{"id":593,"date":"2020-01-28T17:42:51","date_gmt":"2020-01-28T16:42:51","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/exhibitors"},"modified":"2024-07-05T11:14:43","modified_gmt":"2024-07-05T09:14:43","slug":"exhibitors","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/","title":{"rendered":"Exhibitors"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-593\" data-title=\"Exhibitors\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-es\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-593-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>Exhibitors<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-593-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_section][vc_row][vc_column]\r\n\t\t\t<div class=\"weyou-exhibitors-shorcode\" style=\"display: none;\">\r\n\t\t\t<div class=\"weyou-exhibitors-toolbar\">\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-filter\">\r\n\t\t\t\t\t\t<div class=\"filter-toggler\">Filter by Activity \/ Print my Visit Tour<\/div>\r\n\t\t\t\t\t\t<div class=\"filter-holder\">\r\n\t\t\t\t\t\t\t<div><label><input type=\"checkbox\" value=\"cybersecurity\"\/>CYBERSECURITY<\/label><label><input type=\"checkbox\" value=\"network-technologies-and-infrastructure\"\/>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/label><label><input type=\"checkbox\" value=\"artificial-intelligence-innovations-and-emerging-technologies\"\/>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/label><label><input type=\"checkbox\" value=\"solutions-cloud-et-data-centers\"\/>SOLUTIONS CLOUD ET DATA CENTERS<\/label><label><input type=\"checkbox\" value=\"analytics-data-management\"\/>ANALYTICS DATA MANAGEMENT<\/label><label><input type=\"checkbox\" value=\"mobility-and-endpoint-solution\"\/>MOBILITY AND ENDPOINT SOLUTION<\/label><label><input type=\"checkbox\" value=\"it-development-and-operations-devops\"\/>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/label><label><input type=\"checkbox\" value=\"professional-services-and-training\"\/>PROFESSIONAL SERVICES AND TRAINING<\/label><label><input type=\"checkbox\" value=\"managed-services-and-solutions\"\/>MANAGED SERVICES AND SOLUTIONS<\/label><label><input type=\"checkbox\" value=\"document-management-and-printing-systems\"\/>DOCUMENT MANAGEMENT AND PRINTING SYSTEMS<\/label>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div><!-- .filter-holder -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitors-filter -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t\t<div class=\"toolbar-row\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitors-sort\">\r\n\t\t\t\t\t\t<span class=\"option-label\">Sort<\/span>\r\n\t\t\t\t\t\t<select class=\"sort\">\r\n\t\t\t\t\t\t\t<option value=\"asc\" selected>Company name A-Z<\/option>\r\n\t\t\t\t\t\t\t<option value=\"desc\">Company name Z-A<\/option>\r\n\t\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<span class=\"option-label\">Per page<\/span>\r\n\t\t\t\t\t<select class=\"perpage\">\r\n\t\t\t\t\t\t<option value=\"10\">10<\/option>\r\n\t\t\t\t\t\t<option value=\"15\" selected>15<\/option>\r\n\t\t\t\t\t\t<option value=\"30\">30<\/option>\r\n\t\t\t\t\t\t<option value=\"60\">60<\/option>\r\n\t\t\t\t\t<\/select>\r\n\t\t\t\t\t<span class=\"option-label\">Layout<\/span>\r\n\t\t\t\t\t<div class=\"layout-switcher\">\r\n\t\t\t\t\t\t<a href=\"#\" class=\"grid-layout active\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm0-80h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133ZM200-413h133v-134H200v134Zm213 0h134v-134H413v134Zm214 0h133v-134H627v134ZM200-627h133v-133H200v133Zm213 0h134v-133H413v133Zm214 0h133v-133H627v133Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"list-layout\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 -960 960 960\"><path d=\"M760-360v-80H200v80h560Zm0-160v-80H200v80h560Zm0-160v-80H200v80h560ZM200-120q-33 0-56.5-23.5T120-200v-560q0-33 23.5-56.5T200-840h560q33 0 56.5 23.5T840-760v560q0 33-23.5 56.5T760-120H200Zm560-80v-80H200v80h560Z\"\/><\/svg><\/a>\r\n\t\t\t\t\t<\/div><!-- .layout-switcher -->\r\n\t\t\t\t<\/div><!-- .toolbar-row -->\r\n\t\t\t<\/div><!-- .weyou-exhibitors-toolbar -->\r\n\t\t\t<div class=\"weyou-exhibitors-container grid-layout columns-5\">\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"solutions-cloud-et-data-centers\" style=\"z-index:10000\" data-exhibitor-name=\"avepoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/1dd45cbd-1b68-401d-9397-7816f4a2d1ef.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">AVEPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.avepoint.com\/es\" target=\"_blank\">https:\/\/www.avepoint.com\/es<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/70850\/avepoint\/\">See conferences organized by AVEPOINT<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A12 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Securing the Future. AvePoint is the global leader in data security, governance, and resilience. Over 21,000 customers in more than 100 countries rely on AvePoint Confidence Platform to prepare, and secure their data across Microsoft, Google, Salesforce and other cloud platforms. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers analytics-data-management managed-services-and-solutions document-management-and-printing-systems\" style=\"z-index:9999\" data-exhibitor-name=\"beta-systems-software-espana-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/812bc801-70d4-477b-a3d3-0cdff47eb40d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BETA SYSTEMS SOFTWARE ESPANA S.L.<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.betasystems.com\/\" target=\"_blank\">https:\/\/www.betasystems.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Beta Systems is a German software editor, present in France since 1989. We develop software for the automation, operation and security of IT production. For 40 years, major players in all sectors (finance, industry, transportation, retail, public, etc.) have trusted Beta Systems to manage, optimize and secure their IT processes and infrastructure.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>ANALYTICS DATA MANAGEMENT<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li><li>DOCUMENT MANAGEMENT AND PRINTING SYSTEMS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies analytics-data-management it-development-and-operations-devops managed-services-and-solutions\" style=\"z-index:9998\" data-exhibitor-name=\"beyondtrust\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b1725680-e4c9-4eef-946a-32d1645dd245.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BEYONDTRUST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.beyondtrust.com\" target=\"_blank\">http:\/\/www.beyondtrust.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C08<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> BeyondTrust is the global cybersecurity leader protecting Paths to Privilege\u2122. Our identity-centric approach goes beyond securing access, enabling organisations to manage the entire identity attack surface and stop threats, whether from external attackers or insiders. BeyondTrust is leading the charge in transforming identity security.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>ANALYTICS DATA MANAGEMENT<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9997\" data-exhibitor-name=\"bitdefender\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/4351c043-1c79-4da2-865a-07a17ce33f94.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">BITDEFENDER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.bitdefender.com\/fr-fr\/\" target=\"_blank\">https:\/\/www.bitdefender.com\/fr-fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Bitdefender, European cybersecurity leader, unifies prevention, detection & response across endpoints, servers, cloud & hybrid infrastructures. Trusted in 170+ countries, committed to EU data sovereignty with certified sovereign clouds. Its tech, used by 200+ top brands, stops millions of threats daily.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure\" style=\"z-index:9996\" data-exhibitor-name=\"cato-networks\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/048ebc1b-3c73-4ce3-9652-9eed7b6a3fad.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CATO NETWORKS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.catonetworks.com\/\" target=\"_blank\">https:\/\/www.catonetworks.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cato provides the world's most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud(native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies it-development-and-operations-devops\" style=\"z-index:9995\" data-exhibitor-name=\"checkmarx\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/daf61846-b5e0-412d-ad17-dbd83a9108e8.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CHECKMARX<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/checkmarx.com\/\" target=\"_blank\">https:\/\/checkmarx.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Checkmarx is the leader in cloud-native, agentic application security that delivers enterprise-grade protection while reducing engineering costs and accelerating development velocity. The Checkmarx One platform scans trillions of lines of code annually for 40% of Fortune 500 companies, reducing customer vulnerability density by more than half. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure\" style=\"z-index:9994\" data-exhibitor-name=\"cloudflare-france-sas\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7b00adff-cd74-4fec-ba77-839d918ad587.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CLOUDFLARE FRANCE SAS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.cloudflare.com\" target=\"_blank\">www.cloudflare.com<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/69033\/cloudflare-france-sas\/\">See conferences organized by CLOUDFLARE FRANCE SAS<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B02-C01 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cloudflare is the leading connectivity cloud company on a mission to help build a better Internet. It empowers organizations to make their employees, apps and networks faster, more secure, while reducing complexity and cost. Cloudflare\u2019s connectivity cloud delivers a full-featured, unified platform of  of cloud-native products and developper tools.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9993\" data-exhibitor-name=\"crowdstrike-spain-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/d7d15f7c-155e-4856-babb-dd6947313c32.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CROWDSTRIKE SPAIN S.L.<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\">https:\/\/www.crowdstrike.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B10-C09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity professional-services-and-training\" style=\"z-index:9992\" data-exhibitor-name=\"cyber-guru\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e21f5955-8ed9-422b-b06c-ef0bc5f58e53.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBER GURU<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.cyberguru.it\/\" target=\"_blank\">https:\/\/www.cyberguru.it\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A02-B01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyber Guru is a leading cybersecurity awareness platform that transforms the human factor into the first line of defense against cybercrime. With adaptive learning, gamification, and AI, it delivers engaging training to over 1.5 million users in +90 countries, helping more than 1,500 organizations strengthen their digital protection.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9991\" data-exhibitor-name=\"cyberwatch\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/14948b0d-cf4b-4d39-b68e-28ca948e416e.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">CYBERWATCH<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/cyberwatch.com\/\" target=\"_blank\">https:\/\/cyberwatch.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Cyberwatch is a French cybersecurity software vendor, specialized in Vulnerability and Compliance Management. Cyberwatch helps companies and public organizations, Operators of Vital Importance and Operators of Essential Services, to reduce their risk, using continuous analyzes and relevant reports that fit their business requirements. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers\" style=\"z-index:9990\" data-exhibitor-name=\"datacore\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/79badc95-e57d-4393-86d7-3c2896257e98.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">DATACORE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.datacore.com\/fr\/\" target=\"_blank\">https:\/\/www.datacore.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A01<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> DataCore Software delivers  software-defined storage solutions for block, file and object storage, helping companies to modernize how they store, protect, and access data.<br \/>\r\nThe results: performance increase, data protection, storage hardware flexibility.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers it-development-and-operations-devops\" style=\"z-index:9989\" data-exhibitor-name=\"efficient-ip\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/03c6fadd-978c-4723-a6f0-d83f42b1268f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">EFFICIENT IP<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.efficientip.com\" target=\"_blank\">www.efficientip.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B09<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> EfficientIP enhances network efficiency and security with unified DNS-DHCP-IPAM (DDI) solutions. Our 360\u00b0 DNS Security protects data and apps against advanced threats, while Smart DDI simplifies automation and strengthens IT initiatives like cloud, virtualization and mobility.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers mobility-and-endpoint-solution managed-services-and-solutions\" style=\"z-index:9988\" data-exhibitor-name=\"flexxible\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ef656350-18a9-4639-b8cc-bd70a0db975d.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FLEXXIBLE\u00ae<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.flexxible.com\" target=\"_blank\">http:\/\/www.flexxible.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A13<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Flexxible, recognized on the Gartner Magic Quadrant for DEX and DaaS, is the European-based platform for the management and visibility of both physical and virtual endpoints by combining proactive automation, digital employee experience (DEX) and regulatory compliance with deployment support and customization services. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9987\" data-exhibitor-name=\"forcepoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/3f2e2224-6f6c-4628-bab5-17891414c6d4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">FORCEPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.forcepoint.com\" target=\"_blank\">http:\/\/www.forcepoint.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C11<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Forcepoint simplifies security for global businesses and governments in 150+ countries. The company\u2019s Data Security Everywhere architecture makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity professional-services-and-training\" style=\"z-index:9986\" data-exhibitor-name=\"hucency\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b3ac93d1-da75-43f2-bd83-fb3b5d4919a4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">HUCENCY<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/avantdecliquer.com\/\" target=\"_blank\">https:\/\/avantdecliquer.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A06-B05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Hucency is a French company specializing in human-centered cybersecurity. We help organizations strengthen their digital security by directly involving their employees.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies it-development-and-operations-devops professional-services-and-training managed-services-and-solutions\" style=\"z-index:9985\" data-exhibitor-name=\"ic-consult-and-sailpoint\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/f4565bd8-ddcb-4e6c-89c2-ffb021fd80dd.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">IC CONSULT AND SAILPOINT<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/ic-consult.com\/es\" target=\"_blank\">https:\/\/ic-consult.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C06<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> iC Consult is a leading consultancy in identity security, offering advisory, architecture, implementation, integration, and operations to deliver secure\/scalable IAM solutions. SailPoint delivers unified, identity-first security, managing access for human and digital identities. Our intelligent platform helps enterprises scale and stay protected.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity network-technologies-and-infrastructure artificial-intelligence-innovations-and-emerging-technologies mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9984\" data-exhibitor-name=\"manageengine\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/2e6a856a-cbc8-44cd-8b77-d74222515b5f.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MANAGEENGINE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.manageengine.com\/es\" target=\"_blank\">www.manageengine.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C02<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> ManageEngine, a division of Zoho Corp., provides comprehensive solutions to manage, secure, and optimize IT infrastructure. With over 60 modular tools, it empowers public and private organizations to drive digital transformation through technology, security, and innovation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>NETWORK TECHNOLOGIES AND INFRASTRUCTURE<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers\" style=\"z-index:9983\" data-exhibitor-name=\"mimecast\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/391d8fd7-b611-4f73-a038-470e7ec3b9fc.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">MIMECAST<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.mimecast.com\/\" target=\"_blank\">https:\/\/www.mimecast.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Mimecast is a global cybersecurity leader redefining how organizations secure human risk through precision-engineered AI. Integrating cutting-edge technology with human-centric pathways, our platform enhances visibility and provides strategic insight.\u202f <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9982\" data-exhibitor-name=\"object-first-spain-sl\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/9c7b374e-d754-4bf5-90a8-a15d39b2787b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">OBJECT FIRST SPAIN SL<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/objectfirst.com\/es\" target=\"_blank\">https:\/\/objectfirst.com\/es<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A10<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Object First protects data against malicious encryption with Ootbi (Out-of-the-box immutability), the best storage for Veeam. Immutable and ransomware-proof, it offers secure, simple, and powerful backup. It installs in 15 minutes and combines security, performance, and simplicity without compromises or extra costs.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity solutions-cloud-et-data-centers mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9981\" data-exhibitor-name=\"passwork\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/16e0493b-b5e3-44bf-94ee-268d26b336a6.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PASSWORK<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/passwork.pro\/\" target=\"_blank\">https:\/\/passwork.pro\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B08-C07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Passwork is an EU-based company with a trusted name in cybersecurity, that delivers a secure and efficient password management solution to help businesses protect their sensitive data, streamline access management, and enhance daily operations.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution\" style=\"z-index:9980\" data-exhibitor-name=\"pradeo\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/caa6a7d4-0354-4075-824c-abf2a93d4e1b.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">PRADEO<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/pradeo.com\/fr\/\" target=\"_blank\">https:\/\/pradeo.com\/fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Pradeo is a global leader of mobile security. The company ensures the protection of all mobile usages, by offering services dedicated to securing smartphones, tablets and mobile applications. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9979\" data-exhibitor-name=\"recorded-future\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/7e5e6197-d347-4def-8109-3ff70203ee7c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RECORDED FUTURE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.recordedfuture.com\/\" target=\"_blank\">www.recordedfuture.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C04<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Recorded Future is the world\u2019s largest threat intelligence company. Recorded Future\u2019s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies professional-services-and-training\" style=\"z-index:9978\" data-exhibitor-name=\"riot-security\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/ffae3ec7-bfcd-4077-98c6-df17415e4230.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">RIOT SECURITY <\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.tryriot.com\" target=\"_blank\">www.tryriot.com<\/a><\/div><div class=\"weyou-exhibitor-page\"><i class=\"fa fa-chevron-right\"><\/i> <a href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/conference\/70846\/riot-security\/\">See conferences organized by RIOT SECURITY <\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A14-B13 + Workshop<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Riot is the first real-time employee cybersecurity monitoring solution.<br \/>\r\nIn the age of generative AI-driven cyberattacks, the Riot platform enables cybersecurity teams to assess and improve the cyber posture of their employee.<br \/>\r\nRiot has grown to protect more than 1,500 organizations across all sectors and over 1M+ employees.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9977\" data-exhibitor-name=\"sentinelone\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/21bb0972-61b3-40c5-ae59-eea7068a6cb1.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SENTINELONE<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.sentinelone.com\" target=\"_blank\">http:\/\/www.sentinelone.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A04-B03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> SentinelOne (NYSE:S) is the world\u2019s most advanced, autonomous AI-powered cybersecurity platform. Built on the first unified Data Lake, SentinelOne empowers the world to run securely by creating intelligent, data-driven systems that think for themselves, stay ahead of complexity and risk, and evolve on their own. <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution\" style=\"z-index:9976\" data-exhibitor-name=\"stormshield\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/e62d4eee-b4d4-48e4-8dee-60ad417d20d4.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">STORMSHIELD<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.stormshield.com\" target=\"_blank\">https:\/\/www.stormshield.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand C03<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stormshield offers innovative end-to-end security solutions certified and qualified at the highest European levels, to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security).<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity artificial-intelligence-innovations-and-emerging-technologies solutions-cloud-et-data-centers it-development-and-operations-devops professional-services-and-training\" style=\"z-index:9975\" data-exhibitor-name=\"sysdig-technology-s-l\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/39a3b786-4f0f-40fe-9ca8-8378a0a7e307.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">SYSDIG TECHNOLOGY, S.L<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.sysdig.com\/\" target=\"_blank\">https:\/\/www.sysdig.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B14-C14<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Sysdig helps security and development teams prevent, detect, and respond to threats instantly. Founded by the creators of Falco and Wireshark, and built on agentic AI, Sysdig delivers real-time defense grounded in the uncompromising truth of runtime. No guesswork. No black boxes. Just cloud security, the right way.  <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>ARTIFICIAL INTELLIGENCE, INNOVATIONS AND EMERGING TECHNOLOGIES<\/li><li>SOLUTIONS CLOUD ET DATA CENTERS<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li><li>PROFESSIONAL SERVICES AND TRAINING<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity mobility-and-endpoint-solution it-development-and-operations-devops\" style=\"z-index:9974\" data-exhibitor-name=\"tanium\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/34d06dee-6741-4be5-9163-1086f58e6228.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TANIUM<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.tanium.fr\/\" target=\"_blank\">https:\/\/www.tanium.fr\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tanium AEM delivers autonomous management of endpoints across the industry's most comprehensive platform, providing solutions for asset discovery and inventory, vulnerability management, endpoint management, incident response, risk and compliance, and digital employee experience. <br \/>\r\n <\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MOBILITY AND ENDPOINT SOLUTION<\/li><li>IT DEVELOPMENT AND OPERATIONS (DEVOPS)<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9973\" data-exhibitor-name=\"threatlocker\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/98949b75-f546-48fe-b543-fd7a4e163755.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">THREATLOCKER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/www.threatlocker.com\/\" target=\"_blank\">https:\/\/www.threatlocker.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B06-C05<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Stop ransomware! ThreatLocker\u00ae improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing\u2122, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.<br \/>\r\n<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity managed-services-and-solutions\" style=\"z-index:9972\" data-exhibitor-name=\"tyrex-cyber\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/b787ef1d-bc6f-419e-80b2-fa7b5cfc854c.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">TYREX CYBER<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"https:\/\/tyrex-cyber.com\/\" target=\"_blank\">https:\/\/tyrex-cyber.com\/<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand A08-B07<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Tyrex is a French company specialized in cybersecurity, standing out for its local manufacturing and innovative white station solutions.<br \/>\r\nOur products combine ease of use with technical excellence, supported by highly responsive customer service based in France.<br \/>\r\nCurrently undergoing strong international expansion and driven by strategic partnerships<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li><li>MANAGED SERVICES AND SOLUTIONS<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<div class=\"weyou-exhibitor collapsed\" data-activities=\"cybersecurity\" style=\"z-index:9971\" data-exhibitor-name=\"varonis\">\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-1\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-logo\">\r\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyou.blob.core.windows.net\/images\/exposant\/54b88b50-7f40-439f-9407-1a92b9bdbd32.jpg\">\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-logo -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-content\">\r\n\t\t\t\t\t\t\t<h3 class=\"weyou-exhibitor-name\">VARONIS<\/h3><div class=\"weyou-exhibitor-contact\"><div class=\"weyou-exhibitor-website\"><i class=\"fa fa-globe\"><\/i> <a href=\"http:\/\/www.varonis.com\" target=\"_blank\">http:\/\/www.varonis.com<\/a><\/div><\/div><!-- .weyou-exhibitor-contact -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-content -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand\">\r\n\t\t\t\t\t\t\t<div class=\"weyou-exhibitor-stand-inner\">Stand B12<\/div><!-- .weyou-exhibitor-stand-inner -->\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-stand -->\r\n\t\t\t\t\t\t<a class=\"expand\" href=\"#\"><\/a>\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-1 -->\r\n\t\t\t\t\t<div class=\"weyou-exhibitor-holder-2\">\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-desc\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Description<\/span> Varonis is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.<\/div><!-- .weyou-exhibitor-desc -->\r\n\t\t\t\t\t\t<div class=\"weyou-exhibitor-activities\">\r\n\t\t\t\t\t\t\t<span class=\"title\">Activities<\/span>\r\n\t\t\t\t\t\t\t<ul><li>CYBERSECURITY<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div><!-- .weyou-exhibitor-activities -->\r\n\t\t\t\t\t<\/div><!-- .weyou-exhibitor-holder-2 -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitor -->\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors -->\r\n\t\t\t\t<ul class=\"weyou-exhibitors-pagination\"><\/ul>\r\n\t\t\t\t<\/div><!-- .weyou-exhibitors-shorcode -->[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-593","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-05T09:14:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/\",\"name\":\"Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\"},\"datePublished\":\"2020-01-28T16:42:51+00:00\",\"dateModified\":\"2024-07-05T09:14:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exhibitors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"name\":\"IT & Cybersecurity Meetings\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\",\"name\":\"IT & Cybersecurity Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"width\":198,\"height\":175,\"caption\":\"IT & Cybersecurity Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/","og_locale":"en_US","og_type":"article","og_title":"Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_section][vc_row][vc_column][\/vc_column][\/vc_row][\/vc_section]","og_url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/","og_site_name":"IT and Cybersecurity One to one Meetings Espa\u00f1a","article_modified_time":"2024-07-05T09:14:43+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/","name":"Exhibitors - IT and Cybersecurity One to one Meetings Espa\u00f1a","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website"},"datePublished":"2020-01-28T16:42:51+00:00","dateModified":"2024-07-05T09:14:43+00:00","breadcrumb":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/exhibitors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Exhibitors"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","name":"IT & Cybersecurity Meetings","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization","name":"IT & Cybersecurity Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","width":198,"height":175,"caption":"IT & Cybersecurity Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":0,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/593\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/media?parent=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}