
Visit
REQUEST YOUR FREE BADGE
Wednesday 19th of March 2025: from 08:45am to 06:30pm
Thursday 20th of March 2025: from 08:45am to 06:30pm
Palais des Congrès et des Festivals de Cannes – Hall Riviera
Attention access only for professionals.
The organisation reserves the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.
The Exhibitors
SECTORS EXHIBITING AT THE MEETINGS
- Unified communication
- Creation of open source solutions
- VoIP / ToIP
- Network Operator
- Telecom Operator / Mobile
- Network administration
- Performance management
- Terminals (ip, digital, sip)
- Communication solution / Videoconferencing
- NFC Services
- M2M Solutions
- Contact Centre
- Hardware
- Distributor in Telecoms / equipment
- Infrastructure management
- Fixed and mobile convergence
- SDN (Software-Defined Networking)
- Infrastructure management software
- Collaborative meetings / interactive meetings / Room reservation management
- Wan optimization
- Hyper-convergence
- Router / Switch
- Endpoint
- Firewall
- Workload Protection
- CSPM
- Mobile
- Wi-fi
- Encryption
- ZTNA
- Switch
- RED
- Access Point
- Managed Threat Response
- Rapid Response
- Professional Services
- Mobility Solutions / Mobility Products
- Peripherals
- Mobile / Ruggedized Terminals
- Mobile Applications
- Mobile CRM
- M payment
- Fleet management
- Embedded system / Geolocation
- Traceability
- Development of custom business applications
- BYOD Management
- Mobile Device Management (MDM)
- Connected objects
- EMM (Enterprise Mobility Management)
- Telecom Expense Management
- Mobile Application Testing
- Intervention Management
- Security software
- Safety equipment
- Monitoring tools / supervision
- Secure infrastructure services
- Authentication Service
- Data security
- Anomaly management
- Security test
- Cloud Security
- DNS
- Identity/email/data/contract protection
- Backup and data storage
- Secure networks
- Mobile networks
- Geolocation
- Connected objects
- RGPD Services/Solutions
- Messaging Security
- DDOS
- Devsecops
- RiskManagement / Cyber Risk Management
- Cyber Insurance / Scoring
- Compliance
- Governance
- Data archiving
- Data protection through artificial intelligence
- Automation
- Cloud Computing System
- Software publishing / SAAS solutions
- Edge Computing
- Platform or infrastructure solutions in cloud mode (PAAS, IAAS)
- Hosting
- Virtualization
- Virtualization of the workstation
- DAAS Solutions
- BI Solutions
- Big Data
- Analytics
- Dematerialization
- Collaborative
- Private Cloud
- Public Cloud
- Hybrid Cloud
- ITIL
- ITSM
- Cloud Provider
- Unified endpoint management
- Custom AI
- Generative IA
- Optimisation / Modernisation / Overhaul, construction and extension of data centres
- Outsourcing / Outsourcing
- Storage
- Infrastructure hosting
- Managed Services
- Backup
- Integrated and unified data system, powered by AI
- SSII / Integrator
- Consulting in new technologies
- Training
- Project management
- Monitoring tools
- Network Supervision
- Measurement and reporting
- Managed Print Service (MPS)
- Performance
- Security and Business Continuity (BCP)
- Outsourcing
- Digital product design
- Printing systems
- Hardware solutions
- Software Solutions
- Document management
- Document Security
- Print dematerialization
- Records Management Services (MDS)
- Remote printing and scanning
- Document Sharing
- Document audit
EXHIBITORS’ LIST
Recognized in the field of cyber-attack detection and neutralization systems, we offer certified solutions for protection against DDoS attacks and DNS security.
We also offer the possibility of testing the resilience of your infrastructures against these attacks.
- CYBERSECURITY
- NETWORKS AND TELECOMS
It offers technological, human (integration, consulting, managed services), and organizational solutions to secure and optimize corporate information systems.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
adista c'est :
- 40 agences de proximité
- 1 backbone interconnecté à nos 14 DC et + de 100 POP jusqu'à 200Gb/s
- 1 SOC 100% français
- 1 offre SASE unique avec Cato Networks
- Solutions Partner Microsoft
- Certifs ISO27001 & HDS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- Our ninjas are dedicated to protecting your data and cyber performance
- All our teams are based in France 🇫🇷
- Our technical expert team
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Subsidiary of the Framatome Group, Allentis develops and manufactures ANSSI-qualified cybersecurity solutions.
Allentis provides the whole end-to-end chain for monitoring IT&OT on Prem environments in terms of traffic capture, network visibility, performance and threat detection.
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Axians approach goes beyond technology. It’s about skilled experts working closely with our customers to navigate complex digital challenges. We’re a people-to-people organization where human connection and understanding drive solutions. Simply “The best of ICT with a human touch.”
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
We advise and support our customers in the fields of protection, defense, governance and resilience.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
SASE leader Cato Networks is transforming networking and security with its SASE platform. By combining security, performance and simplicity, Cato simplifies traditional architectures. The result: seamless connectivity, reduced costs and optimal security for businesses.
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages re
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
The results: performance increase, data protection, storage hardware flexibility.
- DATA CENTER
- CYBERSECURITY
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Expertise:
- Red Team: Logical, social, and physical intrusions.
- Blue Team: MXDR, 30 min SLA, teams in France and Martinique.
- Purple Team: Incident response, predictive protection.
- Training: CISSP, CEH, CCT, OSCP, Qualiopi certified center.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
Building on decades of psychoacoustic research on how the brain perceives sound, EPOS designs audio solutions that provide the best conditions for the brain so you and the people you communicate with can achieve more with less brain energy
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- NETWORKS AND TELECOMS
- CYBERSECURITY
Cybersecurity is at the heart of the Cloud solution, with the provision of a complete range of solutions (firewall, SOC, etc.).
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- CYBERSECURITY
The Forescout cybersecurity platform offers comprehensive asset intelligence and control across IT, OT, and IoT environments. Trusted by Fortune 100 organizations, government agencies, and large enterprises for over two decades, Forescout serves as a cornerstone for managing cyber risk, ensuring compliance, and mitigating threats.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Also a yearly Cybersecurity event in Paris, GS Days (Global Security Days) www.gsdays.fr
Next event : 2026, January 20th.
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
As the first EDR certified by ANSSI, it stands out for its digital independence in hosting options (cloud, SecNumCloud, on-premise).
- CYBERSECURITY
Detect and remediate risks with HCL AppScan and BigFix. These solutions provide comprehensive and proactive protection through application vulnerability management and patching, ensuring the security of your IT environment.
- DATA CENTER
- CYBERSECURITY
Theses areas of expertise: cybersecurity - Telecoms - Unified communications - Cloud.
A national presence through 10 local agencies !
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Designed, developed and hosted in France, our solution is available in CPaaS mode, API or via CRM connectors in a 100% secure environment. Simplicity, availability, adaptability have been part of our DNA for over 20 years.
#SMS
#RCS
#DATA
#RSE
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Silverfort is revolutionizing cybersecurity by providing agentless protection for identities and access, integrating Zero Trust and advanced threat detection.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
With more than 300 customers and 14 million users worldwide, the offer combines innovation, flexibility and performance. Available in SaaS, on-premise, and hybrid modes, it perfectly suits to market demands.
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- MANAGED SERVICES
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- A simple, fun and interactive platform
- Fast, regular training on the tatami mat
- A monthly quiz and phishing tests to stay on your guard
- Suspicious e-mail? Recap card to review at any time
- Belt grading, just like in judo
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
We protect your crucial cloud data created in Microsoft 365, Entra ID (formerly Azure AD), Salesforce, Google Workspace, Azure DevOps, Power Platform, and more.
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
KYTL offers solutions and services in Professional Services, Managed SOC Services..
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Protect yourself against social engineering and shadow IT with a password manager.
- CYBERSECURITY
- PRINT / DOCUMENT
- Leviia Drive: a secure collaborative suite with file sharing and editing, e-mail, video, calendar, etc.
- Leviia Storag3: cloud storage solution for data backup.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Logpoint is the only European SIEM vendor with a Common Criteria EAL3+ certification.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Implementing the observability of your IT services allows you to monitor your applications and your network 24/7.
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest IA (GenAI) innovation
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
Faced with the digital transformation of our society and the increase in threats, cybersecurity is now a priority for all companies. After nearly 20 years of publications and feedback, MISC provides a pool of essential technical information for all teams in tech.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
As a sovereign registrar, ISO 27001 certified and with its own CERT, Nameshield evolves in the heart of the cybersecurity ecosystem, and anticipates the current and future challenges faced by companies and administrations.
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
The Nasuni File Data Platform provides effortless scale with hybrid cloud storage that delivers secure data access at the edge and supports modern enterprise expectations for delivering AI-driven insights.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
We deploy advanced solutions (awareness, automated pentesting, cloud security, CTI, SIEM, etc.) to protect companies from cyberthreats.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
OGO's solution offers complete origin protection by combining WAF/WAAP, IA, Anti DDOS and international CDN (200 PoP)
The solution, available in SaaS, on-premise or sovereign cloud mode, is RGPD compliant.
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- CLOUD COMPUTING
- CYBERSECURITY
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CYBERSECURITY
Whether you are a large enterprise, a local authority, an SME, a microbusiness, a professional, or an individual, we offer solutions tailored to your resources and specific cybersecurity needs.
Our 3,000 multidisciplinary experts support you, no matter your industry.
- CYBERSECURITY
- CYBERSECURITY
OWN, French Pure-Player in cybersecurity, is active in the fields of auditing, consulting, cyber intelligence (Threat Intelligence), incident response (CERT) and managed SOC.
- CYBERSECURITY
- MOBILITY
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
Today, our solutions are used by hundreds of thousands of users in organizations as diverse as ministries, major banks, industries, SMEs, ...
- CYBERSECURITY
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- CYBERSECURITY
Our solutions are innovative and easy to use to optimize support and IT asset management, secure data and access to workstations and servers, ...
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
The company currently protects 1M+ employees worldwide.
- CYBERSECURITY
www.rubrik.com
- CYBERSECURITY
NEW : Prove IT outpost : the user web portal can securely be accessed from the Internet without a VPN !
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Four essential areas of activity:
- run of central services
- run of digital uses
- cybersecurity run
- support for digital transformation
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
• All-in-one (messaging, drive, videoconferencing, annotations,...).
• Very easy to use and with an elegant design.
• Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
• Zero Trust & Zero Knowledge
- CLOUD COMPUTING
- CYBERSECURITY
- PRINT / DOCUMENT
- MOBILITY
- NETWORKS AND TELECOMS
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MANAGED SERVICES
Snyk revolutionises security with a unique Dev-First platform designed for developers and security teams. Combining advanced AI, machine learning, and human expertise, it provides a comprehensive view of applications, simplifies risk management, and boosts productivity; all without compromising security.
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CONSULTING AND TRAINING
- CYBERSECURITY
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CLOUD COMPUTING
- DATA CENTER
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- DATA CENTER
- CYBERSECURITY
- DATA CENTER
- CLOUD COMPUTING
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
- MOBILITY
Our unified cybersecurity platform today protects more than 500,000 businesses and 250 million individuals from risks associated with the cloud, networks, devices and endpoints.
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
Intuitive and customizable, our stations meet the needs of critical sectors such as defense, industry, and public services.
Discover our latest innovations designed for secure, compliant data exchanges worldwide.
- CYBERSECURITY
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- CYBERSECURITY
- Gain global visibility and risk prioritization that proactively reduces the attack surface
- CNAPP, CSPM, CIEM, DSPM, AI-SPM, CDR, Compliance, Security from the code
- CYBERSECURITY
- CYBERSECURITY
- CYBERSECURITY
We have created ZDR360, an innovative, scalable XDR-MDR solution, proposed at fair price, with expert support and best practices.
We detect and react to weak signals announcing attacks as soon as they appear for greater efficiency.
Our customers 250 to 7500 p.
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
- CYBERSECURITY
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
CONFERENCES & WORKSHOPS
IT & CYBERSECURITY MEETINGS offers Plenary Conferences and Expert Workshops that will address a number of topical issues in the sector.
Practical information
DATES
Wednesday 19th of March 2025: from 08:45am to 06:30pm
Thursday 20th of March 2025 from 08:45am to 06:30pm
PLACE
Palais des Congrès et des Festivals de Cannes – Hall Riviera
La Croisette CS 30051
06414 Cannes Cedex – France