Visit

REQUEST YOUR FREE BADGE
Wednesday 18th of March 2026: from 08:45am to 06:30pm
Thursday 19th of March 2026: from 08:45am to 06:30pm
Palais des Congrès et des Festivals de Cannes – Hall Riviera
Attention access only for professionals.
The organisation reserves the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.
The Exhibitors
SECTORS EXHIBITING AT THE MEETINGS
- Unified communication
- Creation of open source solutions
- VoIP / ToIP
- Network Operator
- Telecom Operator / Mobile
- Network administration
- Performance management
- Terminals (ip, digital, sip)
- Communication solution / Videoconferencing
- NFC Services
- M2M Solutions
- Contact Centre
- Hardware
- Distributor in Telecoms / equipment
- Infrastructure management
- Fixed and mobile convergence
- SDN (Software-Defined Networking)
- Infrastructure management software
- Collaborative meetings / interactive meetings / Room reservation management
- Wan optimization
- Hyper-convergence
- Router / Switch
- Endpoint
- Firewall
- Workload Protection
- CSPM
- Mobile
- Wi-fi
- Encryption
- ZTNA
- Switch
- RED
- Access Point
- Managed Threat Response
- Rapid Response
- Professional Services
- Mobility Solutions / Mobility Products
- Peripherals
- Mobile / Ruggedized Terminals
- Mobile Applications
- Mobile CRM
- M payment
- Fleet management
- Embedded system / Geolocation
- Traceability
- Development of custom business applications
- BYOD Management
- Mobile Device Management (MDM)
- Connected objects
- EMM (Enterprise Mobility Management)
- Telecom Expense Management
- Mobile Application Testing
- Intervention Management
- Security software
- Safety equipment
- Monitoring tools / supervision
- Secure infrastructure services
- Authentication Service
- Data security
- Anomaly management
- Security test
- Cloud Security
- DNS
- Identity/email/data/contract protection
- Backup and data storage
- Secure networks
- Mobile networks
- Geolocation
- Connected objects
- RGPD Services/Solutions
- Messaging Security
- DDOS
- Devsecops
- RiskManagement / Cyber Risk Management
- Cyber Insurance / Scoring
- Compliance
- Governance
- Data archiving
- Data protection through artificial intelligence
- Automation
- Cloud Computing System
- Software publishing / SAAS solutions
- Edge Computing
- Platform or infrastructure solutions in cloud mode (PAAS, IAAS)
- Hosting
- Virtualization
- Virtualization of the workstation
- DAAS Solutions
- BI Solutions
- Big Data
- Analytics
- Dematerialization
- Collaborative
- Private Cloud
- Public Cloud
- Hybrid Cloud
- ITIL
- ITSM
- Cloud Provider
- Unified endpoint management
- Custom AI
- Generative IA
- Optimisation / Modernisation / Overhaul, construction and extension of data centres
- Outsourcing / Outsourcing
- Storage
- Infrastructure hosting
- Managed Services
- Backup
- Integrated and unified data system, powered by AI
- SSII / Integrator
- Consulting in new technologies
- Training
- Project management
- Monitoring tools
- Network Supervision
- Measurement and reporting
- Managed Print Service (MPS)
- Performance
- Security and Business Continuity (BCP)
- Outsourcing
- Digital product design
- Printing systems
- Hardware solutions
- Software Solutions
- Document management
- Document Security
- Print dematerialization
- Records Management Services (MDS)
- Remote printing and scanning
- Document Sharing
- Document audit
EXHIBITORS’ LIST
With over 200 solutions listed, 42k.io simplifies selection and evaluation, while helping you reflect on issues of dependency and strategic autonomy by analyzing the risks posed by cyber solutions.
- CONSULTING AND TRAINING
- CYBERSECURITY
With this expertise, 6cure also offers a DDoS audit service designed to assess the resilience of infrastructures to these attacks in a controlled environment.
- CYBERSECURITY
- CYBERSECURITY
- PRINT / DOCUMENT
- MOBILITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Our expertise in cloud, connectivity, cybersecurity, communication, and collaboration delivers value across the entire technical chain of your Information System.
Expertise strengthened with Devensys Cybersecurity and Upper-Link.
40 local agencies
1,000+ employees
16 sovereign data centers
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
With 10 years of experience, a multidisciplinary team of experts, and a capacity for innovation, AISI is the partner of choice for organizations most vulnerable to cyber threats.
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
Since 2008, we have supported businesses and public organizations with proximity, expertise, and commitment, delivering tailored solutions to drive their digital transformation.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
With our SaaS solution Mobilehub, our clients save money, reduce their carbon footprint, and secure their mobile devices through centralized management.
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- PRINT / DOCUMENT
identity centric approach goes beyond securing privileges and access, empowering
organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Board of Cyber is the only French platform that combines continuous self-assessment with automated TPRM to provide a 360° view of the cyber risk facing both the organization and its ecosystem.
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
Cegedim Outsourcing: IT services and solutions focused on workstation management, cybersecurity, managed services, and ITSM.
Cegedim.cloud: Sovereign Cloud Provider. IaaS and PaaS hosting, managed services, colocation/housing. SecNumCloud qualification, ISO and HDS certifications
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
With ChromeOS, businesses benefit from a cloud-native environment that is secure by design and easy to administer. Chrome Enterprise provides the control and governance you need. Finally, Cameyo allows you to run legacy Windows applications without the complexity of VDI.
- CYBERSECURITY
- CLOUD COMPUTING
- MANAGED SERVICES
- MOBILITY
- CYBERSECURITY
40 events that bring together more than 2,000 participants: after-work gatherings, IT-focused dinners, themed days, etc.
400 members
4 regions: Alpes-Maritimes, Bouches-du-Rhône, Var, Vaucluse
6,200 social media followers
24 sponsors per year
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Our SaaS solution integrates agentless with your environment to manage all your apps.
CoreUpdate can connect to the leading tools on the market, such as Intune, MECM/SCCM, Cyberwatch, SentinelOne, VMware, AWS, GCP, Azure, etc.
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
This operational and sovereign cybersecurity platform is designed to defend organizations against modern threats, combining a lightweight agent and a SaaS platform to protect workstations, collaborative tools, and more.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
With over 5,700 subscribers (+10k followers on LinkedIn), CYBERUN is THE magazine of CISOs and CIOs. Each issue focuses on a single in-depth topic (no news): a unique opportunity to share your expertise! Receive the magazine free of charge by entering your email address at cyberun.net.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
For public and private.
Time-shared CISO/DPO, Pentest IT/OT, purple/redteam, Phishing, Internal Audits, Training, Technical Audits, Governance, Risk Analysis, Crisis management exercise. Compliance (DORA, PART IS, ISO 27001, HDS, NIS 1/2, ii901, IGI1300,...), PCA, BIA, PSSI, Directives.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Expertise:
- Red Team: Logical, social, and physical intrusions.
- Blue Team: MXDR, 30 min SLA, teams in France and Martinique.
- Purple Team: Incident response, predictive protection.
- Training: CISSP, CEH, CCT, OSCP, Qualiopi certified center.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Our positioning is to provide the ability to encrypt sensitive data handled by all types of applications and services, relying on a breakthrough technology certified by the French National Cybersecurity Agency (ANSSI).
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
ENFORCIS is an innovative French cybersecurity startup delivering a novel, proactive approach to mitigating the risk of large-scale data exfiltration and mass data theft.
- CYBERSECURITY
Our mission: to deliver impeccable sound quality, optimal communication clarity, and a seamless user experience, helping every employee work more efficiently, stay more focused, and remain better connected.
- MOBILITY
- NETWORKS AND TELECOMS
- NETWORKS AND TELECOMS
- ERIUM Awareness (Cyber Investigation)
- ERIUM Attack Lab (BlackNoise)
- ERIUM Crisis (exercises via Cyber Investigation + BlackNoise or led by our 30 experts) + Cyber Readiness Score. We help 1.5M users, 110 countries, 50% CAC40, 15 languages & 97% satisfaction.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- DATA CENTER
Our flexible solutions, certified ISO 27001 & HDS: private cloud, IaaS, CaaS : managed Kubernetes ou Docker, S3 storage. 24/7 support.
- CLOUD COMPUTING
- DATA CENTER
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
EV Observe delivers a proactive and predictive monitoring experience. Anticipate and prevent service disruptions with 360° monitoring and AIOps.
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
- CYBERSECURITY
With over twenty years of expertise in connectivity and data, Free Pro manages the entire data value chain for organizations, from collection and transport to security and hosting.
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- NETWORKS AND TELECOMS
Cloud, Cybersecurity, Connectivity, Managed Services…
We design and operate solutions that simplify everyday life, support growth, and strengthen trust in IT.
Our strength?
Proximity and support.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- PRINT / DOCUMENT
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Transmit Security is redefining identity security by unifying identity management, authentication, fraud prevention, and identity verification into one resilient platform powered by Predictive AI technology.
- CONSULTING AND TRAINING
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
complete protection against complex threats for all size business. Our AI-
powered BarracudaONE platform secures email, data, applications, and
networks with innovative solutions, managed XDR and a centralized
dashboard to maximize protection and strengthen cyber resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MOBILITY
- NETWORKS AND TELECOMS
Our services range from consulting to maintenance through transformation both in physical infrastructures and in the cloud.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Through the leading Security Awareness Training platform, turn your users into cyber black belts and make security cool.
Fast, Automated, Effortless.
- CONSULTING AND TRAINING
- CYBERSECURITY
A specialist in advanced and secure IT solutions for high-performance cloud environments.
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
An independent technology, designed for the cloud.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
As regulations increasingly require isolation of administrative IT systems and IT/OT convergence accelerates, Kerys offers a unique approach to micro-segmenting your information system.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Linkt is an infrastructure aggregator addressing the critical needs of businesses and public-sector organizations through telecommunications services, systems integration, cybersecurity, and Cloud solutions.
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Certified CSPN by the French National Cybersecurity Agency (ANSSI), LockSelf is a leading provider of data protection solutions for businesses and supports thousands of private and public organizations.
- CYBERSECURITY
Logpoint is the only European SIEM vendor with a Common Criteria EAL3+ certification.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest IA (GenAI) innovationTrusted by over 1,500 companies.
- CYBERSECURITY
ITSM, ITAM, CMDB, SAM, SaaS Management, and Remote Control: everything is integrated to reduce complexity, control costs, and boost the efficiency of your IT and your company.
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Rigma extends pentests performed by Mobeta or third-party providers by ensuring continuous and measurable follow-up, without relying on manual re-audits.
- CYBERSECURITY
As a sovereign registrar, ISO27001 certified and with its own CERT, Nameshield is evolving in the heart of the cybersecurity ecosystem and anticipates the current and future challenges faced by companies and public administrations.
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
DAST
IAST
SAST
SCA
Containers
ASPM
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Netskope, a leader in modern security and networking, addresses the needs of both security and networking teams by providing optimized access and real-time, context-based security for people, devices, and data anywhere they go.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
OGO's solution offers complete origin protection by combining WAF/WAAP, IA, Anti DDOS and international CDN (200 PoP)
The solution, available in SaaS, on-premise or sovereign cloud mode, is RGPD compliant.
- CYBERSECURITY
Okta Secure AI, they now secure autonomous agents and detect threats like Deepfakes in real-time.
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Our solutions are innovative and and easy to use to optimize support management, IT asset management, data security, and access to workstations and servers, as well as enabling targeted and customizable pop-up notifications.
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Saporo is an Identity Security Posture Management (ISPM) solution designed to neutralize exposure across your hybrid environments. By mapping the complex relationships between identities, privileges, and systems, Saporo reveals invisible attack paths across Active Directory, Entra
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
We support mid-sized and large companies in the creation and management of IT production service centers.
Managed operations, digital usage support, cybersecurity, and support for the digital transformation of information systems.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
• All-in-one (messaging, drive, videoconferencing, annotations,...).
• Very easy to use and with an elegant design.
• Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
• Zero Trust & Zero Knowledge
- CLOUD COMPUTING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
1. Combine velocity and security through safe, governed use of LLMs (guardrails)
2. Detect and remediate vulnerabilities at the moment they are written (pre-commit)
3. Turn every vulnerability into an opportunity to never repeat it again (training)
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- DATA CENTER
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Its AI-powered platform, Tenable One, unifies vision, intelligence, and action across the attack surface—IT, OT, Cloud, and AI.
Tenable serves over 44,000 customers worldwide.
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
AI Fearlessly. TrendMicro.com
- CYBERSECURITY
TrustBuilder, your first line of defense against cyberattacks
- CYBERSECURITY
- CYBERSECURITY
Our technologies secure data transfers via removable media, eliminate intrusion risks, and strengthen organizational resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
UltraEdge works to bring intelligence closer to where it is needed.
• With a unique nationwide network: more than 250 regional sites across France, upgraded in capacity, efficiency, and connectivity, including 7 powerful regional interconnection hubs (Lyon, Bordeaux, Strasbourg, Lille, and Ren
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
Already 50 clients supported to obtain their certification in 4 to 6 months.
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- MANAGED SERVICES
- CYBERSECURITY
Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
CONFERENCES & WORKSHOPS
IT & CYBERSECURITY MEETINGS offers Plenary Conferences and Expert Workshops that will address a number of topical issues in the sector.

Practical information
DATES
Wednesday 18th of March 2026: from 08:45am to 06:30pm
Thursday 19th of March 2026 from 08:45am to 06:30pm
PLACE
Palais des Congrès et des Festivals de Cannes – Hall Riviera
La Croisette CS 30051
06414 Cannes Cedex – France
