/tenacy\">See conferences organized by TENACY<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand G12 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tenacy is the leading cyber GRC platform that enables you to harmonize your cybersecurity practices regardless of the complexity of your organization, gain automated visibility into workflows for controlled compliance and improved collaboration, and obtain a consolidated, data-driven view of security at all levels.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity\" style=\"z-index:9790\" data-exhibitor-name=\"thales-exclusive-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b7ec7bad-c90f-405b-97a1-9af4cb966220.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">THALES \/ EXCLUSIVE NETWORKS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.thalesgroup.com\/en\/cybersecurity\/identity-access-management\" target=\"_blank\">https:\/\/www.thalesgroup.com\/en\/cybersecurity\/identity-access-management<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I34<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Thales offers platforms that reduce the risks and complexities associated with protecting applications, data, identities, and software. By leveraging these solutions, organizations can confidently move to the cloud, meet compliance requirements, and optimize software usage for their users worldwide.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity mobility networks-and-telecoms\" style=\"z-index:9789\" data-exhibitor-name=\"thegreenbow\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6a63e347-61ee-496f-b49c-9c97327d97be.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">THEGREENBOW<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.thegreenbow.com\/fr\/\" target=\"_blank\">https:\/\/www.thegreenbow.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> TheGreenBow is a trusted VPN software provider. We design reliable, easy-to-use solutions to secure access, connections, and data for organizations and individuals, wherever they are. Deployed in over 70 countries, our ANSSI-certified solutions serve SMBs, large enterprises, critical operators, and public administrations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9788\" data-exhibitor-name=\"threatlocker\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/422ecd04-5edd-45a2-a0b5-b7f6378dfd67.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">THREATLOCKER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.threatlocker.com\/\" target=\"_blank\">https:\/\/www.threatlocker.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I25<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stop attacks before they happen. ThreatLocker brings Zero Trust solutions to your organization with controls that put you in charge of who\u2014and\u2014what gets into your environment.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9787\" data-exhibitor-name=\"torq\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f75c62e9-eb2d-4c50-aecc-1c2943b203bb.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TORQ<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/torq.io\/\" target=\"_blank\">https:\/\/torq.io\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L19<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Torq is transforming cybersecurity with its autonomous SecOps platform powered by Hyperautomation and agentic AI. By connecting the entire security stack, Torq empowers organizations to instantly and precisely remediate security events, and orchestrate complex security processes at scale. <br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9786\" data-exhibitor-name=\"trendai\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e150de3e-a949-4781-b7c6-86e1b19dc0fd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TRENDAI\u2122<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.trendmicro.com\/fr_fr\/business.html\" target=\"_blank\">www.trendmicro.com\/fr_fr\/business.html<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D08-E09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> TrendAI\u2122, a business unit of Trend Micro\u2122 and a global leader in AI security, leverages artificial intelligence to protect more than 500,000 businesses and millions of individuals in AI, cloud, network, endpoint, and device environments.<br \/>\r\nAI Fearlessly. TrendMicro.com<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9785\" data-exhibitor-name=\"trustbuilder\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/375b7ca7-6913-4e89-b271-fbbf68f5114b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TRUSTBUILDER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.trustbuilder.com\/fr\/\" target=\"_blank\">https:\/\/www.trustbuilder.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> TrustBuilder is a French company specialized in identity security and strong authentication. We help organizations protect themselves against cyberattacks by securing data and access. With a global presence, we secure more than 10 million users.<br \/>\r\nTrustBuilder, your first line of defense against cyberattacks<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9784\" data-exhibitor-name=\"tufin\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f276f452-b9bb-49e2-b3bd-9cba550bde33.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TUFIN<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.tufin.com\/fr\" target=\"_blank\">https:\/\/www.tufin.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand L15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tufin is the leading Network Security Posture Management (NSPM) platform, providing a unified control plane for hybrid networks. With precise topology, policy-driven automation, and continuous compliance, Tufin helps organizations reduce risk, simplify operations, and accelerate secure business change. One Network. One Platform. Total Control.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9783\" data-exhibitor-name=\"tyrex\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1b91d621-fe57-4f78-a45f-5a41acc6e381.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TYREX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/tyrex-cyber.com\/\" target=\"_blank\">https:\/\/tyrex-cyber.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> TYREX, the number one provider of removable media decontamination stations, develops cybersecurity solutions dedicated to protecting sensitive systems.<br \/>\r\n<br \/>\r\nOur technologies secure data transfers via removable media, eliminate intrusion risks, and strengthen organizational resilience.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9782\" data-exhibitor-name=\"ubika\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a93bce74-f3a8-4eab-8bdd-367545d4d977.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">UBIKA<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.ubikasec.com\/\" target=\"_blank\">https:\/\/www.ubikasec.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B16<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> UBIKA is a European cybersecurity provider. Our mission is to help organisations secure their digital transformation by protecting their web applications and APIs against daily attacks. We support more than 600 customers with solutions that are 100% GDPR compliant, not subject to the Cloud Act, and CSPN certified by ANSSI.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9781\" data-exhibitor-name=\"ucopia-by-weblib\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/dc35ce54-fd92-451e-9b67-97ab1616cfcd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">UCOPIA BY WEBLIB<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/ucopia.com\/\" target=\"_blank\">https:\/\/ucopia.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H31<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Through its Ucopia and Smart Wifi solutions, Weblib delivers secure, seamless guest WiFi for all sectors, along with fully customized captive portals. These solutions help manage user journeys, enhance customer experience and data insights, and boost engagement securely.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"data-center cybersecurity networks-and-telecoms\" style=\"z-index:9780\" data-exhibitor-name=\"ultraedge\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/763dc348-078f-4c70-93ba-7b84985a0f4d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">ULTRAEDGE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.ultraedge.com\/\" target=\"_blank\">https:\/\/www.ultraedge.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand J30<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> A leading partner for Edge data centers across France,<br \/>\r\nUltraEdge works to bring intelligence closer to where it is needed.<br \/>\r\n\u2022 With a unique nationwide network: more than 250 regional sites across France, upgraded in capacity, efficiency, and connectivity, including 7 powerful regional interconnection hubs (Lyon, Bordeaux, Strasbourg, Lille, and Ren<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity cloud-computing\" style=\"z-index:9779\" data-exhibitor-name=\"upwind-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d21b61e7-2947-4193-b6fd-31f3b653923b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">UPWIND SECURITY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.upwind.io\/\" target=\"_blank\">https:\/\/www.upwind.io\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H27<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Upwind is a next-generation, runtime-first cloud security platform built to lead the Runtime revolution in the AI era. It delivers a unified approach to cloud and application-layer security, providing real-time visibility from the inside out. Trusted by forward-thinking enterprises globally.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>CLOUD COMPUTING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services\" style=\"z-index:9778\" data-exhibitor-name=\"vanta-lyvoc\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/31b8dbee-92c5-4983-8ed2-3fae50400e66.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VANTA & LYVOC<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.lyvoc.com\/\" target=\"_blank\">https:\/\/www.lyvoc.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H33<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Accelerate your compliance projects (ISO27001, SOC2, DORA, NIS2) thanks to Lyvoc's GRC expertise and the power of the Vanta platform.<br \/>\r\nAlready 50 clients supported to obtain their certification in 4 to 6 months.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9777\" data-exhibitor-name=\"varonis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1a2c8e24-ec1b-4a8c-bc28-214e01c3ad23.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VARONIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.varonis.com\/fr\/\" target=\"_blank\">https:\/\/www.varonis.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C18-D19<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Varonis is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing data-center cybersecurity networks-and-telecoms managed-services\" style=\"z-index:9776\" data-exhibitor-name=\"veeam-x-monaco-digital-group\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f8491279-7c20-46d3-9f88-6d78308ce2de.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VEEAM X MONACO DIGITAL GROUP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/monacodigital.mc\/\" target=\"_blank\">https:\/\/monacodigital.mc\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand E04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Monaco Digital Group supports businesses in all areas of digital technology through its expertise in Cloud, Cyber, Infrastructure, etc.<br \/>\r\nVeeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>DATA CENTER<\/li><li>CYBERSECURITY<\/li><li>NETWORKS AND TELECOMS<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing cybersecurity mobility\" style=\"z-index:9775\" data-exhibitor-name=\"virtualbrowser\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/6d753c09-5648-4723-bf2d-4d474d3563f4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VIRTUALBROWSER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.virtualbrowser.com\/\" target=\"_blank\">https:\/\/www.virtualbrowser.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand I15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> VirtualBrowser is a European cybersecurity software provider, certified by the French ANSSI, specializing in Remote Browser Isolation. Its solution secures employees\u2019 web access while removing traditional security constraints. Trusted by over 150,000 users across 100+ major enterprises and public institutions (Thales, Naval, Ariane, Orano ...)<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing consulting-and-training cybersecurity mobility managed-services\" style=\"z-index:9774\" data-exhibitor-name=\"wakers\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/262f2277-42f9-42f7-b2a0-c450a3f29151.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">WAKERS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.wakers.fr\/\" target=\"_blank\">https:\/\/www.wakers.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H32<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Wakers is an IT services company specializing in security, user adoption, and the tailored deployment of Microsoft cloud solutions. Our expertise is centered around five key domains: Cybersecurity, Modern Work, Endpoints, Infrastructure, and AI Business Solutions. We are headquartered in Lille and Paris.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MOBILITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cloud-computing managed-services\" style=\"z-index:9773\" data-exhibitor-name=\"wasabi-technologies-llc\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/a657f7ee-86bd-4d8c-996c-7f710576252e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">WASABI TECHNOLOGIES LLC<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/wasabi.com\/fr\" target=\"_blank\">https:\/\/wasabi.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand H24<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Wasabi combines performance, enhanced security, and cost control to protect the world\u2019s most sensitive data.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CLOUD COMPUTING<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9772\" data-exhibitor-name=\"withsecure\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b3b5244d-38b4-49f5-abff-4e6a5445bf38.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">WITHSECURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.withsecure.com\/fr\" target=\"_blank\">https:\/\/www.withsecure.com\/fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand D14-E15<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> WithSecure, Europe\u2019s cybersecurity partner, protects mid-market businesses with proactive, compliant solutions. With 35+ years\u2019 expertise, it offers flexible models and Elements Cloud\u2014combining AI, human insight, and modular services for endpoint, cloud security, threat detection, and exposure management.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9771\" data-exhibitor-name=\"wiz\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f3c882c1-7d28-401b-b9ab-e530f140f67d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">WIZ<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.wiz.io\/fr-fr\" target=\"_blank\">https:\/\/www.wiz.io\/fr-fr<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand M08<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Protect Everything You Build and Run in the Cloud<br \/>\r\n<br \/>\r\nUse the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"consulting-and-training cybersecurity managed-services\" style=\"z-index:9770\" data-exhibitor-name=\"xmco\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/12ff1417-6c73-47de-bae8-440e60961d05.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">XMCO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.xmco.fr\/\" target=\"_blank\">https:\/\/www.xmco.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> XMCO has been an expert in cybersecurity for 20 years and shines thanks to its CERT and its advanced audit (RedTeam, intrusion tests). Our experts constantly evolves to protect our clients against many cyber threats. Thanks to the CTI, we manage to anticipate the threats ans protect French and international companies and institutions.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CONSULTING AND TRAINING<\/li><li>CYBERSECURITY<\/li><li>MANAGED SERVICES<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors -->\r\n\t\t\t\t<ul class=\"weyou-exhibitors-pagination\"><\/ul>\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors-shorcode -->[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-593","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exhibitors - IT and Cybersecurity One to one Meetings France<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exhibitors - IT and Cybersecurity One to one Meetings France\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings France\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itsmeetings\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-30T13:42:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@itsmeetings\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors\",\"name\":\"Exhibitors - IT and Cybersecurity One to one Meetings France\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#website\"},\"datePublished\":\"2020-01-28T16:42:51+00:00\",\"dateModified\":\"2020-01-30T13:42:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/salons.weyou-cms.com\/itsm\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exhibitors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\",\"name\":\"IT and Cybersecurity One to one Meetings France\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#organization\",\"name\":\"IT & IT Security Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itsm\/sites\/17\/2025\/10\/cropped-ITCM-LOGO-FRANCE-2026-couleur-1.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itsm\/sites\/17\/2025\/10\/cropped-ITCM-LOGO-FRANCE-2026-couleur-1.png\",\"width\":214,\"height\":175,\"caption\":\"IT & IT Security Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itsmeetings\",\"https:\/\/x.com\/itsmeetings\",\"https:\/\/www.linkedin.com\/company\/it-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exhibitors - IT and Cybersecurity One to one Meetings France","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors","og_locale":"en_US","og_type":"article","og_title":"Exhibitors - IT and Cybersecurity One to one Meetings France","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]","og_url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors","og_site_name":"IT and Cybersecurity One to one Meetings France","article_publisher":"https:\/\/www.facebook.com\/itsmeetings","article_modified_time":"2020-01-30T13:42:07+00:00","twitter_card":"summary_large_image","twitter_site":"@itsmeetings","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors","name":"Exhibitors - IT and Cybersecurity One to one Meetings France","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#website"},"datePublished":"2020-01-28T16:42:51+00:00","dateModified":"2020-01-30T13:42:07+00:00","breadcrumb":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/exhibitors#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/salons.weyou-cms.com\/itsm\/en"},{"@type":"ListItem","position":2,"name":"Exhibitors"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en","name":"IT and Cybersecurity One to one Meetings France","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#organization","name":"IT & IT Security Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itsm\/sites\/17\/2025\/10\/cropped-ITCM-LOGO-FRANCE-2026-couleur-1.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itsm\/sites\/17\/2025\/10\/cropped-ITCM-LOGO-FRANCE-2026-couleur-1.png","width":214,"height":175,"caption":"IT & IT Security Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itsmeetings","https:\/\/x.com\/itsmeetings","https:\/\/www.linkedin.com\/company\/it-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/pages\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":0,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/pages\/593\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.fr\/en\/wp-json\/wp\/v2\/media?parent=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}