{"id":581,"date":"2019-12-26T14:15:59","date_gmt":"2019-12-26T13:15:59","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/top-decision-makers"},"modified":"2025-11-24T15:24:50","modified_gmt":"2025-11-24T14:24:50","slug":"top-decision-makers","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/","title":{"rendered":"Hosted Buyers"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-581\" data-title=\"Hosted Buyers\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-es\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-581-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>BECOME AN HOSTED BUYER<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-581-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#concept\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">THE CONCEPT<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#profile\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">YOUR PROFILE<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#projects\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">YOUR PROJECTS<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#programme\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">THE PROGRAMME<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner]<div id=\"wyvc-section-title-3296\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>THE CONCEPT<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-3296.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6147&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">Exhibitors with solutions<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6151&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">Pre-programmed business meetings<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6149&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">Conferences for your eve<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6153&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">For 3 Days in Marbella<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_text_separator title=&#8221;It &amp; Cybersecurity Meetings allows you to:&#8221; style=&#8221;shadow&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center\"><strong>Save time<\/strong> in your search for solutions to your problems<br \/>\n<strong>Challenge<\/strong> suppliers you already work with<br \/>\n<strong>Discover<\/strong> the latest innovations in the sector<br \/>\n<strong>Make personalised One to One meetings with the exhibitors of your choice<\/strong>.<br \/>\n<strong>Attend plenary conferences<\/strong><br \/>\n<strong>Expand your network<\/strong> during the three evenings organised in Marbella<\/p>\n<p>[\/vc_column_text][vc_separator style=&#8221;shadow&#8221;][\/vc_column][\/vc_row][vc_row el_id=&#8221;profile&#8221;][vc_column]<div id=\"wyvc-section-title-7244\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>YOU ARE:<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-7244.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Networks and Telecoms Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT Production Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Infrastructure Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Security Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT technical and logistics Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Buyer and prescriber of solutions \/ products at the reseller<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row el_id=&#8221;projects&#8221;][vc_column]<div id=\"wyvc-section-title-5125\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>YOU HAVE PROJECTS IN:<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-5125.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Mobility<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Networks and Telecoms<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Security<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Cloud computing<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Data center<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Consulting and training<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Managed services<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Printing \/ Document<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/matchmaking.weyou-group.com\/it-and-cybersecurity-meetings-es\/2025\/top-decideur\" target=\"_blank\" title=\"Inscription Form\">\r\n\t\t<span class=\"wyvc-btn-text\">JOIN THE HOSTED BUYERS PROGRAMME<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;1159&#8243; parallax_speed_bg=&#8221;2&#8243;][vc_column][vc_empty_space height=&#8221;400&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1584632736215{margin-top: -150px !important;background-color: #ffffff !important;border-radius: 1px !important;}&#8221; el_id=&#8221;programme&#8221;][vc_column]<div id=\"wyvc-section-title-2754\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>A MADE-TO-MEASURE PROGRAMME<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-2754.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;4388&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-media-text-wrapper img-txt-btn\">\r\n\t<div class=\"wyvc-media-text wyvc-shortcode\">\r\n\t\t<div class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2\">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t<p class=\"wyvc-st-title\">\r\n\t\t\tA made-to-measure stay \r\n\t\t<\/p>\r\n\t<\/div>\r\n<\/div>\r\n\t<div class=\"wyvc-text\"><p>As part of its <strong>Hosted Buyers Programme<\/strong>, IT &amp; CYBERSECURITY MEETINGS invites you as a client and takes care of your entire stay in Marbella (flight, accommodation and catering&#8230;). You will participate in pre-organised meetings and business lunches that have been validated beforehand.<\/p>\n<p><strong>IT &amp; CYBERSECURITY MEETINGS<\/strong> allows you to deepen your watch thanks to plenary conferences and &#8220;solutions&#8221; workshops led by experts.<\/p>\n<\/div> \r\n\t<\/div>\r\n<\/div><div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conferences\/\" title=\"Conferences\">\r\n\t\t<span class=\"wyvc-btn-text\">CONFERENCES<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div id=\"wyvc-section-title-2478\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<p class=\"wyvc-st-title\">\r\n\t\t\t\tCourse of the stay\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]<strong>Tuesday 17th of November 2026<\/strong><\/p>\n<ul>\n<li>Transferts to Marbella<\/li>\n<li>Welcome cocktail-dinner<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Wednesday 18th of November 2026<\/strong><\/p>\n<ul>\n<li>09:00am to 09:45am: Plenary Conference<\/li>\n<li>10:00am to 12:25am: Pre-arranged <strong>business meetings<\/strong><\/li>\n<li>12:30am to 13:15pm: Exhibitor workshop<\/li>\n<li>1:30pm to 3:00pm: Pre-arranged <strong>business lunches<\/strong><\/li>\n<li>03:10pm to 05:25pm: Pre-arranged <strong>business meetings<\/strong><\/li>\n<li>05:30pm to 06:15pm: Plenary Conference<\/li>\n<li>Free evening<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Thursday 19th of November 2026<\/strong><\/p>\n<ul>\n<li>09:00am to 09:45am: Plenary Conference<\/li>\n<li>10:00am to 12:25am: Pre-arranged <strong>business meetings<\/strong><\/li>\n<li>12:30am to 13:15pm: Exhibitor workshop<\/li>\n<li>1:30pm to 3:00pm: Pre-arranged <strong>business lunches<\/strong><\/li>\n<li>03:10pm to 05:25pm: Pre-arranged <strong>business meetings<\/strong><\/li>\n<li>05:30pm to 06:15pm: Plenary Conference<\/li>\n<li>Closing Cocktail-Dinner<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Friday 20th of November 2026<\/strong><\/p>\n<ul>\n<li><em>In the morning<\/em>: return<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/matchmaking.weyou-group.com\/it-and-cybersecurity-meetings-es\/2025\/top-decideur\" target=\"_blank\" title=\"Inscription Form\">\r\n\t\t<span class=\"wyvc-btn-text\">BECOME AN HOSTED BUYER<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;4405&#8243;][vc_single_image image=&#8221;330&#8243;][vc_single_image image=&#8221;4404&#8243;][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; el_id=&#8221;participants&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_empty_space height=&#8221;50px&#8221;][\/vc_column_inner][\/vc_row_inner]<div id=\"wyvc-section-title-2481\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>THE PARTICIPANTS<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-2481.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[vc_row_inner disable_element=&#8221;yes&#8221;][vc_column_inner]<div id=\"wyvc-section-title-1608\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>2024 EXHIBITORS&#8217; LIST<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n\r\n\t\t\t<div class=\"weyou-exhibitors-shorcode\" style=\"display: none;\">\r\n\t\t\t<div class=\"weyou-exhibitors-toolbar\">\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-filter\">\r\n\t\t\t\t\t\t<div class=\"filter-toggler\">Filter by Activity \/ Print my Visit Tour<\/div>\r\n\t\t\t\t\t\t<div class=\"filter-holder\">\r\n\t\t\t\t\t\t\t<div><label><input type=\"checkbox\" value=\"cybersecurity\"\/>CYBERSECURITY<\/label><label><input type=\"checkbox\" value=\"network-technologies-and-infrastructure\"\/>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/label><label><input type=\"checkbox\" value=\"artificial-intelligence-innovations-and-emerging-technologies\"\/>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/label><label><input type=\"checkbox\" value=\"solutions-cloud-et-data-centers\"\/>SOLUTIONS CLOUD ET DATA CENTERS<\/label><label><input type=\"checkbox\" value=\"analytics-data-management\"\/>ANALYTICS DATA MANAGEMENT<\/label><label><input type=\"checkbox\" value=\"mobility-and-endpoint-solution\"\/>MOBILITY AND ENDPOINT SOLUTION<\/label><label><input type=\"checkbox\" value=\"it-development-and-operations-devops\"\/>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/label><label><input type=\"checkbox\" value=\"professional-services-and-training\"\/>PROFESSIONAL SERVICES AND TRAINING<\/label><label><input type=\"checkbox\" value=\"managed-services-and-solutions\"\/>MANAGED SERVICES AND SOLUTIONS<\/label><label><input type=\"checkbox\" value=\"document-management-and-printing-systems\"\/>DOCUMENT MANAGEMENT AND PRINTING SYSTEMS<\/label>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div><!-- .filter-holder -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitors-filter -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-sort\">\r\n\t\t\t\t\t\t<span class=\"option-label\">Sort<\/span>\r\n\t\t\t\t\t\t<select class=\"sort\">\r\n\t\t\t\t\t\t\t<option value=\"asc\" selected>Company name A-Z<\/option>\r\n\t\t\t\t\t\t\t<option value=\"desc\">Company name Z-A<\/option>\r\n\t\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<span class=\"option-label\">Per page<\/span>\r\n\t\t\t\t\t<select class=\"perpage\">\r\n\t\t\t\t\t\t<option value=\"10\">10<\/option>\r\n\t\t\t\t\t\t<option value=\"15\" selected>15<\/option>\r\n\t\t\t\t\t\t<option value=\"30\">30<\/option>\r\n\t\t\t\t\t\t<option value=\"60\">60<\/option>\r\n\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<span class=\"option-label\">Layout<\/span>\r\n\t\t\t\t\t<div class=\"layout-switcher\">\r\n\t\t\t\t\t\t<a href=\"#\" class=\"grid-layout active\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm0-80h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133ZM200-413h133v-134H200v134Zm213 0h134v-134H413v134Zm214 0h133v-134H627v134ZM200-627h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"list-layout\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M760-360v-80H200v80h560Zm0-160v-80H200v80h560Zm0-160v-80H200v80h560ZM200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm560-80v-80H200v80h560Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t<\/div><!-- .layout-switcher -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t<\/div><!-- .weyou-exhibitors-toolbar -->\r\n\t\t\t<div class=\"weyou-exhibitors-container grid-layout columns-5\">\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"solutions-cloud-et-data-centers\" style=\"z-index:10000\" data-exhibitor-name=\"avepoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1dd45cbd-1b68-401d-9397-7816f4a2d1ef.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AVEPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.avepoint.com\/es\" target=\"_blank\">https:\/\/www.avepoint.com\/es<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/70850\/avepoint\/\">See conferences organized by AVEPOINT<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A12 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Securing the Future. AvePoint is the global leader in data security, governance, and resilience. Over 21,000 customers in more than 100 countries rely on AvePoint Confidence Platform to prepare, and secure their data across Microsoft, Google, Salesforce and other cloud platforms. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers analytics-data-management managed-services-and-solutions document-management-and-printing-systems\" style=\"z-index:9999\" data-exhibitor-name=\"beta-systems-software-espana-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/812bc801-70d4-477b-a3d3-0cdff47eb40d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BETA SYSTEMS SOFTWARE ESPANA S.L.<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.betasystems.com\/\" target=\"_blank\">https:\/\/www.betasystems.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Beta Systems is a German software editor, present in France since 1989. We develop software for the automation, operation and security of IT production. For 40 years, major players in all sectors (finance, industry, transportation, retail, public, etc.) have trusted Beta Systems to manage, optimize and secure their IT processes and infrastructure.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>ANALYTICS DATA MANAGEMENT<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li><li>DOCUMENT MANAGEMENT AND PRINTING SYSTEMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies analytics-data-management it-development-and-operations-devops managed-services-and-solutions\" style=\"z-index:9998\" data-exhibitor-name=\"beyondtrust\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b1725680-e4c9-4eef-946a-32d1645dd245.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BEYONDTRUST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.beyondtrust.com\" target=\"_blank\">http:\/\/www.beyondtrust.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> BeyondTrust is the global cybersecurity leader protecting Paths to Privilege\u2122. Our identity-centric approach goes beyond securing access, enabling organisations to manage the entire identity attack surface and stop threats, whether from external attackers or insiders. BeyondTrust is leading the charge in transforming identity security.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>ANALYTICS DATA MANAGEMENT<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9997\" data-exhibitor-name=\"bitdefender\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4351c043-1c79-4da2-865a-07a17ce33f94.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BITDEFENDER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.bitdefender.com\/fr-fr\/\" target=\"_blank\">https:\/\/www.bitdefender.com\/fr-fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Bitdefender, European cybersecurity leader, unifies prevention, detection & response across endpoints, servers, cloud & hybrid infrastructures. Trusted in 170+ countries, committed to EU data sovereignty with certified sovereign clouds. Its tech, used by 200+ top brands, stops millions of threats daily.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure\" style=\"z-index:9996\" data-exhibitor-name=\"cato-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/048ebc1b-3c73-4ce3-9652-9eed7b6a3fad.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CATO NETWORKS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.catonetworks.com\/\" target=\"_blank\">https:\/\/www.catonetworks.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cato provides the world's most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud(native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies it-development-and-operations-devops\" style=\"z-index:9995\" data-exhibitor-name=\"checkmarx\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/daf61846-b5e0-412d-ad17-dbd83a9108e8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CHECKMARX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/checkmarx.com\/\" target=\"_blank\">https:\/\/checkmarx.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Checkmarx is the leader in cloud-native, agentic application security that delivers enterprise-grade protection while reducing engineering costs and accelerating development velocity. The Checkmarx One platform scans trillions of lines of code annually for 40% of Fortune 500 companies, reducing customer vulnerability density by more than half. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure\" style=\"z-index:9994\" data-exhibitor-name=\"cloudflare-france-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7b00adff-cd74-4fec-ba77-839d918ad587.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CLOUDFLARE FRANCE SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cloudflare.com\" target=\"_blank\">www.cloudflare.com<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/69033\/cloudflare-france-sas\/\">See conferences organized by CLOUDFLARE FRANCE SAS<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B02-C01 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cloudflare is the leading connectivity cloud company on a mission to help build a better Internet. It empowers organizations to make their employees, apps and networks faster, more secure, while reducing complexity and cost. Cloudflare\u2019s connectivity cloud delivers a full-featured, unified platform of  of cloud-native products and developper tools.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9993\" data-exhibitor-name=\"crowdstrike-spain-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d7d15f7c-155e-4856-babb-dd6947313c32.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CROWDSTRIKE SPAIN S.L.<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\">https:\/\/www.crowdstrike.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B10-C09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity professional-services-and-training\" style=\"z-index:9992\" data-exhibitor-name=\"cyber-guru\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e21f5955-8ed9-422b-b06c-ef0bc5f58e53.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBER GURU<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cyberguru.it\/\" target=\"_blank\">https:\/\/www.cyberguru.it\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A02-B01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyber Guru is a leading cybersecurity awareness platform that transforms the human factor into the first line of defense against cybercrime. With adaptive learning, gamification, and AI, it delivers engaging training to over 1.5 million users in +90 countries, helping more than 1,500 organizations strengthen their digital protection.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9991\" data-exhibitor-name=\"cyberwatch\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/14948b0d-cf4b-4d39-b68e-28ca948e416e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERWATCH<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/cyberwatch.com\/\" target=\"_blank\">https:\/\/cyberwatch.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyberwatch is a French cybersecurity software vendor, specialized in Vulnerability and Compliance Management. Cyberwatch helps companies and public organizations, Operators of Vital Importance and Operators of Essential Services, to reduce their risk, using continuous analyzes and relevant reports that fit their business requirements. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers\" style=\"z-index:9990\" data-exhibitor-name=\"datacore\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/79badc95-e57d-4393-86d7-3c2896257e98.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DATACORE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.datacore.com\/fr\/\" target=\"_blank\">https:\/\/www.datacore.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> DataCore Software delivers  software-defined storage solutions for block, file and object storage, helping companies to modernize how they store, protect, and access data.<br \/>\r\nThe results: performance increase, data protection, storage hardware flexibility.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers it-development-and-operations-devops\" style=\"z-index:9989\" data-exhibitor-name=\"efficient-ip\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/03c6fadd-978c-4723-a6f0-d83f42b1268f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EFFICIENT IP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.efficientip.com\" target=\"_blank\">www.efficientip.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EfficientIP enhances network efficiency and security with unified DNS-DHCP-IPAM (DDI) solutions. Our 360\u00b0 DNS Security protects data and apps against advanced threats, while Smart DDI simplifies automation and strengthens IT initiatives like cloud, virtualization and mobility.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers mobility-and-endpoint-solution managed-services-and-solutions\" style=\"z-index:9988\" data-exhibitor-name=\"flexxible\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ef656350-18a9-4639-b8cc-bd70a0db975d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FLEXXIBLE\u00ae<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.flexxible.com\" target=\"_blank\">http:\/\/www.flexxible.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Flexxible, recognized on the Gartner Magic Quadrant for DEX and DaaS, is the European-based platform for the management and visibility of both physical and virtual endpoints by combining proactive automation, digital employee experience (DEX) and regulatory compliance with deployment support and customization services. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9987\" data-exhibitor-name=\"forcepoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/3f2e2224-6f6c-4628-bab5-17891414c6d4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FORCEPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.forcepoint.com\" target=\"_blank\">http:\/\/www.forcepoint.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Forcepoint simplifies security for global businesses and governments in 150+ countries. The company\u2019s Data Security Everywhere architecture makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity professional-services-and-training\" style=\"z-index:9986\" data-exhibitor-name=\"hucency\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b3ac93d1-da75-43f2-bd83-fb3b5d4919a4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HUCENCY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/avantdecliquer.com\/\" target=\"_blank\">https:\/\/avantdecliquer.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A06-B05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hucency is a French company specializing in human-centered cybersecurity. We help organizations strengthen their digital security by directly involving their employees.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies it-development-and-operations-devops professional-services-and-training managed-services-and-solutions\" style=\"z-index:9985\" data-exhibitor-name=\"ic-consult-and-sailpoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f4565bd8-ddcb-4e6c-89c2-ffb021fd80dd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IC CONSULT AND SAILPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/ic-consult.com\/es\" target=\"_blank\">https:\/\/ic-consult.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> iC Consult is a leading consultancy in identity security, offering advisory, architecture, implementation, integration, and operations to deliver secure\/scalable IAM solutions. SailPoint delivers unified, identity-first security, managing access for human and digital identities. Our intelligent platform helps enterprises scale and stay protected.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure artificial-intelligence-innovations-and-emerging-technologies mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9984\" data-exhibitor-name=\"manageengine\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/2e6a856a-cbc8-44cd-8b77-d74222515b5f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MANAGEENGINE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.manageengine.com\/es\" target=\"_blank\">www.manageengine.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ManageEngine, a division of Zoho Corp., provides comprehensive solutions to manage, secure, and optimize IT infrastructure. With over 60 modular tools, it empowers public and private organizations to drive digital transformation through technology, security, and innovation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers\" style=\"z-index:9983\" data-exhibitor-name=\"mimecast\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/391d8fd7-b611-4f73-a038-470e7ec3b9fc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MIMECAST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.mimecast.com\/\" target=\"_blank\">https:\/\/www.mimecast.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Mimecast is a global cybersecurity leader redefining how organizations secure human risk through precision-engineered AI. Integrating cutting-edge technology with human-centric pathways, our platform enhances visibility and provides strategic insight.\u202f <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9982\" data-exhibitor-name=\"object-first-spain-sl\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9c7b374e-d754-4bf5-90a8-a15d39b2787b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OBJECT FIRST SPAIN SL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/objectfirst.com\/es\" target=\"_blank\">https:\/\/objectfirst.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Object First protects data against malicious encryption with Ootbi (Out-of-the-box immutability), the best storage for Veeam. Immutable and ransomware-proof, it offers secure, simple, and powerful backup. It installs in 15 minutes and combines security, performance, and simplicity without compromises or extra costs.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9981\" data-exhibitor-name=\"passwork\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/16e0493b-b5e3-44bf-94ee-268d26b336a6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PASSWORK<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/passwork.pro\/\" target=\"_blank\">https:\/\/passwork.pro\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B08-C07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Passwork is an EU-based company with a trusted name in cybersecurity, that delivers a secure and efficient password management solution to help businesses protect their sensitive data, streamline access management, and enhance daily operations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution\" style=\"z-index:9980\" data-exhibitor-name=\"pradeo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/caa6a7d4-0354-4075-824c-abf2a93d4e1b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PRADEO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/pradeo.com\/fr\/\" target=\"_blank\">https:\/\/pradeo.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Pradeo is a global leader of mobile security. The company ensures the protection of all mobile usages, by offering services dedicated to securing smartphones, tablets and mobile applications. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9979\" data-exhibitor-name=\"recorded-future\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7e5e6197-d347-4def-8109-3ff70203ee7c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RECORDED FUTURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.recordedfuture.com\/\" target=\"_blank\">www.recordedfuture.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Recorded Future is the world\u2019s largest threat intelligence company. Recorded Future\u2019s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies professional-services-and-training\" style=\"z-index:9978\" data-exhibitor-name=\"riot-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ffae3ec7-bfcd-4077-98c6-df17415e4230.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RIOT SECURITY <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.tryriot.com\" target=\"_blank\">www.tryriot.com<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/70846\/riot-security\/\">See conferences organized by RIOT SECURITY <\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A14-B13 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Riot is the first real-time employee cybersecurity monitoring solution.<br \/>\r\nIn the age of generative AI-driven cyberattacks, the Riot platform enables cybersecurity teams to assess and improve the cyber posture of their employee.<br \/>\r\nRiot has grown to protect more than 1,500 organizations across all sectors and over 1M+ employees.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9977\" data-exhibitor-name=\"sentinelone\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/21bb0972-61b3-40c5-ae59-eea7068a6cb1.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SENTINELONE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sentinelone.com\" target=\"_blank\">http:\/\/www.sentinelone.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A04-B03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SentinelOne (NYSE:S) is the world\u2019s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution\" style=\"z-index:9976\" data-exhibitor-name=\"stormshield\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e62d4eee-b4d4-48e4-8dee-60ad417d20d4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">STORMSHIELD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.stormshield.com\" target=\"_blank\">https:\/\/www.stormshield.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stormshield offers innovative end-to-end security solutions certified and qualified at the highest European levels, to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security).<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers it-development-and-operations-devops professional-services-and-training\" style=\"z-index:9975\" data-exhibitor-name=\"sysdig-technology-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/39a3b786-4f0f-40fe-9ca8-8378a0a7e307.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYSDIG TECHNOLOGY, S.L<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.sysdig.com\/\" target=\"_blank\">https:\/\/www.sysdig.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B14-C14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sysdig helps security and development teams prevent, detect, and respond to threats instantly. Founded by the creators of Falco and Wireshark, and built on agentic AI, Sysdig delivers real-time defense grounded in the uncompromising truth of runtime. No guesswork. No black boxes. Just cloud security, the right way.  <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9974\" data-exhibitor-name=\"tanium\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/34d06dee-6741-4be5-9163-1086f58e6228.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TANIUM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.tanium.fr\/\" target=\"_blank\">https:\/\/www.tanium.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tanium AEM delivers autonomous management of endpoints across the industry's most comprehensive platform, providing solutions for asset discovery and inventory, vulnerability management, endpoint management, incident response, risk and compliance, and digital employee experience. <br \/>\r\n <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9973\" data-exhibitor-name=\"threatlocker\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/98949b75-f546-48fe-b543-fd7a4e163755.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">THREATLOCKER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.threatlocker.com\/\" target=\"_blank\">https:\/\/www.threatlocker.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B06-C05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stop ransomware! ThreatLocker\u00ae improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing\u2122, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services-and-solutions\" style=\"z-index:9972\" data-exhibitor-name=\"tyrex-cyber\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b787ef1d-bc6f-419e-80b2-fa7b5cfc854c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TYREX CYBER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/tyrex-cyber.com\/\" target=\"_blank\">https:\/\/tyrex-cyber.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A08-B07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tyrex is a French company specialized in cybersecurity, standing out for its local manufacturing and innovative white station solutions.<br \/>\r\nOur products combine ease of use with technical excellence, supported by highly responsive customer service based in France.<br \/>\r\nCurrently undergoing strong international expansion and driven by strategic partnerships<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9971\" data-exhibitor-name=\"varonis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/54b88b50-7f40-439f-9407-1a92b9bdbd32.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VARONIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.varonis.com\" target=\"_blank\">http:\/\/www.varonis.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B12<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Varonis is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors -->\r\n\t\t\t\t<ul class=\"weyou-exhibitors-pagination\"><\/ul>\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors-shorcode -->[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section disable_element=&#8221;yes&#8221; el_id=&#8221;decision-makers&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-1471\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>EXTRACT OF THE 2024 TOP DECISION-MAKERS&#8217; LIST<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;A &#8211; G&#8221; tab_id=&#8221;1580221024987-51407640-e2ad&#8221;][vc_column_text]<\/p>\n<table width=\"375\">\n<tbody>\n<tr>\n<td width=\"375\">A.C.I.P<\/td>\n<\/tr>\n<tr>\n<td>A2MICILE EUROPE<\/td>\n<\/tr>\n<tr>\n<td>ACTIS<\/td>\n<\/tr>\n<tr>\n<td>ADAPEI DES PYR\u00c9N\u00c9ES-ATLANTIQUES<\/td>\n<\/tr>\n<tr>\n<td>ADD &amp; ASSOCIES<\/td>\n<\/tr>\n<tr>\n<td>ADVANS GROUP<\/td>\n<\/tr>\n<tr>\n<td>AEROPORT DE PARIS<\/td>\n<\/tr>\n<tr>\n<td>AFD<\/td>\n<\/tr>\n<tr>\n<td>AFTRAL SERVICES<\/td>\n<\/tr>\n<tr>\n<td>AGENCE DE SERVICES ET DE PAIEMENT<\/td>\n<\/tr>\n<tr>\n<td>AGENCE NATIONALE DES TITRES SECURISES &#8211; ANTS<\/td>\n<\/tr>\n<tr>\n<td>AGENCE REGIONALE DE SANT\u00c9 NORMANDIE<\/td>\n<\/tr>\n<tr>\n<td>AGENCE TECHNIQUE D\u00c9PARTEMENTALE 43<\/td>\n<\/tr>\n<tr>\n<td>AGGLOMERATION DU PAYS VOIRONNAIS<\/td>\n<\/tr>\n<tr>\n<td>AGGLOM\u00c9RATION DU PUY EN VELAY<\/td>\n<\/tr>\n<tr>\n<td>AIR ALG\u00c9RIE<\/td>\n<\/tr>\n<tr>\n<td>AIR CARAIBES<\/td>\n<\/tr>\n<tr>\n<td>ALLIANZ FRANCE<\/td>\n<\/tr>\n<tr>\n<td>ALLIANZ PARTNERS<\/td>\n<\/tr>\n<tr>\n<td>ALPES ISERE HABITAT<\/td>\n<\/tr>\n<tr>\n<td>ALPTIS ASSURANCES<\/td>\n<\/tr>\n<tr>\n<td>ALSEAMAR<\/td>\n<\/tr>\n<tr>\n<td>AMADEUS<\/td>\n<\/tr>\n<tr>\n<td>AMARI METAL FRANCE<\/td>\n<\/tr>\n<tr>\n<td>AMELLER-DUBOIS<\/td>\n<\/tr>\n<tr>\n<td>ANDRICE LYON<\/td>\n<\/tr>\n<tr>\n<td>APF FRANCE HANDICAP<\/td>\n<\/tr>\n<tr>\n<td>ARKHINEO (DOCAPOSTE)<\/td>\n<\/tr>\n<tr>\n<td>ARTE FRANCE<\/td>\n<\/tr>\n<tr>\n<td>ASCENS PARIS<\/td>\n<\/tr>\n<tr>\n<td>ASCOTRONICS<\/td>\n<\/tr>\n<tr>\n<td>ASENDIA MANAGEMENT SAS<\/td>\n<\/tr>\n<tr>\n<td>ASL AIRLINES<\/td>\n<\/tr>\n<tr>\n<td>ATLANTIS T\u00c9L\u00c9VISION<\/td>\n<\/tr>\n<tr>\n<td>ATOS<\/td>\n<\/tr>\n<tr>\n<td>AUBERT<\/td>\n<\/tr>\n<tr>\n<td>AUBERT &#8211; NAOS<\/td>\n<\/tr>\n<tr>\n<td>AXIANS FRANCE<\/td>\n<\/tr>\n<tr>\n<td>B&amp;B HOTELS<\/td>\n<\/tr>\n<tr>\n<td>B&amp;B HOTELS GERMANY GMBH<\/td>\n<\/tr>\n<tr>\n<td>B&amp;B HOTELS ITALIA S.P.A.<\/td>\n<\/tr>\n<tr>\n<td>BACK MARKET<\/td>\n<\/tr>\n<tr>\n<td>BANQUE BIA PARIS<\/td>\n<\/tr>\n<tr>\n<td>BATIGESTION<\/td>\n<\/tr>\n<tr>\n<td>BNP PARIBAS SA<\/td>\n<\/tr>\n<tr>\n<td>BOARDRIDERS INC.<\/td>\n<\/tr>\n<tr>\n<td>BOLLHOFF<\/td>\n<\/tr>\n<tr>\n<td>BPI FRANCE<\/td>\n<\/tr>\n<tr>\n<td>BREST M\u00c9TROPOLE HABITAT<\/td>\n<\/tr>\n<tr>\n<td>BUT INTERNATIONAL<\/td>\n<\/tr>\n<tr>\n<td>CAISSE D&#8217;\u00c9PARGNE<\/td>\n<\/tr>\n<tr>\n<td>CASDEN BANQUE POPULAIRE<\/td>\n<\/tr>\n<tr>\n<td>CASH SYSTEMES<\/td>\n<\/tr>\n<tr>\n<td>CAUX SEINE AGGLO<\/td>\n<\/tr>\n<tr>\n<td>CCI DE CORSE<\/td>\n<\/tr>\n<tr>\n<td>CDISCOUNT<\/td>\n<\/tr>\n<tr>\n<td>CEGEMA<\/td>\n<\/tr>\n<tr>\n<td>CELL&amp;CO BIOSERVICES<\/td>\n<\/tr>\n<tr>\n<td>CELLULE NATIONALE LOGICIELLE DU MESR<\/td>\n<\/tr>\n<tr>\n<td>CENTRE DE GESTION DE LA LOIRE<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER D&#8217;AVIGNON<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER DE CANNES<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER DE NICE<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER DE PERPIGNAN<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER SAINTE MARIE DE NICE<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER UNIVERSITAIRE BESANCON<\/td>\n<\/tr>\n<tr>\n<td>CENTRE HOSPITALIER UNIVERSITAIRE BORDEAUX<\/td>\n<\/tr>\n<tr>\n<td>CENTRE SCIENTIFIQUE DE MONACO<\/td>\n<\/tr>\n<tr>\n<td>CERBA HEALTHCARE<\/td>\n<\/tr>\n<tr>\n<td>CEVA SANT\u00c9 ANIMALE<\/td>\n<\/tr>\n<tr>\n<td>CHATEAUFORM<\/td>\n<\/tr>\n<tr>\n<td>CHIESI SAS<\/td>\n<\/tr>\n<tr>\n<td>CHUBB FIRE &amp; SECURITY FRANCE<\/td>\n<\/tr>\n<tr>\n<td>CIFFREOBONA<\/td>\n<\/tr>\n<tr>\n<td>CIPELIA<\/td>\n<\/tr>\n<tr>\n<td>CIRCET<\/td>\n<\/tr>\n<tr>\n<td>CISION<\/td>\n<\/tr>\n<tr>\n<td>CLARINS<\/td>\n<\/tr>\n<tr>\n<td>CLEXTRAL<\/td>\n<\/tr>\n<tr>\n<td>CLIM CONSEIL<\/td>\n<\/tr>\n<tr>\n<td>CMA CGM<\/td>\n<\/tr>\n<tr>\n<td>CMA PACA<\/td>\n<\/tr>\n<tr>\n<td>CMB MONACO<\/td>\n<\/tr>\n<tr>\n<td>CMS MONACO<\/td>\n<\/tr>\n<tr>\n<td>CNAF<\/td>\n<\/tr>\n<tr>\n<td>CNES<\/td>\n<\/tr>\n<tr>\n<td>COMME J&#8217;AIME<\/td>\n<\/tr>\n<tr>\n<td>COMMUNE D\u2019EPINAY-SUR-SEINE<\/td>\n<\/tr>\n<tr>\n<td>COMMUNE D&#8217;ELBEUF<\/td>\n<\/tr>\n<tr>\n<td>COMPAGNIE DES SALINS DU MIDI ET SALINES DE L&#8217;EST<\/td>\n<\/tr>\n<tr>\n<td>COMPAGNIE FRUITIERE<\/td>\n<\/tr>\n<tr>\n<td>CONFORAMA<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DE HAUTE-SAVOIE<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DE LA HAUTE LOIRE<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DE LA HAUTE-GARONNE<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DE L&#8217;ESSONNE<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DES ALPES MARITIMES<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DES DEUX-SEVRES<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL D\u00c9PARTEMENTAL DU LOIR-ET-CHER<\/td>\n<\/tr>\n<tr>\n<td>CONSEIL NATIONAL DES BARREAUX<\/td>\n<\/tr>\n<tr>\n<td>CONSORT GROUP<\/td>\n<\/tr>\n<tr>\n<td>CONSORTIUM STADE DE FRANCE<\/td>\n<\/tr>\n<tr>\n<td>CORSICA FERRIES<\/td>\n<\/tr>\n<tr>\n<td>C\u00d4TE D&#8217;AZUR HABITAT<\/td>\n<\/tr>\n<tr>\n<td>CPRP SNCF<\/td>\n<\/tr>\n<tr>\n<td>CR\u00c9DIT AGRICOLE CONSUMER FINANCE<\/td>\n<\/tr>\n<tr>\n<td>CR\u00c9DIT AGRICOLE IMMOBILIER<\/td>\n<\/tr>\n<tr>\n<td>CREPS MONTPELLIER<\/td>\n<\/tr>\n<tr>\n<td>CROSSCALL<\/td>\n<\/tr>\n<tr>\n<td>CRP RATP<\/td>\n<\/tr>\n<tr>\n<td>CSTB<\/td>\n<\/tr>\n<tr>\n<td>CTI STRASBOURG &#8211; ASSURANCE MALADIE<\/td>\n<\/tr>\n<tr>\n<td>CU GRAND BESAN\u00c7ON M\u00c9TROPOLE<\/td>\n<\/tr>\n<tr>\n<td>CULTURA<\/td>\n<\/tr>\n<tr>\n<td>DASSAULT AVIATION<\/td>\n<\/tr>\n<tr>\n<td>DASSAULT FALCON<\/td>\n<\/tr>\n<tr>\n<td>D\u00c9PARTEMENT DE LA HAUTE SA\u00d4NE<\/td>\n<\/tr>\n<tr>\n<td>D\u00c9PARTEMENT DES HAUTES-ALPES<\/td>\n<\/tr>\n<tr>\n<td>D\u00c9TECTION \u00c9LECTRONIQUE FRAN\u00c7AISE OUEST<\/td>\n<\/tr>\n<tr>\n<td>DEVIALET<\/td>\n<\/tr>\n<tr>\n<td>DIGITAL LIANCE (SINCRONE)<\/td>\n<\/tr>\n<tr>\n<td>DIRECTION D\u00c9PARTEMENTALE SECURITE PUBLIQUE<\/td>\n<\/tr>\n<tr>\n<td>DIRECTION GENERALE DE L&#8217;AVIATION CIVILE<\/td>\n<\/tr>\n<tr>\n<td>DOCAPOSTE<\/td>\n<\/tr>\n<tr>\n<td>DOMOFRANCE<\/td>\n<\/tr>\n<tr>\n<td>DOMUSVI<\/td>\n<\/tr>\n<tr>\n<td>DROIT D&#8217;ENFANCE<\/td>\n<\/tr>\n<tr>\n<td>DURANSIA<\/td>\n<\/tr>\n<tr>\n<td>EASYPARAPHARMACIE<\/td>\n<\/tr>\n<tr>\n<td>ECOLE NORMALE SUPERIEURE DE LYON<\/td>\n<\/tr>\n<tr>\n<td>ECOLE POLYTECHNIQUE<\/td>\n<\/tr>\n<tr>\n<td>ECOVELO<\/td>\n<\/tr>\n<tr>\n<td>EDENIS<\/td>\n<\/tr>\n<tr>\n<td>EDHEC<\/td>\n<\/tr>\n<tr>\n<td>EIFFAGE ENERGIE SYSTEMES<\/td>\n<\/tr>\n<tr>\n<td>EIFFAGE SYSTEMES D&#8217;INFORMATION<\/td>\n<\/tr>\n<tr>\n<td>ELCA GROUP<\/td>\n<\/tr>\n<tr>\n<td>EMITECH SAS<\/td>\n<\/tr>\n<tr>\n<td>ENERGY-POOL<\/td>\n<\/tr>\n<tr>\n<td>ENGIE<\/td>\n<\/tr>\n<tr>\n<td>ENNOV<\/td>\n<\/tr>\n<tr>\n<td>ENSEMBLE SCOLAIRE ST JOSEPH ST MARC<\/td>\n<\/tr>\n<tr>\n<td>EOSIS<\/td>\n<\/tr>\n<tr>\n<td>EPSA<\/td>\n<\/tr>\n<tr>\n<td>EPSF<\/td>\n<\/tr>\n<tr>\n<td>ETAM<\/td>\n<\/tr>\n<tr>\n<td>EUROGERM<\/td>\n<\/tr>\n<tr>\n<td>FDC<\/td>\n<\/tr>\n<tr>\n<td>FEDERATION FRANCAISE DE HANDBALL<\/td>\n<\/tr>\n<tr>\n<td>F\u00c9D\u00c9RATION FRANCAISE DE TENNIS<\/td>\n<\/tr>\n<tr>\n<td>FESTIVAL DE CANNES<\/td>\n<\/tr>\n<tr>\n<td>FILHET-ALLARD<\/td>\n<\/tr>\n<tr>\n<td>FINORGA<\/td>\n<\/tr>\n<tr>\n<td>FLORAJET<\/td>\n<\/tr>\n<tr>\n<td>FLOWBIRD<\/td>\n<\/tr>\n<tr>\n<td>FONDATION COGNACQ-JAY<\/td>\n<\/tr>\n<tr>\n<td>FRANCE TRAVAIL<\/td>\n<\/tr>\n<tr>\n<td>GALERIES LAFAYETTE<\/td>\n<\/tr>\n<tr>\n<td>GENERALI<\/td>\n<\/tr>\n<tr>\n<td>GENERIX GROUP<\/td>\n<\/tr>\n<tr>\n<td>GEORGES<\/td>\n<\/tr>\n<tr>\n<td>GFIT<\/td>\n<\/tr>\n<tr>\n<td>GHT C\u00d4TE D&#8217;OPALE<\/td>\n<\/tr>\n<tr>\n<td>GHT NORD DAUPHINE &#8211; CENTRE HOSPITALIER PIERRE OUDOT<\/td>\n<\/tr>\n<tr>\n<td>GIDE LOYRETTE NOUEL<\/td>\n<\/tr>\n<tr>\n<td>GIE COMUTITRES<\/td>\n<\/tr>\n<tr>\n<td>GIRAUDI GROUP SERVICES<\/td>\n<\/tr>\n<tr>\n<td>GRAMALIA<\/td>\n<\/tr>\n<tr>\n<td>GRAND BELFORT COMMUNAUT\u00c9 D&#8217;AGGLOM\u00c9RATION<\/td>\n<\/tr>\n<tr>\n<td>GRAVOTECH<\/td>\n<\/tr>\n<tr>\n<td>GROUPE CAISSE DES D\u00c9P\u00d4TS<\/td>\n<\/tr>\n<tr>\n<td>GROUPE CHABRIERES \u2013 QUIES<\/td>\n<\/tr>\n<tr>\n<td>GROUPE ELANCIA<\/td>\n<\/tr>\n<tr>\n<td>GROUPE GCC<\/td>\n<\/tr>\n<tr>\n<td>GROUPE HOSPITALIER DIACONESSES CROIX SAINT SIMON<\/td>\n<\/tr>\n<tr>\n<td>GROUPE HOSPITALIER SELESTAT-OBERNAI<\/td>\n<\/tr>\n<tr>\n<td>GROUPE IRCEM<\/td>\n<\/tr>\n<tr>\n<td>GROUPE LA POSTE DAPO<\/td>\n<\/tr>\n<tr>\n<td>GROUPE MAUFFREY<\/td>\n<\/tr>\n<tr>\n<td>GROUPE PARTNAIRE<\/td>\n<\/tr>\n<tr>\n<td>GROUPE PIZZORNO ENVIRONNEMENT<\/td>\n<\/tr>\n<tr>\n<td>GROUPE PLD AUTOMOBILES<\/td>\n<\/tr>\n<tr>\n<td>GROUPE QERYS<\/td>\n<\/tr>\n<tr>\n<td>GROUPE RAINBOW PARTNERS (QUANTEAM)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion active_section=&#8221;1&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;H &#8211; Z&#8221; tab_id=&#8221;1580221027350-90b05584-9e38&#8243;][vc_column_text]<\/p>\n<table width=\"375\">\n<tbody>\n<tr>\n<td width=\"375\">HARDIS GROUP<\/td>\n<\/tr>\n<tr>\n<td>HARVEST<\/td>\n<\/tr>\n<tr>\n<td>HAUTE AUTORIT\u00c9 DE SANT\u00c9<\/td>\n<\/tr>\n<tr>\n<td>HELPLINE<\/td>\n<\/tr>\n<tr>\n<td>HEPPNER<\/td>\n<\/tr>\n<tr>\n<td>HERAULT LOGEMENT<\/td>\n<\/tr>\n<tr>\n<td>HPGS<\/td>\n<\/tr>\n<tr>\n<td>HR-PATH<\/td>\n<\/tr>\n<tr>\n<td>HUTCHINSON<\/td>\n<\/tr>\n<tr>\n<td>HYUNDAI MOTOR FRANCE<\/td>\n<\/tr>\n<tr>\n<td>ID LOGISTICS<\/td>\n<\/tr>\n<tr>\n<td>IMAGERIE MEDICALE DE LA PLAINE DE FRANCE<\/td>\n<\/tr>\n<tr>\n<td>INFOMIL<\/td>\n<\/tr>\n<tr>\n<td>INNOTHERA SERVICES<\/td>\n<\/tr>\n<tr>\n<td>INOVIE GROUP<\/td>\n<\/tr>\n<tr>\n<td>INPART<\/td>\n<\/tr>\n<tr>\n<td>INSITU FRANCE<\/td>\n<\/tr>\n<tr>\n<td>INSTITUT CURIE<\/td>\n<\/tr>\n<tr>\n<td>INSTITUT DE PATHOLOGIE ET DE G\u00c9N\u00c9TIQUE<\/td>\n<\/tr>\n<tr>\n<td>INSTITUT NATIONAL DU CANCER<\/td>\n<\/tr>\n<tr>\n<td>IRISOLARIS<\/td>\n<\/tr>\n<tr>\n<td>ITESOFT<\/td>\n<\/tr>\n<tr>\n<td>IZIVIA<\/td>\n<\/tr>\n<tr>\n<td>JDF INVEST<\/td>\n<\/tr>\n<tr>\n<td>JIFMAR<\/td>\n<\/tr>\n<tr>\n<td>KOESIO GROUPE<\/td>\n<\/tr>\n<tr>\n<td>KOHLER<\/td>\n<\/tr>\n<tr>\n<td>KUEHNE &amp; NAGEL ROAD SAS<\/td>\n<\/tr>\n<tr>\n<td>LA BELLE ILOISE<\/td>\n<\/tr>\n<tr>\n<td>LABORATOIRE THERASCIENCE<\/td>\n<\/tr>\n<tr>\n<td>LABORATOIRES MAYOLY SPINDLER<\/td>\n<\/tr>\n<tr>\n<td>LABORATOIRES THEA<\/td>\n<\/tr>\n<tr>\n<td>LAGARDERE TRAVEL RETAIL FRANCE<\/td>\n<\/tr>\n<tr>\n<td>LANVIN<\/td>\n<\/tr>\n<tr>\n<td>LE HAVRE SEINE M\u00c9TROPOLE<\/td>\n<\/tr>\n<tr>\n<td>LGM<\/td>\n<\/tr>\n<tr>\n<td>LMR NATURALS BY IFF FRANCE<\/td>\n<\/tr>\n<tr>\n<td>LOGIS M\u00c9TROPOLE<\/td>\n<\/tr>\n<tr>\n<td>L&#8217;OREAL<\/td>\n<\/tr>\n<tr>\n<td>LPCR<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE D&#8217;AMBOISE<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE D&#8217;ARGENTEUIL<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE BAYONNE<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE MALAUNAY<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE MARSEILLE<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE MONACO<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE SAINT JEAN DE LUZ<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE SAINT MARTIN DE CRAU<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE SAINT-ANDRE DE LA ROCHE<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE DE VALSERHONE<\/td>\n<\/tr>\n<tr>\n<td>MAIRIE LE CANNET<\/td>\n<\/tr>\n<tr>\n<td>MANE<\/td>\n<\/tr>\n<tr>\n<td>MANIFONE<\/td>\n<\/tr>\n<tr>\n<td>MANPOWERGROUP<\/td>\n<\/tr>\n<tr>\n<td>MARINE NATIONALE &#8211;\u00a0 CEPN<\/td>\n<\/tr>\n<tr>\n<td>MARINE NATIONALE &#8211; SSF<\/td>\n<\/tr>\n<tr>\n<td>MECADAQ GROUP<\/td>\n<\/tr>\n<tr>\n<td>MEDADOM<\/td>\n<\/tr>\n<tr>\n<td>MEDIAWAN<\/td>\n<\/tr>\n<tr>\n<td>M\u00c9GA INTERNATIONAL<\/td>\n<\/tr>\n<tr>\n<td>MERCATO DE L&#8217;EMPLOI<\/td>\n<\/tr>\n<tr>\n<td>MERITIS HOLDING<\/td>\n<\/tr>\n<tr>\n<td>MERITIS PACA<\/td>\n<\/tr>\n<tr>\n<td>MINARM<\/td>\n<\/tr>\n<tr>\n<td>MINISTERE DE LA CULTURE<\/td>\n<\/tr>\n<tr>\n<td>MINISTERE DE L&#8217;AGRICULTURE ET DE L&#8217;ALIMENTATION<\/td>\n<\/tr>\n<tr>\n<td>MINISTERE DE L&#8217;INTERIEUR<\/td>\n<\/tr>\n<tr>\n<td>MINISTERE DES ARM\u00c9ES<\/td>\n<\/tr>\n<tr>\n<td>MONACO TELECOM<\/td>\n<\/tr>\n<tr>\n<td>MOTUL<\/td>\n<\/tr>\n<tr>\n<td>MUTUELLE DES DOUANES<\/td>\n<\/tr>\n<tr>\n<td>MUTUELLE NATIONALE TERRITORIALE<\/td>\n<\/tr>\n<tr>\n<td>MYLIGHT150<\/td>\n<\/tr>\n<tr>\n<td>NANOXPLORE<\/td>\n<\/tr>\n<tr>\n<td>NEXTEAM GROUP<\/td>\n<\/tr>\n<tr>\n<td>N\u00ceMES M\u00c9TROPOLE<\/td>\n<\/tr>\n<tr>\n<td>NORAC<\/td>\n<\/tr>\n<tr>\n<td>NORMAND&#8217;E-SANT\u00c9<\/td>\n<\/tr>\n<tr>\n<td>NOVARC (REPRESENT\u00c9 PAR UBAC)<\/td>\n<\/tr>\n<tr>\n<td>NUTRITION ET SANT\u00c9<\/td>\n<\/tr>\n<tr>\n<td>OBIOU SOCIETE D&#8217;ELECTRONIQUE<\/td>\n<\/tr>\n<tr>\n<td>ODASEVA<\/td>\n<\/tr>\n<tr>\n<td>ONET TECHNOLOGIES<\/td>\n<\/tr>\n<tr>\n<td>OPTEAMIS<\/td>\n<\/tr>\n<tr>\n<td>OPTEVEN<\/td>\n<\/tr>\n<tr>\n<td>ORANO PROJETS<\/td>\n<\/tr>\n<tr>\n<td>ORDRE DES MEDECINS<\/td>\n<\/tr>\n<tr>\n<td>ORNIKAR<\/td>\n<\/tr>\n<tr>\n<td>ORPEA<\/td>\n<\/tr>\n<tr>\n<td>OSCARO.COM<\/td>\n<\/tr>\n<tr>\n<td>OXWORK<\/td>\n<\/tr>\n<tr>\n<td>OZITEM<\/td>\n<\/tr>\n<tr>\n<td>PAPILLONS BLANCS DE LILLE<\/td>\n<\/tr>\n<tr>\n<td>PAPREC GROUP<\/td>\n<\/tr>\n<tr>\n<td>PARTNAIRE INDUSTRIE<\/td>\n<\/tr>\n<tr>\n<td>PCA-STREAM<\/td>\n<\/tr>\n<tr>\n<td>PELLENC GROUP<\/td>\n<\/tr>\n<tr>\n<td>PHM GROUP<\/td>\n<\/tr>\n<tr>\n<td>PIXID<\/td>\n<\/tr>\n<tr>\n<td>PONANT<\/td>\n<\/tr>\n<tr>\n<td>PREFECTURE DE POLICE DE PARIS<\/td>\n<\/tr>\n<tr>\n<td>PRO BTP<\/td>\n<\/tr>\n<tr>\n<td>PROGES PLUS<\/td>\n<\/tr>\n<tr>\n<td>PULSY<\/td>\n<\/tr>\n<tr>\n<td>QUANTUM SURGICAL<\/td>\n<\/tr>\n<tr>\n<td>RESEAU DE TRANSPORT D&#8217;ELECTRICITE<\/td>\n<\/tr>\n<tr>\n<td>RESTALLIANCE<\/td>\n<\/tr>\n<tr>\n<td>RICHARDSON<\/td>\n<\/tr>\n<tr>\n<td>ROBERTET<\/td>\n<\/tr>\n<tr>\n<td>RTM &#8211; DIFS<\/td>\n<\/tr>\n<tr>\n<td>S.D.I.S 88<\/td>\n<\/tr>\n<tr>\n<td>SAMES<\/td>\n<\/tr>\n<tr>\n<td>SANDAYA<\/td>\n<\/tr>\n<tr>\n<td>SAS GROUPE-LELIEVRE<\/td>\n<\/tr>\n<tr>\n<td>SBE SAS<\/td>\n<\/tr>\n<tr>\n<td>SCORPIO COMMERCIAL MANAGEMENT S.A.M.<\/td>\n<\/tr>\n<tr>\n<td>SCUTUM GROUP<\/td>\n<\/tr>\n<tr>\n<td>SECAFI<\/td>\n<\/tr>\n<tr>\n<td>SEMAE<\/td>\n<\/tr>\n<tr>\n<td>SERLINK<\/td>\n<\/tr>\n<tr>\n<td>SIPARTECH<\/td>\n<\/tr>\n<tr>\n<td>SOCIETE GENERALE PRIVATE BANKING MONACO<\/td>\n<\/tr>\n<tr>\n<td>SODERN (ARIANE GROUP)<\/td>\n<\/tr>\n<tr>\n<td>SODEXO<\/td>\n<\/tr>\n<tr>\n<td>SOITEC<\/td>\n<\/tr>\n<tr>\n<td>SOLEAM<\/td>\n<\/tr>\n<tr>\n<td>SOPRA HR SOFTWARE<\/td>\n<\/tr>\n<tr>\n<td>SPIE ICS<\/td>\n<\/tr>\n<tr>\n<td>SPIE SA<\/td>\n<\/tr>\n<tr>\n<td>STOKOMANI<\/td>\n<\/tr>\n<tr>\n<td>STRYKER<\/td>\n<\/tr>\n<tr>\n<td>SWING COMPLIANE<\/td>\n<\/tr>\n<tr>\n<td>SYMBIO<\/td>\n<\/tr>\n<tr>\n<td>SYSTEME U &#8211; U IRIS<\/td>\n<\/tr>\n<tr>\n<td>TECHNICOFLOR GROUPE<\/td>\n<\/tr>\n<tr>\n<td>TECHNOFLEX<\/td>\n<\/tr>\n<tr>\n<td>TESSI GROUPE<\/td>\n<\/tr>\n<tr>\n<td>TESSI TECHNOLOGIE<\/td>\n<\/tr>\n<tr>\n<td>THALES ALENIA SPACE<\/td>\n<\/tr>\n<tr>\n<td>THALES CYBER SOLUTIONS<\/td>\n<\/tr>\n<tr>\n<td>THALES GLOBAL SERVICES SAS<\/td>\n<\/tr>\n<tr>\n<td>TOYOTA FINANCIAL SERVICES<\/td>\n<\/tr>\n<tr>\n<td>TRANSDEV<\/td>\n<\/tr>\n<tr>\n<td>TRIMANE<\/td>\n<\/tr>\n<tr>\n<td>TVMONACO<\/td>\n<\/tr>\n<tr>\n<td>UNAPEI AP<\/td>\n<\/tr>\n<tr>\n<td>UNEO<\/td>\n<\/tr>\n<tr>\n<td>UNICIL<\/td>\n<\/tr>\n<tr>\n<td>UNIVERSITE CATHOLIQUE DE LOUVAIN<\/td>\n<\/tr>\n<tr>\n<td>UNIVERSITE DE LILLE<\/td>\n<\/tr>\n<tr>\n<td>UNIVERSITE LITTORAL C\u00d4TE D&#8217;OPALE<\/td>\n<\/tr>\n<tr>\n<td>UNPA &#8211; TUNISIE<\/td>\n<\/tr>\n<tr>\n<td>UP COOP<\/td>\n<\/tr>\n<tr>\n<td>UPERIO GROUP<\/td>\n<\/tr>\n<tr>\n<td>URBALYON<\/td>\n<\/tr>\n<tr>\n<td>URBANIS SAS<\/td>\n<\/tr>\n<tr>\n<td>VAL DE BERRY<\/td>\n<\/tr>\n<tr>\n<td>VALECO<\/td>\n<\/tr>\n<tr>\n<td>VALOREM<\/td>\n<\/tr>\n<tr>\n<td>VEOLIA EAU<\/td>\n<\/tr>\n<tr>\n<td>VEOLIA EAU D&#8217;ILE DE FRANCE<\/td>\n<\/tr>\n<tr>\n<td>VINCI ENERGIES SYSTEMES D&#8217;INFORMATION<\/td>\n<\/tr>\n<tr>\n<td>VIRBAC<\/td>\n<\/tr>\n<tr>\n<td>VITAPROTECH<\/td>\n<\/tr>\n<tr>\n<td>WALL STREET ENGLISH<\/td>\n<\/tr>\n<tr>\n<td>WILLIAM GRANT &amp; SONS<\/td>\n<\/tr>\n<tr>\n<td>YELLOWSCAN<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6147&#8243; alignment=&#8221;center&#8221;][vc_column_text] Exhibitors with solutions [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6151&#8243; alignment=&#8221;center&#8221;][vc_column_text] Pre-programmed business meetings [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6149&#8243; alignment=&#8221;center&#8221;][vc_column_text] Conferences for your eve [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6153&#8243; alignment=&#8221;center&#8221;][vc_column_text] For 3 Days in Marbella [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_text_separator title=&#8221;It &amp; Cybersecurity Meetings allows you to:&#8221; style=&#8221;shadow&#8221;][vc_column_text css=&#8221;&#8221;] Save time in your search for solutions to your problems Challenge suppliers you [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-581","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6147&#8243; alignment=&#8221;center&#8221;][vc_column_text] Exhibitors with solutions [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6151&#8243; alignment=&#8221;center&#8221;][vc_column_text] Pre-programmed business meetings [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6149&#8243; alignment=&#8221;center&#8221;][vc_column_text] Conferences for your eve [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6153&#8243; alignment=&#8221;center&#8221;][vc_column_text] For 3 Days in Marbella [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_text_separator title=&#8221;It &amp; Cybersecurity Meetings allows you to:&#8221; style=&#8221;shadow&#8221;][vc_column_text css=&#8221;&#8221;] Save time in your search for solutions to your problems Challenge suppliers you [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T14:24:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/\",\"name\":\"Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\"},\"datePublished\":\"2019-12-26T13:15:59+00:00\",\"dateModified\":\"2025-11-24T14:24:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hosted Buyers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"name\":\"IT & Cybersecurity Meetings\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\",\"name\":\"IT & Cybersecurity Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"width\":198,\"height\":175,\"caption\":\"IT & Cybersecurity Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/","og_locale":"en_US","og_type":"article","og_title":"Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6147&#8243; alignment=&#8221;center&#8221;][vc_column_text] Exhibitors with solutions [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6151&#8243; alignment=&#8221;center&#8221;][vc_column_text] Pre-programmed business meetings [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6149&#8243; alignment=&#8221;center&#8221;][vc_column_text] Conferences for your eve [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6153&#8243; alignment=&#8221;center&#8221;][vc_column_text] For 3 Days in Marbella [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_text_separator title=&#8221;It &amp; Cybersecurity Meetings allows you to:&#8221; style=&#8221;shadow&#8221;][vc_column_text css=&#8221;&#8221;] Save time in your search for solutions to your problems Challenge suppliers you [&hellip;]","og_url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/","og_site_name":"IT and Cybersecurity One to one Meetings Espa\u00f1a","article_modified_time":"2025-11-24T14:24:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/","name":"Hosted Buyers - IT and Cybersecurity One to one Meetings Espa\u00f1a","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website"},"datePublished":"2019-12-26T13:15:59+00:00","dateModified":"2025-11-24T14:24:50+00:00","breadcrumb":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/top-decision-makers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Hosted Buyers"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","name":"IT & Cybersecurity Meetings","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization","name":"IT & Cybersecurity Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","width":198,"height":175,"caption":"IT & Cybersecurity Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/comments?post=581"}],"version-history":[{"count":2,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/581\/revisions"}],"predecessor-version":[{"id":7001,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/581\/revisions\/7001"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/media?parent=581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}