
ONE TO ONE MEETINGS
THE CONCEPT
Why the unique concept of one to one meetings exhibition created by Weyou Group has become the undisputed benchmark for one-to-one events for both hosted buyers and exhibitors.
1. Business meetings
Between Hosted Buyers, who are qualified business leaders by our teams, and exhibitors in the cybersecurity, networks, cloud, mobility and datacentre sectors.
These business meetings reflect the shared desire of the Hosted Buyers and the exhibitors to meet each other thanks to our matchmaking platform, the only one of its kind in Europe.
2. These meetings take place on the exhibitor’s stand throughout the day
and are timed precisely using the meetings agenda given to the Hosted Buyers.
Hosted Buyers can also visit the exhibition and see the exhibitors they wish between their meetings: IT & Cybersecurity Meetings is in fact an exhibition where each exhibitor has a real stand.
3. High-level conferences
A schedule of high-level conferences is organised at the exhibition at certain times of the day.
No meetings are scheduled or organised during the conferences.
4. Hosted buyers are completely taken care of
by the organisers: transport, accommodation and catering.
5. The Networking
Networking between exhibitors and hosted buyers takes place throughout the meetings:
On the first evening at the welcome cocktail reception
On the second evening, during a free evening for exhibitors to invite their customers and/or prospects to dinner or drinks
On the last evening, a gala evening including a cocktail dinner.
The result of this concept:
- In the end, the concept allows hosted buyers to solve their problems and find the company or companies they need quickly, which saves them an enormous amount of time.
- For exhibitors, it means they can find new customers and meet top buyers who need their products or solutions, unlike at a traditional trade show.
YOUR BUSINESS MEETING!
IT & CYBERSECURITY MEETINGS offers a unique framework for professionals enabling them to find new service providers, suppliers, innovations and to differentiate themselves from their competitors.
A real business fair dedicated to professionals, our objective is to promote direct “face to face” meetings between Hosted Buyers and exhibitors through pre-organised and highly qualified business meetings prior to the event.
KEY NUMBERS
PARTICIPANTS PER DEY
ONE TO ONE MEETINGS
EXHIBITORS STANDS
The 2025 edition, which will be held on March 18th, 19th & 20th 2025 at the Palais des Festivals et des Congres in Cannes, will be punctuated by two days of business meetings, lunches, conferences, evenings… for a concentrate of business, networking and conviviality!
THE OBJECTIVE : to promote the one to one between exhibitors and Hosted Buyers through pre-organized meetings.
the participants
HOSTED BUYERS PROFILES
OUR EXHIBITORS
Recognized in the field of cyber-attack detection and neutralization systems, we offer certified solutions for protection against DDoS attacks and DNS security.
We also offer the possibility of testing the resilience of your infrastructures against these attacks.
- CYBERSECURITY
- NETWORKS AND TELECOMS
It offers technological, human (integration, consulting, managed services), and organizational solutions to secure and optimize corporate information systems.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
adista c'est :
- 40 agences de proximité
- 1 backbone interconnecté à nos 14 DC et + de 100 POP jusqu'à 200Gb/s
- 1 SOC 100% français
- 1 offre SASE unique avec Cato Networks
- Solutions Partner Microsoft
- Certifs ISO27001 & HDS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- Our ninjas are dedicated to protecting your data and cyber performance
- All our teams are based in France 🇫🇷
- Our technical expert team
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Subsidiary of the Framatome Group, Allentis develops and manufactures ANSSI-qualified cybersecurity solutions.
Allentis provides the whole end-to-end chain for monitoring IT&OT on Prem environments in terms of traffic capture, network visibility, performance and threat detection.
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Axians approach goes beyond technology. It’s about skilled experts working closely with our customers to navigate complex digital challenges. We’re a people-to-people organization where human connection and understanding drive solutions. Simply “The best of ICT with a human touch.”
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
We advise and support our customers in the fields of protection, defense, governance and resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
SASE leader Cato Networks is transforming networking and security with its SASE platform. By combining security, performance and simplicity, Cato simplifies traditional architectures. The result: seamless connectivity, reduced costs and optimal security for businesses.
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages re
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
The results: performance increase, data protection, storage hardware flexibility.
- DATA CENTER
- CYBERSECURITY
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Expertise:
- Red Team: Logical, social, and physical intrusions.
- Blue Team: MXDR, 30 min SLA, teams in France and Martinique.
- Purple Team: Incident response, predictive protection.
- Training: CISSP, CEH, CCT, OSCP, Qualiopi certified center.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
Building on decades of psychoacoustic research on how the brain perceives sound, EPOS designs audio solutions that provide the best conditions for the brain so you and the people you communicate with can achieve more with less brain energy
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- NETWORKS AND TELECOMS
- CYBERSECURITY
Cybersecurity is at the heart of the Cloud solution, with the provision of a complete range of solutions (firewall, SOC, etc.).
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
The Forescout cybersecurity platform offers comprehensive asset intelligence and control across IT, OT, and IoT environments. Trusted by Fortune 100 organizations, government agencies, and large enterprises for over two decades, Forescout serves as a cornerstone for managing cyber risk, ensuring compliance, and mitigating threats.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Also a yearly Cybersecurity event in Paris, GS Days (Global Security Days) www.gsdays.fr
Next event : 2026, January 20th.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
As the first EDR certified by ANSSI, it stands out for its digital independence in hosting options (cloud, SecNumCloud, on-premise).
- CYBERSECURITY
Detect and remediate risks with HCL AppScan and BigFix. These solutions provide comprehensive and proactive protection through application vulnerability management and patching, ensuring the security of your IT environment.
- DATA CENTER
- CYBERSECURITY
Theses areas of expertise: cybersecurity - Telecoms - Unified communications - Cloud.
A national presence through 10 local agencies !
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Designed, developed and hosted in France, our solution is available in CPaaS mode, API or via CRM connectors in a 100% secure environment. Simplicity, availability, adaptability have been part of our DNA for over 20 years.
#SMS
#RCS
#DATA
#RSE
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Silverfort is revolutionizing cybersecurity by providing agentless protection for identities and access, integrating Zero Trust and advanced threat detection.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
With more than 300 customers and 14 million users worldwide, the offer combines innovation, flexibility and performance. Available in SaaS, on-premise, and hybrid modes, it perfectly suits to market demands.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- MANAGED SERVICES
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- A simple, fun and interactive platform
- Fast, regular training on the tatami mat
- A monthly quiz and phishing tests to stay on your guard
- Suspicious e-mail? Recap card to review at any time
- Belt grading, just like in judo
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
We protect your crucial cloud data created in Microsoft 365, Entra ID (formerly Azure AD), Salesforce, Google Workspace, Azure DevOps, Power Platform, and more.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
KYTL offers solutions and services in Professional Services, Managed SOC Services..
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Protect yourself against social engineering and shadow IT with a password manager.
- CYBERSECURITY
- PRINT / DOCUMENT
- Leviia Drive: a secure collaborative suite with file sharing and editing, e-mail, video, calendar, etc.
- Leviia Storag3: cloud storage solution for data backup.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Logpoint is the only European SIEM vendor with a Common Criteria EAL3+ certification.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Implementing the observability of your IT services allows you to monitor your applications and your network 24/7.
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest IA (GenAI) innovation
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Faced with the digital transformation of our society and the increase in threats, cybersecurity is now a priority for all companies. After nearly 20 years of publications and feedback, MISC provides a pool of essential technical information for all teams in tech.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
As a sovereign registrar, ISO 27001 certified and with its own CERT, Nameshield evolves in the heart of the cybersecurity ecosystem, and anticipates the current and future challenges faced by companies and administrations.
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
The Nasuni File Data Platform provides effortless scale with hybrid cloud storage that delivers secure data access at the edge and supports modern enterprise expectations for delivering AI-driven insights.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
We deploy advanced solutions (awareness, automated pentesting, cloud security, CTI, SIEM, etc.) to protect companies from cyberthreats.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
OGO's solution offers complete origin protection by combining WAF/WAAP, IA, Anti DDOS and international CDN (200 PoP)
The solution, available in SaaS, on-premise or sovereign cloud mode, is RGPD compliant.
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
Whether you are a large enterprise, a local authority, an SME, a microbusiness, a professional, or an individual, we offer solutions tailored to your resources and specific cybersecurity needs.
Our 3,000 multidisciplinary experts support you, no matter your industry.
- CYBERSECURITY
- CYBERSECURITY
OWN, French Pure-Player in cybersecurity, is active in the fields of auditing, consulting, cyber intelligence (Threat Intelligence), incident response (CERT) and managed SOC.
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
Today, our solutions are used by hundreds of thousands of users in organizations as diverse as ministries, major banks, industries, SMEs, ...
- CYBERSECURITY
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
Our solutions are innovative and easy to use to optimize support and IT asset management, secure data and access to workstations and servers, ...
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
The company currently protects 1M+ employees worldwide.
- CYBERSECURITY
www.rubrik.com
- CYBERSECURITY
NEW : Prove IT outpost : the user web portal can securely be accessed from the Internet without a VPN !
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Four essential areas of activity:
- run of central services
- run of digital uses
- cybersecurity run
- support for digital transformation
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
• All-in-one (messaging, drive, videoconferencing, annotations,...).
• Very easy to use and with an elegant design.
• Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
• Zero Trust & Zero Knowledge
- CLOUD COMPUTING
- CYBERSECURITY
- PRINT / DOCUMENT
- MOBILITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MANAGED SERVICES
Snyk revolutionises security with a unique Dev-First platform designed for developers and security teams. Combining advanced AI, machine learning, and human expertise, it provides a comprehensive view of applications, simplifies risk management, and boosts productivity; all without compromising security.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
Our unified cybersecurity platform today protects more than 500,000 businesses and 250 million individuals from risks associated with the cloud, networks, devices and endpoints.
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Intuitive and customizable, our stations meet the needs of critical sectors such as defense, industry, and public services.
Discover our latest innovations designed for secure, compliant data exchanges worldwide.
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- Gain global visibility and risk prioritization that proactively reduces the attack surface
- CNAPP, CSPM, CIEM, DSPM, AI-SPM, CDR, Compliance, Security from the code
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
We have created ZDR360, an innovative, scalable XDR-MDR solution, proposed at fair price, with expert support and best practices.
We detect and react to weak signals announcing attacks as soon as they appear for greater efficiency.
Our customers 250 to 7500 p.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
A business fair with one-to-one meetings that allows real meetings with prospects and in-depth exchanges on projects. The setting is excellent and the event is conducive to meeting new clients.
Marie DEROGNAT– Chef de projet Marketing – WAYCOMOUR PARTNERS
Gallery
Our video
Relive through our video the moments that make up our IT & Cybersecurity Meetings 2024.
Our testimonials
Read all our testimonials from the Exhibitors and Hosted Buyers who were at IT & Cybersecurity Meetings.