ONE TO ONE MEETINGS
THE CONCEPT
Why the unique concept of one to one meetings exhibition created by Weyou Group has become the undisputed benchmark for one-to-one events for both hosted buyers and exhibitors.
1. Business meetings
Between Hosted Buyers, who are qualified business leaders by our teams, and exhibitors in the cybersecurity, networks, cloud, mobility and datacentre sectors.
These business meetings reflect the shared desire of the Hosted Buyers and the exhibitors to meet each other thanks to our matchmaking platform, the only one of its kind in Europe.
2. These meetings take place on the exhibitor’s stand throughout the day
and are timed precisely using the meetings agenda given to the Hosted Buyers.
Hosted Buyers can also visit the exhibition and see the exhibitors they wish between their meetings: IT & Cybersecurity Meetings is in fact an exhibition where each exhibitor has a real stand.
3. High-level conferences
A schedule of high-level conferences is organised at the exhibition at certain times of the day.
No meetings are scheduled or organised during the conferences.
4. Hosted buyers are completely taken care of
by the organisers: transport, accommodation and catering.
5. The Networking
Networking between exhibitors and hosted buyers takes place throughout the meetings:
On the first evening at the welcome cocktail reception
On the second evening, during a free evening for exhibitors to invite their customers and/or prospects to dinner or drinks
On the last evening, a gala evening including a cocktail dinner.
The result of this concept:
- In the end, the concept allows hosted buyers to solve their problems and find the company or companies they need quickly, which saves them an enormous amount of time.
- For exhibitors, it means they can find new customers and meet top buyers who need their products or solutions, unlike at a traditional trade show.
YOUR BUSINESS MEETING!
IT & CYBERSECURITY MEETINGS offers a unique framework for professionals enabling them to find new service providers, suppliers, innovations and to differentiate themselves from their competitors.
A real business fair dedicated to professionals, our objective is to promote direct “face to face” meetings between Hosted Buyers and exhibitors through pre-organised and highly qualified business meetings prior to the event.
KEY NUMBERS
PARTICIPANTS PER DEY
ONE TO ONE MEETINGS
EXHIBITORS STANDS
The 2025 edition, which will be held on March 18th, 19th & 20th 2025 at the Palais des Festivals et des Congres in Cannes, will be punctuated by two days of business meetings, lunches, conferences, evenings… for a concentrate of business, networking and conviviality!
THE OBJECTIVE : to promote the one to one between exhibitors and Hosted Buyers through pre-organized meetings.
the participants
HOSTED BUYERS PROFILES
OUR EXHIBITORS
Recognized in the field of cyber-attack detection and neutralization systems, we offer certified solutions for protection against DDoS attacks and DNS security.
We also offer the possibility of testing the resilience of your infrastructures against these attacks.
- CYBERSECURITY
- NETWORKS AND TELECOMS
It offers technological, human (integration, consulting, managed services), and organizational solutions to secure and optimize corporate information systems.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
adista c'est :
- 40 agences de proximité
- 1 backbone interconnecté à nos 14 datacenters et +de 100 POP jusqu'à 200Gb/s
- 1 SOC 100% français
- 1 offre SASE unique
- 1 statut Tiers1 CSP Microsoft
- Certifs ISO27001 & HDS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- Our ninjas are dedicated to protecting your data and cyber performance
- All our teams are based in France 🇫🇷
- Our technical expert team
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Subsidiary of the Framatome Group, Allentis develops and manufactures ANSSI-qualified cybersecurity solutions.
Allentis provides the whole end-to-end chain for monitoring IT&OT on Prem environments in terms of traffic capture, network visibility, performance and threat detection.
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
The results: performance increase, data protection, storage hardware flexibility.
- DATA CENTER
- CYBERSECURITY
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
Building on decades of psychoacoustic research on how the brain perceives sound, EPOS designs audio solutions that provide the best conditions for the brain so you and the people you communicate with can achieve more with less brain energy
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
The Forescout cybersecurity platform offers comprehensive asset intelligence and control across IT, OT, and IoT environments. Trusted by Fortune 100 organizations, government agencies, and large enterprises for over two decades, Forescout serves as a cornerstone for managing cyber risk, ensuring compliance, and mitigating threats.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
As the first EDR certified by ANSSI, it stands out for its digital independence in hosting options (cloud, SecNumCloud, on-premise).
- CYBERSECURITY
Theses areas of expertise: cybersecurity - Telecoms - Unified communications - Cloud.
A national presence through 10 local agencies !
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Silverfort is revolutionizing cybersecurity by providing agentless protection for identities and access, integrating Zero Trust and advanced threat detection.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- PRINT / DOCUMENT
- Leviia Drive: a secure collaborative suite with file sharing and editing, videoconferencing, e-mail, calendar, etc.
- Leviia Storag3: cloud storage solution for data backup.
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
Implementing the observability of your IT services allows you to monitor your applications and your network 24/7.
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
Faced with the digital transformation of our society and the increase in threats, cybersecurity is now a priority for all companies. After nearly 20 years of publications and feedback, MISC provides a pool of essential technical information for all teams in tech.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
As a sovereign registrar, ISO 27001 certified and with its own CERT, Nameshield evolves in the heart of the cybersecurity ecosystem, and anticipates the current and future challenges faced by companies and administrations.
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
We deploy advanced solutions (awareness, automated pentesting, cloud security, CTI, SIEM, etc.) to protect companies from cyberthreats.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
Whether you are a large enterprise, a local authority, an SME, a microbusiness, a professional, or an individual, we offer solutions tailored to your resources and specific cybersecurity needs.
Our 3,000 multidisciplinary experts support you, no matter your industry.
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
- CYBERSECURITY
Our solutions are innovative and easy to use to optimize support and IT asset management, secure data and access to workstations and servers, ...
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Our PAM-bastion solution, PROVE IT, is certified by French Cybersecurity Agency (ANSSI) - renewal in 2023, and reply to a major problem : the lack of visibility over actions performed by privileged accounts.
- CYBERSECURITY
- NETWORKS AND TELECOMS
Four essential areas of activity:
- run of central services
- run of digital uses
- cybersecurity run
- support for digital transformation
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
• All-in-one (messaging, drive, videoconferencing, annotations,...).
• Very easy to use and with an elegant design.
• Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
• Zero Trust & Zero Knowledge
- CLOUD COMPUTING
- CYBERSECURITY
- PRINT / DOCUMENT
- MOBILITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
Intuitive and customizable, our stations meet the needs of critical sectors such as defense, industry, and public services.
Discover our latest innovations designed for secure, compliant data exchanges worldwide.
- CYBERSECURITY
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- Gain global visibility and risk prioritization that proactively reduces the attack surface
- CNAPP, CSPM, CIEM, DSPM, AI-SPM, CDR, Compliance, Security from the code
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
A business fair with one-to-one meetings that allows real meetings with prospects and in-depth exchanges on projects. The setting is excellent and the event is conducive to meeting new clients.
Marie DEROGNAT– Chef de projet Marketing – WAYCOMOUR PARTNERS
Gallery
Our video
Relive through our video the moments that make up our IT & Cybersecurity Meetings 2024.
Our testimonials
Read all our testimonials from the Exhibitors and Hosted Buyers who were at IT & Cybersecurity Meetings.