ONE TO ONE MEETINGS
THE CONCEPT
Why the unique concept of One to One meetings exhibition created by Weyou Group has become the undisputed benchmark for one-to-one events for both hosted buyers and exhibitors.

1. Business meetings
Between Hosted Buyers, who are qualified business leaders by our teams, and exhibitors in the cybersecurity, networks, cloud, mobility, datacentre and AI solutions sectors.
These business meetings reflect the shared desire of the Hosted Buyers and the exhibitors to meet each other thanks to our matchmaking platform, the only one of its kind in Europe.
2. These meetings take place on the exhibitor’s stand throughout the day
and are timed precisely using the meetings agenda given to the Hosted Buyers.
Hosted Buyers can also visit the exhibition and see the exhibitors they wish between their meetings: IT & Cybersecurity Meetings is in fact an exhibition where each exhibitor has a real stand.


3. High-level conferences
A schedule of high-level conferences is organised at the exhibition at certain times of the day.
No meetings are scheduled or organised during the conferences.
4. Hosted buyers are completely taken care of
by the organisers: transport, accommodation and catering.


5. The Networking
Networking between exhibitors and hosted buyers takes place throughout the meetings:
On the first evening at the welcome cocktail reception
On the second evening, during a free evening for exhibitors to invite their customers and/or prospects to dinner or drinks
On the last evening, a gala evening including a cocktail dinner.
The result of this concept:
- In the end, the concept allows hosted buyers to solve their problems and find the company or companies they need quickly, which saves them an enormous amount of time.
- For exhibitors, it means they can find new customers and meet top buyers who need their products or solutions, unlike at a traditional trade show.
YOUR BUSINESS MEETING!

IT & CYBERSECURITY MEETINGS offers a unique framework for professionals enabling them to find new service providers, suppliers, innovations and to differentiate themselves from their competitors.
A real business fair dedicated to professionals, our objective is to promote direct “face to face” meetings between Hosted Buyers and exhibitors through pre-organised and highly qualified business meetings prior to the event.
KEY NUMBERS
PARTICIPANTS PER DEY
ONE TO ONE MEETINGS
EXHIBITORS STANDS
The 2025 edition, which will be held on March 17th, 18th & 19th 2026 at the Palais des Festivals et des Congres in Cannes, will be punctuated by two days of business meetings, lunches, conferences, evenings… for a concentrate of business, networking and conviviality!
THE OBJECTIVE : to promote the One to One between exhibitors and Hosted Buyers through pre-organized meetings.
the participants
HOSTED BUYERS PROFILES
OUR EXHIBITORS
With over 200 solutions listed, 42k.io simplifies selection and evaluation, while helping you reflect on issues of dependency and strategic autonomy by analyzing the risks posed by cyber solutions.
- CONSULTING AND TRAINING
- CYBERSECURITY
With this expertise, 6cure also offers a DDoS audit service designed to assess the resilience of infrastructures to these attacks in a controlled environment.
- CYBERSECURITY
- CYBERSECURITY
- PRINT / DOCUMENT
- MOBILITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Our expertise in cloud, connectivity, cybersecurity, communication, and collaboration delivers value across the entire technical chain of your Information System.
Expertise strengthened with Devensys Cybersecurity and Upper-Link.
40 local agencies
1,000+ employees
16 sovereign data centers
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
With 10 years of experience, a multidisciplinary team of experts, and a capacity for innovation, AISI is the partner of choice for organizations most vulnerable to cyber threats.
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
Since 2008, we have supported businesses and public organizations with proximity, expertise, and commitment, delivering tailored solutions to drive their digital transformation.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
With our SaaS solution Mobilehub, our clients save money, reduce their carbon footprint, and secure their mobile devices through centralized management.
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- PRINT / DOCUMENT
identity centric approach goes beyond securing privileges and access, empowering
organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Board of Cyber is the only French platform that combines continuous self-assessment with automated TPRM to provide a 360° view of the cyber risk facing both the organization and its ecosystem.
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
Cegedim Outsourcing: IT services and solutions focused on workstation management, cybersecurity, managed services, and ITSM.
Cegedim.cloud: Sovereign Cloud Provider. IaaS and PaaS hosting, managed services, colocation/housing. SecNumCloud qualification, ISO and HDS certifications
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
With ChromeOS, businesses benefit from a cloud-native environment that is secure by design and easy to administer. Chrome Enterprise provides the control and governance you need. Finally, Cameyo allows you to run legacy Windows applications without the complexity of VDI.
- CYBERSECURITY
- CLOUD COMPUTING
- MANAGED SERVICES
- MOBILITY
- CYBERSECURITY
40 events that bring together more than 2,000 participants: after-work gatherings, IT-focused dinners, themed days, etc.
400 members
4 regions: Alpes-Maritimes, Bouches-du-Rhône, Var, Vaucluse
6,200 social media followers
24 sponsors per year
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Our SaaS solution integrates agentless with your environment to manage all your apps.
CoreUpdate can connect to the leading tools on the market, such as Intune, MECM/SCCM, Cyberwatch, SentinelOne, VMware, AWS, GCP, Azure, etc.
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
This operational and sovereign cybersecurity platform is designed to defend organizations against modern threats, combining a lightweight agent and a SaaS platform to protect workstations, collaborative tools, and more.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
With over 5,700 subscribers (+10k followers on LinkedIn), CYBERUN is THE magazine of CISOs and CIOs. Each issue focuses on a single in-depth topic (no news): a unique opportunity to share your expertise! Receive the magazine free of charge by entering your email address at cyberun.net.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
For public and private.
Time-shared CISO/DPO, Pentest IT/OT, purple/redteam, Phishing, Internal Audits, Training, Technical Audits, Governance, Risk Analysis, Crisis management exercise. Compliance (DORA, PART IS, ISO 27001, HDS, NIS 1/2, ii901, IGI1300,...), PCA, BIA, PSSI, Directives.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Expertise:
- Red Team: Logical, social, and physical intrusions.
- Blue Team: MXDR, 30 min SLA, teams in France and Martinique.
- Purple Team: Incident response, predictive protection.
- Training: CISSP, CEH, CCT, OSCP, Qualiopi certified center.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Our positioning is to provide the ability to encrypt sensitive data handled by all types of applications and services, relying on a breakthrough technology certified by the French National Cybersecurity Agency (ANSSI).
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
ENFORCIS is an innovative French cybersecurity startup delivering a novel, proactive approach to mitigating the risk of large-scale data exfiltration and mass data theft.
- CYBERSECURITY
Our mission: to deliver impeccable sound quality, optimal communication clarity, and a seamless user experience, helping every employee work more efficiently, stay more focused, and remain better connected.
- MOBILITY
- NETWORKS AND TELECOMS
- NETWORKS AND TELECOMS
- ERIUM Awareness (Cyber Investigation)
- ERIUM Attack Lab (BlackNoise)
- ERIUM Crisis (exercises via Cyber Investigation + BlackNoise or led by our 30 experts) + Cyber Readiness Score. We help 1.5M users, 110 countries, 50% CAC40, 15 languages & 97% satisfaction.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- DATA CENTER
Our flexible solutions, certified ISO 27001 & HDS: private cloud, IaaS, CaaS : managed Kubernetes ou Docker, S3 storage. 24/7 support.
- CLOUD COMPUTING
- DATA CENTER
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
EV Observe delivers a proactive and predictive monitoring experience. Anticipate and prevent service disruptions with 360° monitoring and AIOps.
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
- CYBERSECURITY
With over twenty years of expertise in connectivity and data, Free Pro manages the entire data value chain for organizations, from collection and transport to security and hosting.
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- NETWORKS AND TELECOMS
Cloud, Cybersecurity, Connectivity, Managed Services…
We design and operate solutions that simplify everyday life, support growth, and strengthen trust in IT.
Our strength?
Proximity and support.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- PRINT / DOCUMENT
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Transmit Security is redefining identity security by unifying identity management, authentication, fraud prevention, and identity verification into one resilient platform powered by Predictive AI technology.
- CONSULTING AND TRAINING
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Simplify management, reduce attack surface, and eliminate recovery blind spots at the device level. IGEL delivers secure, high-performance, and controlled access to VDI, AVD, SaaS, and ZTA strategies while extending HW lifecycle.
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
complete protection against complex threats for all size business. Our AI-
powered BarracudaONE platform secures email, data, applications, and
networks with innovative solutions, managed XDR and a centralized
dashboard to maximize protection and strengthen cyber resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MOBILITY
- NETWORKS AND TELECOMS
Our services range from consulting to maintenance through transformation both in physical infrastructures and in the cloud.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Through the leading Security Awareness Training platform, turn your users into cyber black belts and make security cool.
Fast, Automated, Effortless.
- CONSULTING AND TRAINING
- CYBERSECURITY
A specialist in advanced and secure IT solutions for high-performance cloud environments.
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
An independent technology, designed for the cloud.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
As regulations increasingly require isolation of administrative IT systems and IT/OT convergence accelerates, Kerys offers a unique approach to micro-segmenting your information system.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Linkt is an infrastructure aggregator addressing the critical needs of businesses and public-sector organizations through telecommunications services, systems integration, cybersecurity, and Cloud solutions.
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Certified CSPN by the French National Cybersecurity Agency (ANSSI), LockSelf is a leading provider of data protection solutions for businesses and supports thousands of private and public organizations.
- CYBERSECURITY
Logpoint is the only European SIEM vendor with a Common Criteria EAL3+ certification.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest IA (GenAI) innovationTrusted by over 1,500 companies.
- CYBERSECURITY
ITSM, ITAM, CMDB, SAM, SaaS Management, and Remote Control: everything is integrated to reduce complexity, control costs, and boost the efficiency of your IT and your company.
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Rigma extends pentests performed by Mobeta or third-party providers by ensuring continuous and measurable follow-up, without relying on manual re-audits.
- CYBERSECURITY
As a sovereign registrar, ISO27001 certified and with its own CERT, Nameshield is evolving in the heart of the cybersecurity ecosystem and anticipates the current and future challenges faced by companies and public administrations.
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
DAST
IAST
SAST
SCA
Containers
ASPM
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Netskope, a leader in modern security and networking, addresses the needs of both security and networking teams by providing optimized access and real-time, context-based security for people, devices, and data anywhere they go.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
OGO's solution offers complete origin protection by combining WAF/WAAP, IA, Anti DDOS and international CDN (200 PoP)
The solution, available in SaaS, on-premise or sovereign cloud mode, is RGPD compliant.
- CYBERSECURITY
Okta Secure AI, they now secure autonomous agents and detect threats like Deepfakes in real-time.
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Our solutions are innovative and and easy to use to optimize support management, IT asset management, data security, and access to workstations and servers, as well as enabling targeted and customizable pop-up notifications.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Saporo is an Identity Security Posture Management (ISPM) solution designed to neutralize exposure across your hybrid environments. By mapping the complex relationships between identities, privileges, and systems, Saporo reveals invisible attack paths across Active Directory, Entra
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
We support mid-sized and large companies in the creation and management of IT production service centers.
Managed operations, digital usage support, cybersecurity, and support for the digital transformation of information systems.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
• All-in-one (messaging, drive, videoconferencing, annotations,...).
• Very easy to use and with an elegant design.
• Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
• Zero Trust & Zero Knowledge
- CLOUD COMPUTING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
1. Combine velocity and security through safe, governed use of LLMs (guardrails)
2. Detect and remediate vulnerabilities at the moment they are written (pre-commit)
3. Turn every vulnerability into an opportunity to never repeat it again (training)
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- DATA CENTER
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Its AI-powered platform, Tenable One, unifies vision, intelligence, and action across the attack surface—IT, OT, Cloud, and AI.
Tenable serves over 44,000 customers worldwide.
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
AI Fearlessly. TrendMicro.com
- CYBERSECURITY
TrustBuilder, your first line of defense against cyberattacks
- CYBERSECURITY
- CYBERSECURITY
Our technologies secure data transfers via removable media, eliminate intrusion risks, and strengthen organizational resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
UltraEdge works to bring intelligence closer to where it is needed.
• With a unique nationwide network: more than 250 regional sites across France, upgraded in capacity, efficiency, and connectivity, including 7 powerful regional interconnection hubs (Lyon, Bordeaux, Strasbourg, Lille, and Ren
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
Already 50 clients supported to obtain their certification in 4 to 6 months.
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- MANAGED SERVICES
- CYBERSECURITY
Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
A business fair with one-to-one meetings that allows real meetings with prospects and in-depth exchanges on projects. The setting is excellent and the event is conducive to meeting new clients.
Marie DEROGNAT– Chef de projet Marketing – WAYCOMOUR PARTNERS
Gallery
Our video
Relive through our video the moments that make up our IT & Cybersecurity Meetings 2025.
Our testimonials
Read all our testimonials from the Exhibitors and Hosted Buyers who were at IT & Cybersecurity Meetings.
