Exhibitors
Description 6cure, a specialist in the security of information systems, develops solutions to protect against various types of attacks, in particular DDoS attacks that target the availability of networks and DNS infrastructures. These solutions enable sensitive infrastructures to increase their responsiveness in the face of multi-faceted attacks.
Activities
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Faciliter l’accès à la donnée, fluidifier son transport, assurer sa sécurité et la transformer en valeur économique.
adista combine expertises cloud, connectivité et cybersécurité et intervient sur l’ensemble de votre chaîne de valeur pour un SI agile, durable et sécurisé.
800 collaborateurs / 40 agences / 14 DC / Ecovadis Gold
adista combine expertises cloud, connectivité et cybersécurité et intervient sur l’ensemble de votre chaîne de valeur pour un SI agile, durable et sécurisé.
800 collaborateurs / 40 agences / 14 DC / Ecovadis Gold
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description As a cybersecurity expert for over 7 years, AISI is exclusively dedicated to the strategic and operational security of French mid-sized organizations.
Our vocation: to connect and protect, without compromise, the information systems that accelerate the growth of SMEs, ETIs and support the mission of public services.
Our vocation: to connect and protect, without compromise, the information systems that accelerate the growth of SMEs, ETIs and support the mission of public services.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description ALLENTIS is a French developer of ANSSI-qualified cybersecurity solutions, specializing in threat detection systems (NDR) and performance analysis of network and application flows in IT and OT environments. ALLENTIS is the manufacturer of ANSSI-qualified TAPICS collection architectures and dTAPICS datadiodes.
Activities
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description ANOZR WAY offers an all-in-one Human Risk Management software platform, from risk scoring to remediation, to reduce organizations' human attack surface and protect against social engineering - 68% risk reduction observed on average. ANOZR WAY, French software editor, proprietary and sovereign technology.
Activities
- CYBERSECURITY
Description As an expert in cybersecurity, infrastructure and cloud solutions for over 30 years, APIXIT supports the digital transformation of private and public sector organizations with a tailored range of solutions and services: audit, consulting, project-based integration, MCO, managed services, operational security and SOC.
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Recently awarded the Leader in Container Security, Aqua is a pioneering pure player in cloud security. Its platform reduces risk throughout the application lifecycle; preventing attacks targeting cloud-native applications before they happen, and blocking them when they do.
Activities
- CYBERSECURITY
Description Arcserve, a global top 5 data protection vendor, provides the broadest set of best-in-class solutions to manage, protect and recover all data workloads. This includes on-prem, off-prem (including DRaaS, BaaS, and Cloud-to-Cloud), hyperconverged, and edge infrastructures.
Activities
- CYBERSECURITY
Description Armis, the asset intelligence cybersecurity company, protects the entire attack surface and manages the organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less world Armis ensures that organizations continuously see, secure, protect and manage all critical assets.
Activities
- CYBERSECURITY
Description Avant de Cliquer is a complete, automatic, non-intrusive SaaS solution that can be implemented without delay, reducing the risk of cyber-attacks, instilling a genuine cyber culture, and bringing greater peace of mind to IT staff and management alike.
Activities
- CYBERSECURITY
Description At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description BCSolutions has been aiding businesses for over 20 years in electronic invoicing, document management, dematerialization, and Enterprise Content Management (ECM) projects.
As partners with OpenText and Sovos, our solutions cut costs and document processing times, fast-tracking your digital transformation
As partners with OpenText and Sovos, our solutions cut costs and document processing times, fast-tracking your digital transformation
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- PRINT / DOCUMENT
Description Beta Systems is a German software editor, present in France since 1989. We develop software for the automation, operation and security of IT production. For 40 years, major players in all sectors (finance, industry, transportation, retail, public, etc.) have trusted Beta Systems to manage, optimize and secure their IT processes and infrastructure.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
Description Betoobe and Connexing facilitate the daily life of IT fleet managers by helping them save time and gain peace of mind.
Sourcing of new and refurbished equipment, delegation of fleet management, and securing of IT devices all place the Connected User Experience at the heart of your Digital Workplace strategy.
Sourcing of new and refurbished equipment, delegation of fleet management, and securing of IT devices all place the Connected User Experience at the heart of your Digital Workplace strategy.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We are leading the charge in innovating identity-first security and are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners.
Activities
- CYBERSECURITY
Description Bitdefender is a European company and a global cybersecurity leader, delivering best-in-class threat prevention, detection, and response solutions worldwide. Bitdefender protects millions of business, government and consumer environments.
Description BlackBerry provides intelligent security software and services to enterprises and governments around the world. Software powers 235M+ vehicles. BlackBerry leverages AI and machine learning to deliver innovative solutions in cybersecurity, safety and data privacy, and is a leader in endpoint security management, encryption, and embedded systems.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
Description Forecomm is a 100% French software publisher that publishes the BlueFiles solution to secure files and messages exchanges with end-to-end encryption.BlueFiles received an ANSSI security visa and is hosted SecNumCloud and HDS certified.The values of BlueFiles are based on 4 S: Security, Simplicity, Sovereignty, Sobriety.
Activities
- CYBERSECURITY
Description BlueTrusty est la filiale pure-player Cyber de ITS Group (ESN 1.1500p, présent sur tout le territoire)
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Board of Cyber develops three solutions enabling companies to assess their cyber performance by developing an ecosystem of trust, and to achieve continuous improvement. With its Security Rating®, AD Rating® and TrustHQ® solutions, it enables organizations to assess their internal and external performance, and facilitates risk management.
Activities
- CYBERSECURITY
Description Bouygues Telecom Entreprises supports and grows a community of more than 70,000 SMEs and large companies by making very high-speed broadband available throughout France and facilitating the adoption of new uses such as unified communications, intelligent networks and enterprise mobility services.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description BSO is an independent French company with strong technological expertise. Since 2004, BSO has been developing tailor-made hybrid Cloud solutions, guaranteeing high availability, performance, security and data sovereignty.
Activities
- CLOUD COMPUTING
- DATA CENTER
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Cegedim Outsourcing is the IT Services company of the Cegedim Group . Our specialties are Digital Workspace, cybersecurity, ITSM and Cloud. Our services include solutions's integration, outsourcing, managed services, data hosting (HDS and ISO in France) and technical assistance.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- MANAGED SERVICES
Description Centhys is a service compagny founded by Cybersecurity experts with solid shareholders. Its clients highlight its adaptability as a new player on the market, its expertise and its seniority in its fields of activity: Micro-seg, SASE, Bastion, AD, EDR, mail, DLP, WAN LAN WIFI, consulting, time and material, integration
Activities
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description ITAM/ITSM experts for middle market companies with 250 to 5000 users, we offer On-Premise and SAAS solutions chosen by over 2000 customers.
We support all kind of projects with Plug&Play solutions deployed within hours or tailor-made solutions with custom made settings to support all ITIL Process.
We support all kind of projects with Plug&Play solutions deployed within hours or tailor-made solutions with custom made settings to support all ITIL Process.
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Cloudflare is a 100% cloud zero-trust platfor :connects/protects employees, apps and data anywhere in the world. Cloudflare protects 20% of the world's websites and blocks 170 B of cyberthreats/day
Activities
- CYBERSECURITY
Description The Southern It Decision Makers Club
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Description A leading international player in risk prevention and control, CNPP offers global solutions in cybersecurity, security, fire safety, environment and professional risks.
Qualified PASSI by ANSSI, it supports you in the evaluation and control of cyber risk, on technical and organizational levels and trains information systems security players.
Qualified PASSI by ANSSI, it supports you in the evaluation and control of cyber risk, on technical and organizational levels and trains information systems security players.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Cohesity is a leader in AI-powered data security and management (asaS, self-managed, or through a partner). We make it easy to secure, protect, manage, and get value from data — across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Description Conscio Technologies, publisher of SaaS software and awareness-raising content, has been helping CISOs, CIOs and DPOs to implement their online cyber awareness strategy for 17 years. Our offer is based on a sector-based approach, and a rich, entertaining and interactive catalog (160+ modules, 150+ phishing test scenarios), personalized support...
Activities
- CYBERSECURITY
Description Console Connect is a platform for the Software Defined Interconnection® of applications and infrastructures. It allows users to self-provision private, high-performance connections among a global ecosystem of enterprises, networks, clouds, SaaS providers, IoT providers and applications providers.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
Description CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Description CRYPT.ON IT - Consulting company specialised in cybersecurity and cryptography.
Pure player in cybersecurity, our expertise covers both technical expertise and governance: advisory, audit, training.
Editor of Cyberlib: a 100% French SaaS cybersecurity solution aiming as protecting endpoints through persistant and native security (hardening).
Pure player in cybersecurity, our expertise covers both technical expertise and governance: advisory, audit, training.
Editor of Cyberlib: a 100% French SaaS cybersecurity solution aiming as protecting endpoints through persistant and native security (hardening).
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Custocy provides an advanced NDR (Network Detection & Response) solution based on a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks. Born from our research laboratory, our AI models ensure effective protection for your IT network with unprecedented accuracy and speed of detection.
Activities
- CYBERSECURITY
Description Cyber Guru offers an innovative and complete Security Awareness Training platform powered by AI/ML that is engaging for the end-user, easy to launch, operate and maintain for the security team, and effective in improving an organisation’s security posture.
Activities
- CYBERSECURITY
Description Cybereason provides future-ready attack protection to unify security from the endpoint, to the enterprise, to everywhere. Our Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a malicious operation.
Activities
- CYBERSECURITY
Description Cyberwatch is a French cybersecurity software vendor, specialized in Vulnerability and Compliance Management.
Cyberwatch helps companies and public organizations, Operators of Vital Importance (OVI) and Operators of Essential Services (OES), to reduce their risk with continuous assessments and relevant reports that fit to their business needs.
Cyberwatch helps companies and public organizations, Operators of Vital Importance (OVI) and Operators of Essential Services (OES), to reduce their risk with continuous assessments and relevant reports that fit to their business needs.
Activities
- CYBERSECURITY
Description Audit and cybersecurity consulting firm: Pentest (IT and OT), Phishing, Forensic, Technical audits, CISO / DPO part-time, Training, awareness, Certification support, Maturity audits, Mock audits, Risk analyzes , PCA, PSSI/Guidelines
PASSI qualification in progress, Accreditation, DORA, NIS 2, Part IS, ISO 27001
PASSI qualification in progress, Accreditation, DORA, NIS 2, Part IS, ISO 27001
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description DataCore Software delivers software-defined storage solutions for block, file and object storage, helping companies to modernize how they store, protect, and access data.
The results: performance increase, data protection, storage hardware flexibility.
The results: performance increase, data protection, storage hardware flexibility.
Activities
- DATA CENTER
- CYBERSECURITY
Description DATAPROTECT is a key player in the global cybersecurity market, offering services like CyberSOC/CSIRT, MSSP Offensive Security, Governance, Risk & Compliance, Cyberdefense, Skills lab, and Payment Security. They emphasize flexibility, commitment, and proactivity, tailoring their cybersecurity services to organizations of any size or sector.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description dbSQWare is a software publisher specializing in the operation and maintenance of databases engines of all types.
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
Our business expertise has allowed us to create a unique and mature software that maintains and operates all of your databases (R & NoSQL).
We also carry out databases expertise missions.
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Delinea believes every user should be treated like a privileged user and wants seamless, secure access, even as administrators want privileged access controls without excess complexity.
Activities
- CYBERSECURITY
Description PURE PLAYER IN CYBERSECURITY.
OUR VALUES :
EXPERTISE - QUALITY - ETHICS.
A 100% FRENCH COMPANY, FOUNDED BY ENGINEERS.
A TEAM OF CERTIFIED EXPERTS, BASED IN FRANCE, TO SUPPORT YOU.
OUR VALUES :
EXPERTISE - QUALITY - ETHICS.
A 100% FRENCH COMPANY, FOUNDED BY ENGINEERS.
A TEAM OF CERTIFIED EXPERTS, BASED IN FRANCE, TO SUPPORT YOU.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description Digital Realty delivering a world-leading data center platform with 300+ data centers on 6 continents, 25+ countries, 10 in Paris, 4 in Marseille.
Decarbonize your IT, whatever your workload. House, exchange, distribute your data within a connected community of companies, network providers, IT & cloud providers.
Decarbonize your IT, whatever your workload. House, exchange, distribute your data within a connected community of companies, network providers, IT & cloud providers.
Activities
- CLOUD COMPUTING
- DATA CENTER
Description Dust Mobile, the leading mobile cyber-defense operator, offers a mobile communications protection solution that natively integrates resilience, protection, detection and real-time alerting of attacks intrinsic to mobile networks and SIM cards. Dust Mobile can be used in over 214 countries and territories.
Activities
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Our unified platform combines broad and deep observability and continuous runtime application security with the most advanced AIOps to provide answers and intelligent automation from data at an enormous scale. That’s why the world’s largest organizations trust the Dynatrace® platform to accelerate digital transformation.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
Description EasyVista is a global software provider of intelligent solutions for enterprise service management, remote support, and self-healing technologies. Leveraging the power of ITSM, Self-Help, AI, unattended endpoint management, and IT process automation, EasyVista makes it easy for companies to embrace a customer-focused, proactive.
Activities
- MANAGED SERVICES
Description Eaton is a leading supplier of UPS (uninterruptible power supplies). Eaton UPSs provide high-quality, reliable backup power for everything from network cabinets and server rooms to shared and enterprise data centers.
Activities
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description EfficientIP is a network security and automation company, specializing in DNS-DHCP-IPAM (DDI). We promote business continuity and we help organizations drive business efficiency through agile, secure and reliable network infrastructures. Our unique 360° DNS security solution protects data confidentiality and application access.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description EGERIE is a collaborative platform that maps and financially quantifies cyber-origin risks with complete clarity. EGERIE helps organizations industrialize their risk-driven cybersecurity programs, making cybersecurity a key business asset that all stakeholders can contribute to.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description EPOS designs, manufactures, and sells high-end audio and video solutions for business professionals. Owned by the world-leading hearing healthcare group, Demant, and with headquarters in Denmark, EPOS builds on more than 115 years’ audio expertise and operates in a global market. Find more information at www.eposaudio.com .
Activities
- MOBILITY
- NETWORKS AND TELECOMS
Description ERCOM, a subsidiary of Thales Group, is a French company renowned for its mobility security solutions. For almost 40 years, ERCOM has built its leadership in the communications, data and devices security industry. Discover our sovereign & certified solutions: Cryptosmart, Cryptobox, Citadel Team and Cybels Hub DR.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Description ESET, founded in 1987 in Slovakia, is a leader in cybersecurity worldwide. Historically known for NOD32 Antivirus, the company now offers a complete range of solutions enabling businesses and individuals to combat digital threats.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description EV Observe is a SaaS and On-Premise monitoring platform for IT infrastructure and networks, the Internet of Things (IoT), cloud and applications. EV Observe offers a proactive and predictive monitoring experience. Anticipate and avoid service interruptions thanks to 360° monitoring and AIOps.
Activities
- CLOUD COMPUTING
- NETWORKS AND TELECOMS
Description Exabeam is a global cybersecurity leader that delivers AI-driven security operations. The company was the first to put AI and machine learning in its products to deliver behavioral analytics on top of security information and event management (SIEM).
Activities
- CYBERSECURITY
Description Tenable is the Cyber Exposure company. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Exclusive Networks est son distributeur pour la France
Activities
- CLOUD COMPUTING
- CYBERSECURITY
Description Thales, leader in cybersecurity and data protection, helps organisations meet their cybersecurity needs, whatever their field of activity, the level of confidentiality of their data or the regulatory requirements specific to each country.
Activities
- CYBERSECURITY
Description Created in 2018, EXCUBE is the independent consulting company to define and implement your cybersecurity strategy. Our consultants are present in Lyon and Paris. Our belief is that technology is not enough to protect business and that organization, processes and skills must be the priority in Cybersecurity.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description Extreme Networks is a leader in cloud networking focused on delivering services that connect devices, applications, and people, leveraging the power of machine learning, artificial intelligence, analytics, and automation. 50,000 customers trust our solutions and rely on our services and support to accelerate their digital transformation efforts.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Filigran, a cybertech company founded in 2022, offers open-source cybersecurity solutions covering threat intelligence management, breach and attack simulation, and cyber risk management.
Activities
- CYBERSECURITY
Description Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working.
Activities
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Forescout is a leading provider of automated cybersecurity and device monitoring. We offer the only solution that automatically delivers both visibility and continuous risk analysis of all existing device types. Be it IT, IoT, IoMT or OT devices. Forescout brings your digital environment into line with your security regulations.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description We craft custom digital products for SMEs, ETIs & large enterprises. We assist companies through 4 phases: Product Discovery, Product Design, Product Development, Product Evolution.
Areas of expertise: WebApp, mobile, tablet, SaaS, platform, back office, AI, IT transformation, Digital Factory...
Clients: NGE, Audilab, Orvéa, Puump, Actiyon...
Areas of expertise: WebApp, mobile, tablet, SaaS, platform, back office, AI, IT transformation, Digital Factory...
Clients: NGE, Audilab, Orvéa, Puump, Actiyon...
Activities
- CLOUD COMPUTING
- MOBILITY
- MANAGED SERVICES
Description FORTINET is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission: secure people, devices, and data everywhere. We deliver cybersecurity everywhere you need it with the most extensive integrated portfolio of over 50 enterprise-grade products.
Activities
- CYBERSECURITY
Description Leader in the detection of cyber threats, Gatewatcher has been protecting the critical networks of worldwide large companies and public institutions since 2015. Our Network Detection and Response (NDR) and Cyber Threats Intelligence (CTI) solutions, quickly detect and respond to any cyber-attacks.
Activities
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description GitGuardian is the code security platform for the DevOps generation that offers automated Secrets Detection, Infra as Code Security, and Honeytoken capabilities, facilitating a Secure Software Development Lifecycle for Dev, Sec, and Ops teams.
Activities
- CYBERSECURITY
Description Global Security Mag www.globalsecuritymag.fr www.globalsecuritymag.com and www.globalsecuritymag.de is a free information website on security, storage and data centers in French, English and German, aimed at security professionals. security: CISO, DSI...
01/30/2025: The GSDAYS cybersecurity conference
01/30/2025: The GSDAYS cybersecurity conference
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
Description We are an integrator and operator service company getting a network of 150 agencies skilled in computing network, cybersecurity , multimedia and IoT.
As we support you in your technological development, we also offer tailor-made solutions ensuring our service availability from network connectivity to Cloud computing.
As we support you in your technological development, we also offer tailor-made solutions ensuring our service availability from network connectivity to Cloud computing.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description GTT is a global internet service provider that offers a range of cloud networking and managed solutions, including SD-WAN and other WAN services, internet, security, and voice services. GTT is a certified Cradlepoint partner, enabling us to meet those wireless internet demands with managed 5G connectivity solutions.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Le GUIDE de la CYBERSECURITE : french yearly Directory of Cybersecurity technologies
> 40 000 readers. More 800 specialists are referenced.
Partnerships: : Anssi, Campus Cyber, Numeum, Cigref, Hexatrust, Clusif, Cesin, etc.
> 40 000 readers. More 800 specialists are referenced.
Partnerships: : Anssi, Campus Cyber, Numeum, Cigref, Hexatrust, Clusif, Cesin, etc.
Activities
- CYBERSECURITY
Description HarfangLab is a French cybersecurity company that publishes EDR (Endpoint Detection and Response) software, a technology that anticipates and neutralises cyberattacks on computers and servers. Certified by ANSSI in 2020, HarfangLab today has more than 300 customers, and is deployed on over 800 000 endpoints.
Activities
- CYBERSECURITY
Description HEXANET is the growth partner of companies and IT departments serving their digital development.
These areas of expertise: cybersecurity - Telecoms - unified communications - Cloud - integration.
Local agencies in Reims, Paris, Le Mans, Angers, Lyon, Grenoble and Toulouse!
These areas of expertise: cybersecurity - Telecoms - unified communications - Cloud - integration.
Local agencies in Reims, Paris, Le Mans, Angers, Lyon, Grenoble and Toulouse!
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Specialized in cybersecurity for critical and industrial infrastructures, Holiseum offers innovative solutions and consulting & services in cybersecurity.
Holiseum is an independent French company with a presence in France and abroad, and is PASSI-qualified by ANSSI for all 5 scopes.
Holiseum is an independent French company with a presence in France and abroad, and is PASSI-qualified by ANSSI for all 5 scopes.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description HTBS is an IS Security operator, offering auditing services and integration of innovative solutions. Based on the Zero-Trust approach, HTBS works tightly with its clients to implement a secure and resilient IT architecture.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description HUMAN is a cybersecurity company that protects web, mobile and API applications from digital abuse and fraud, against automation of all kinds (bots) and other vulnerability exploits, throughout the web attack cycle of the user journey. Bot Management, protection of scripts and customer accounts.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description In the field of cybersecurity, Inetum supports its customers in their IAM strategy with the Ilex Identity & Access Management platform. This complete offer is divided into 3 ranges of solutions (AM, IM, CIAM), offering a solid base capable of delivering both security and user experience.
Activities
- CYBERSECURITY
Description Imperva, a Thales Company, is the cybersecurity leader that helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. With an integrated approach combining edge, application security, and data security, Imperva protects companies through all stages of their digital journey.
Activities
- CYBERSECURITY
Description We are a leading distributor across the EMEA region, specializing in cybersecurity solutions and services. Proudly delivering unparalleled support and value to our partner suppliers and resellers, Continually integrating innovative suppliers to help our partners succeed in their respective markets.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
Description Solutions integrator with 13 000 teammates worldwide helping organizations accelerate their digital journey to modernize their business and maximize the value of technology. We enable secure, end-to-end transformation and meet the needs of our clients through a comprehensive portfolio of solutions.
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description French company specialised in network infrastructure, cybersecurity and IT system performance measurement, Interdata supports IT teams in the design, implementation and operation of reliable and secure information systems (from the audit phase through to managed services).
Activities
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description With over 30 years of experience, Intrinsec strives to be a reliable partner and a benchmark in safeguarding against diverse cyber threats. Leveraging our extensive comprehension of cybersecurity challenges,
we actively foster the protection of your organization and preserving your business by proactively meeting your cybersecurity requirements.
we actively foster the protection of your organization and preserving your business by proactively meeting your cybersecurity requirements.
Activities
- CYBERSECURITY
Description For more than 70 years, Iron Mountain Incorporated has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we protect, unlock, and extend the value of your work.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- MANAGED SERVICES
Description it’s THE MAGAZINE FOR DIGITAL MANAGERS.
We support them in their managerial practices
IT for Business helps you understand the major issues of digital transformation thanks to surveys and in-depth files on all the major themes of the moment
is a decision-making tool thanks to extensive feedback from field experience
We support them in their managerial practices
IT for Business helps you understand the major issues of digital transformation thanks to surveys and in-depth files on all the major themes of the moment
is a decision-making tool thanks to extensive feedback from field experience
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
Description Since 2001, on www.iTPro.fr, analyses, studies and more than 5,000 IT expert content and tutorials signed by the editorial board. Innovation, Security, Cloud Management, Data & IoT Take advantage of unique technological knowledge and exclusive strategic resources to help you define, choose, manage and optimize your professional IT environment
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
Description Integrator of mobility solutions for over 20 years, ITS Ibelem supports you in managing Mobility projects (EMM, UEM) and unified desktop management (Modern Management). We are involved in various phases, including audits/advisory, preparation (mastering and deployment), and operational maintenance.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Jabra is a leader in communication solutions. We create smart headsets and communication tools that help professionals work more productively, as well as cutting-edge video conferencing solutions for more inclusive meetings.
Activities
- NETWORKS AND TELECOMS
Description Juniper Networks is dedicated to dramatically simplifying network operations and driving superior experiences for end users. Our solutions deliver industry-leading insight, automation, security and AI to drive real business results. We believe that powering connections will bring us closer together while empowering us all to solve the world’s great
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Description Kamaé is the first cyber risk awareness platform which prepare your teams against cyber threats through gamification 🥋
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description As a subsidiary of the Japanese telecommunications leader, KDDI France supports companies in their digital transformation.
Our group offers tailor-made Cloud infrastructures, aligned with rigorous norms and standards. All data is hosted in one of our 4 datacenters, located in France and operated by Telehouse.
Our group offers tailor-made Cloud infrastructures, aligned with rigorous norms and standards. All data is hosted in one of our 4 datacenters, located in France and operated by Telehouse.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
Description Des milliers d'organisations font confiance à Keeper Security, le leader en matière de gestion de mots de passe et de passkeys, de gestion des secrets, et d'accès privilégiés.
Les solutions de Keeper sont construites sur la base d'une sécurité Zero Trust et Zero Knowledge pour protéger chaque utilisateur sur chaque appareil.
Les solutions de Keeper sont construites sur la base d'une sécurité Zero Trust et Zero Knowledge pour protéger chaque utilisateur sur chaque appareil.
Activities
- CYBERSECURITY
Description KYTL is a pureplayer French cybersecurity company founded in 2017. A recognized player in security programs with expertise oriented from “end to end” of the chain from Consulting to outsourcing (MSSP) by embedding solutions, among those , appearing in among those, appearing in Magic Quadran. KYTL is recognized PDIS evaluator.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description L’Informaticien is the reference media for IT professionals. Available on newsstands and by subscription, it is also a website which sends a daily newsletter to 50,000 subscribers. L'Informaticien also organizes 2 events: the IT Prizewinners and TopTech.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description LastPass® is an enterprise password manager that provides identity and access management solutions. From SSO and enterprise password management to MFA and Passwordless, LastPass gives superior control to IT and access to users.
Activities
- CYBERSECURITY
Description The magazine helps readers understand the issues and problems in the political, economic, social and professional spheres.
In the form of analyses, surveys or interviews, Le nouvel Economiste publishes subjects that are often unpublished, and original, non-conformist angles that enable readers to form their own opinions.
In the form of analyses, surveys or interviews, Le nouvel Economiste publishes subjects that are often unpublished, and original, non-conformist angles that enable readers to form their own opinions.
Activities
- MANAGED SERVICES
Description Linkt, 100% BtoB telecom operator, Fiber expert, supports large companies and communities in their
digital transformation by addressing their critical telecoms needs. Linkt offers a whole range of services meeting their requirements: from very high-speed connectivity to unified communications.
digital transformation by addressing their critical telecoms needs. Linkt offers a whole range of services meeting their requirements: from very high-speed connectivity to unified communications.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Recognized specialist, LUTESSA has the legitimacy to advise and support customers in the inevitable hybridization of their infrastructures, by natively integrating the security inherent to them. LUTESSA is at the forefront of innovative solutions to meet the expectations of customers.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Make IT Safe, is the French solution for evaluating and managing your Cyber & GDPR compliance. Decision support facilitated by our dashboards powered by 5 modules:
- Internal Control
- Evaluation of Third Parties
- Security by Design
- GDPR +
- Collaborative Action Plan
Make IT Safe is more than 150 customers since 2018!
- Internal Control
- Evaluation of Third Parties
- Security by Design
- GDPR +
- Collaborative Action Plan
Make IT Safe is more than 150 customers since 2018!
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description MIP monitoring technology allows you to monitor your company's applications and networks, and offers all of your users, collaborators and customers, the guarantee of optimal quality of your IT services.
Implementing the observability of your IT services allows you to monitor your applications and your network 24/7.
Implementing the observability of your IT services allows you to monitor your applications and your network 24/7.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Mantra is a next gen. cyber awareness platform.
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest AI (GenAI) innovation
Educate and protect your collaborators in real time on all your users’ devices (desktop, mobile, email) thanks to the integration of the latest AI (GenAI) innovation
Activities
- CYBERSECURITY
Description Memority offers a SaaS platform that streamlines user journeys and protects services by managing the access and digital identities of employees, partners, customers and connected objects. The ambition is to position Memority as a trusted European leader in IDaaS with an "Identity Factory" approach.
Activities
- CYBERSECURITY
Description Secure your entire DNS environment (messaging, protection...). Merox helps to implement security protocols such as SPF, DKIM, DMARC or BIMI and brings the following benefits
• Prevent phishing & spoofing ;
• Improve your security posture & reduce cyber-insurance costs ;
• Make your brand stronger & increase email deliverability and marketing KPIs.
• Prevent phishing & spoofing ;
• Improve your security posture & reduce cyber-insurance costs ;
• Make your brand stronger & increase email deliverability and marketing KPIs.
Activities
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description Miel has been distributing solutions from global cybersecurity leader Palo Alto Networks for over 13 years. Palo Alto Networks has always been committed to providing the best protection to its customers. With a complete network, endpoint and cloud protection platform, Palo Alto Networks is aimed at all companies.
Activities
- CYBERSECURITY
Description Mindflow is a no-code automation platform for Cyber & IT teams. It empowers teams to operate at a new level by intuitively automating repetitive mundane tasks and seamlessly orchestrating all their tools. With the largest library of integrations in the market and revolutionary generative-AI automation, Mindflow makes impactful automation simple.
Activities
- CYBERSECURITY
Description Created in 2001, MISC provides a pool of essential technical information to better understand the field of cybersecurity. It has established itself as the reference publication in computer security. MISC today offers a unique response to the information needs of all companies. (paper and digital subscription)
Activities
- CYBERSECURITY
Description Monaco Digital supports businesses in all areas of digital technology through its expertise in Cloud, Cyber, Infrastructure, etc.
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
Veeam ensures the resilience of your company's data with secure backup solutions, fast and reliable restoration and data protection.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description For almost 30 years, Nameshield protects its customers' strategic domain names against cyberthreats.
As a sovereign registrar, ISO 27001 certified and with its own CERT, Nameshield evolves in the heart of the cybersecurity ecosystem, and anticipates the current and future challenges faced by companies and administrations.
As a sovereign registrar, ISO 27001 certified and with its own CERT, Nameshield evolves in the heart of the cybersecurity ecosystem, and anticipates the current and future challenges faced by companies and administrations.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description NEOTRUST, a pure-play cybersecurity company, commits to supporting clients in their security transformation by offering a comprehensive range of services to help strengthen their maturity and secure their operations. With offices in Paris and Montreal, our consultants pragmatically guide you, taking into account your business context.
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description NeoVAD is a value-added distributor of innovative cybersecurity solutions (data and privileged access security, automated patching, application vulnerability scanning, etc.) and SASE. Cato Networks is a global cloud-native service that secures all sites, data centers, users and cloud resources.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Description
Netskope, a global SASE leader, helps organizations apply zero trust principles to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers on their SASE journey, visit netskope.com.
Netskope, a global SASE leader, helps organizations apply zero trust principles to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers on their SASE journey, visit netskope.com.
Activities
- CYBERSECURITY
Description NGBS is a company specialized in engineering and digital services.
Our mission is to support our customers' growth and work with them to build high-quality business and technological solutions.
Our expertise enables us to offer services that meet our customers' needs :
- Technical assistance;
- On-site or outsourced service centers
- Recruitment
Our mission is to support our customers' growth and work with them to build high-quality business and technological solutions.
Our expertise enables us to offer services that meet our customers' needs :
- Technical assistance;
- On-site or outsourced service centers
- Recruitment
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description NinjaOne is a leading SaaS platform for managing and supporting all your endpoints. It offers robust monitoring, management, remediation, and automation for all types of endpoints via a single, fast, and modern interface. Currently, NinjaOne supports over 17,000 customers, managing more than 7 million endpoints globally.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.
Activities
- CYBERSECURITY
Description Today's cyber defense teams deal with alerts, but the increase in the number of attacks and the surface to be covered represents a challenge. Faced with this major challenge, Nybble draws on the Bug Bounty approach and applies it to the defensive side of cyber. Control your budget and free up your teams by letting our community step in.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description Œil pour Œil CREATIONS offers a catalog of digital learning resources designed for all employees without any specific prerequisites. The aim of our e-learnings is to effectively familiarize them with complex topics such as GDPR, Cybersecurity, Sapin Law, and more. Our learning programs have accumulated over 3 million users worldwide.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description Okta is the World’s Identity Company. We free everyone to safely use any technology—anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world and puts Identity at the heart of business security and growth.
Activities
- CYBERSECURITY
Description One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Our Unified Identity Security Platform brings together best-in-class IGA, AM, PAM and AD Mgmt capabilities.
Activities
- CYBERSECURITY
Description OpenText Cybersecurity helps customers effectively reduce risk, preserve trust and minimize disruption. From prevention, detection and response to recovery, investigation and compliance, we help customers build cyber resilience via a holistic security portfolio of smarter and simple solutions delivered through our unified end-to-end platform.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Description We are a leading provider of cybersecurity services, assisting businesses worldwide. Our mission is to build a safer digital society. One of our core values is trust, particularly in the future. The internet must remain a space for creating connections and progress.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description ORSYS is a training Institute specialized on digital technologies, management and soft skills. Our role, support companies in improving their performance and facilitating their digital transformation. Our specificity, a unique combination of knowledge transfer and practical exercises.
Activities
- CONSULTING AND TRAINING
Description 52% of the time of IT and Cyber teams is devoted to correlating, aggregating, and unifying cyber-relevant data. OverSOC automates these low-value-added tasks to better visualize your IT system and prioritize your remediation actions.
Activities
- CYBERSECURITY
Description Since 2008, OWN provides day-to-day support to small, medium-sized and large organizations, enabling them to carry out their business in the best possible conditions, by offering continuous improvement of their cybersecurity and assistance in anticipating, detecting and reacting to cyber threats.
Activities
- CYBERSECURITY
Description We design rugged PCs and tablets for people working in harsh environments and who want to limit the costs associated with frequent renewals due to the risk of breakage or breakdown. Adapted and designed solely for the needs of professionals, these tools increase the productivity of field teams.
Activities
- MOBILITY
Description Patrowl, SaaS cybersecurity solution, provides continuous protection for your external attack surface exposed on internet. In real-time, it reveals, monitors, and simplify cybersecurity, allowing remediation without complex tool. Anticipate cyber threats and strengthen the efficiency of your organizations.
Activities
- CYBERSECURITY
Description Pentera uncovers real-time security exposures for 700+ global organizations. It emulates 24/7 real-life attacks, eliminating guesswork and reducing vulnerabilities. Pentera moves beyond simulation, offering automated security validation and continuous risk assessment.
Activities
- CYBERSECURITY
Description At Ping Identity and Forgerock, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between.
Activities
- CYBERSECURITY
Description Delivering high levels of built-in security and compliance, the fully managed, scalable, proven Platform.sh PaaS reduces pressure on IT and security teams.
It also helps freeing development teams to focus on code, gain efficiencies, and rapidly deliver web applications (results). All while you retain control, flexibility, and sleep better at night
It also helps freeing development teams to focus on code, gain efficiencies, and rapidly deliver web applications (results). All while you retain control, flexibility, and sleep better at night
Activities
- CLOUD COMPUTING
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Description Pradeo is a mobile security leader. It provides solutions to protect mobile devices and applications. Pradeo’s technology is recognized as one of the most reliable on the market by Gartner, IDC and Frost & Sullivan. It provides a precise detection and response to vulnerabilities and threats, hence preventing data leakage and reinforcing compliance.
Activities
- CYBERSECURITY
- MOBILITY
Description As a key player in cybersecurity, PRIM’X provides software for corporate data confidentiality. Its encryption solutions, certified and acknowledged by the French State and Europe, protect sensitive data in local, network and cloud environments. They are aimed at the needs of public and private organizations in all sectors.
Activities
- CYBERSECURITY
Description Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks.
Activities
- CYBERSECURITY
Description Pure storage: Uncomplicate Data Storage, Forever
Rely on innovative, cloud-ready solutions and the best experience in technology to turn bottlenecks into breakthroughs and data into powerful outcomes.
Rely on innovative, cloud-ready solutions and the best experience in technology to turn bottlenecks into breakthroughs and data into powerful outcomes.
Activities
- DATA CENTER
Description QOS Telecom is a french ISP and MSP since 2002.
We are specialised in the integration of high added value solutions such as Wifi, Lora, Internet access, IoT, Nac, Sase and data intelligence.
Our global vision allow us to help you achieve your project seamlessly.
We are specialised in the integration of high added value solutions such as Wifi, Lora, Internet access, IoT, Nac, Sase and data intelligence.
Our global vision allow us to help you achieve your project seamlessly.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description The Qualys Enterprise TruRisk Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications.
Activities
- CYBERSECURITY
Description Query Informatique offers software solutions on IBM z/OS Mainframe environments and Windows platforms used by Large Accounts, SMEs and large administrations.
Our solutions are innovative and easy to use to optimize support and IT asset management, secure data and access to workstations and servers, ...
Our solutions are innovative and easy to use to optimize support and IT asset management, secure data and access to workstations and servers, ...
Activities
- CONSULTING AND TRAINING
- DATA CENTER
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
Description Radware is a global leader in Application Performance and Security solutions, as well as Private and Public Cloud Infrastructure Security. Its award-winning portfolio of solutions helps ensure service continuity & protect the customer experience.
Radware solutions are deployed at more than 12,000 customers worldwide.
Radware solutions are deployed at more than 12,000 customers worldwide.
Activities
- CYBERSECURITY
Description Rapid7 empowers you with industry-leading security solutions and strategic expertise to stay ahead of attackers, ahead of the competition, and ready for what’s next. Our portfolio empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to infrastructure to the dark web.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description Founded by specialists in digital transformation, the Reel IT group is positioned as a leader in consulting and technical excellence in the fields of Artificial Intelligence, Cybersecurity and Big Data, the three pillars of digital innovation. Our experts are ready to answer all your questions.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description RingCentral is a leading business cloud communications and AI-First omnichannel contact centre solutions provider. RingCentral offers a single, complete and open platform for intelligent employee and customer experiences.
Activities
- MOBILITY
- NETWORKS AND TELECOMS
Description Conscientious companies use Riot to prepare their teams for cyberattacks. Get your team protected today!
Activities
- CYBERSECURITY
Description Rubrik helps organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
Description Rubycat is the editor of the Privileged Access Management french software PROVE IT (PAM-bastion). It is designed for any type of company, of any size.
Certified by ANSSI in France, PROVE IT solution controls, traces, records the actions performed by the privileged accounts (internal and external) on the IS.
Certified by ANSSI in France, PROVE IT solution controls, traces, records the actions performed by the privileged accounts (internal and external) on the IS.
Activities
- CYBERSECURITY
Description SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access. The SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time.
Activities
- CYBERSECURITY
Description SEA TPI is a French ESN supporting the largest companies in the implementation of innovative IT Service Centers, covering 100% of the IT production run. Three essential areas of activity: RUN of central services, RUN of digital uses, RUN cybersecurity, support for digital transformation.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description SentinelOne is a global leader in AI security. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy and simplicity. Over 11,000 customers.
Activities
- CYBERSECURITY
Description As a complete ecosystem dedicated to Cloud and Telecom, Sewan offers a set of complementary solutions - Voice & Collaboration, Internet & Networks, Security & Cloud - via an automated SaaS platform: Sophia. Sewan's 800 experts provide personalized support to CIOs of medium-sized businesses and major corporations through their digitization journey.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description SHAREKEY is the Swiss Collaboration app, private and eco-friendly, that secures Business Privacy.
- All-in-one (messaging, drive and videoconferencing), very easy to use, with an elegant design, Zero Trust & Zero Knowledge by default.
- Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
- All-in-one (messaging, drive and videoconferencing), very easy to use, with an elegant design, Zero Trust & Zero Knowledge by default.
- Created by Executives for Executives, ideal solution for Decision-Makers and ExComs.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- NETWORKS AND TELECOMS
Description WAVETEL – SIMAC BMS is a european player in the performance of infrastructures and networks, user experience and Cybersecurity.
Official distributor of the Broadcom AppNeta solution aimed at supervising your infrastructures, your applications and measuring the user experience wherever they are.
Official distributor of the Broadcom AppNeta solution aimed at supervising your infrastructures, your applications and measuring the user experience wherever they are.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description Skyhigh Security is focused on helping customers secure the world’s data. It protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device & from anywhere
Activities
- CYBERSECURITY
Description SNS SECURITY is a specialist cybersecurity services company that takes a defensive and offensive approach to protecting your IS. Our activities are based on 3 pillars: equipment maintenance, SOC, consulting (audit, pentest, awareness). Expert Partner FORTINET, Platinium Partner SENTINELONE.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description SolarWinds (NYSE:SWI) is a leading provider of simple, powerful, and secure IT management software built to enable customers to accelerate their digital transformation. Our solutions provide organizations worldwide with a comprehensive and unified view of today’s modern, distributed, and hybrid network environments.
Activities
- CLOUD COMPUTING
Description SOLUTIONS-NUMERIQUES: the B2B media , reaching the french speaking communities (France, Belgium, Switzerland, Luxembourg, Monaco, Quebec, North & West Africa.
Content: all IT subjects
-Quaterly Magazine (March, June, Sept, Nov), > 40,000 readers
-WEB:> 40,000 visites
-Newsletter > 45,000 subscribers
www.solutions-numeriques.com
Content: all IT subjects
-Quaterly Magazine (March, June, Sept, Nov), > 40,000 readers
-WEB:> 40,000 visites
-Newsletter > 45,000 subscribers
www.solutions-numeriques.com
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- PRINT / DOCUMENT
- MANAGED SERVICES
Description SonicWall delivers stable, scalable, seamless cybersecurity for the hyper-distributed era and a work reality where everyone is remote, mobile and unsecure. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide.
Activities
- CYBERSECURITY
Description Sophos is a worldwide leader and innovator of advanced cybersecurity solutions, including Managed Detection and Response (MDR) and incident response services and a broad portfolio of endpoint, network, email, and cloud security technologies that help organizations defeat cyberattacks.
Activities
- CYBERSECURITY
- MOBILITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES
Description SoSafe is the specialized cyber security awareness training and human risk management with people front of mind.
Our automated, effortless platform changes your employees' behaviour to make you more secure with e-learning modules and phishing simulations.
Our automated, effortless platform changes your employees' behaviour to make you more secure with e-learning modules and phishing simulations.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
Description Splunk Inc. (NASDAQ: SPLK) helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application issues from becoming major incidents, absorb shocks from digital disruptions, and accelerate digital transformation.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- MANAGED SERVICES
Description Stormshield offers innovative end-to-end security solutions to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security).
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities.
Activities
- CYBERSECURITY
Description Suricate is the French specialist in patch management as a managed service, ISO 27001 certified, fully managed and operating 24/7. Suricate manages Microsoft and Linux operating systems and over 500 natively integrated software and applications.
Activities
- CYBERSECURITY
- MANAGED SERVICES
Description Symantec is uniquely qualified to address the most complex cybersecurity challenges in the world, from blocking unauthorized access, to assuring data compliance, to stopping the newest generation of enterprise attacks. From endpoints, to networks, to e-mail, to the cloud, Symantec makes the world a safer place.
Activities
- CYBERSECURITY
Description Founded in 2010, Synetis is now the leading French and financially independent consultancy and technological expertise firm specialising in Information Systems Security. Synetis provides its clients with a holistic approach, from support to the implementation and management of new solutions within their information systems.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description In the cloud, every second counts. Sysdig stops cloud attacks in real time by instantly detecting changes in risk with runtime insights and open source Falco. We correlate signals across workloads, identities, and services to uncover hidden attack paths and prioritize the risks that matter most.
Sysdig. Secure Every Second.
Sysdig. Secure Every Second.
Activities
- CYBERSECURITY
Description Tanium protects private and public enterprises from cyber threats by integrating IT, operational, and security teams within a platform that provides comprehensive visibility over endpoints, a single interface, and a common taxonomy to safeguard critical information and infrastructures of all sizes.
Activities
- CLOUD COMPUTING
- CYBERSECURITY
- MANAGED SERVICES
Description TDF Group operates and manages telecommunications and broadcast infrastructure, secured networks and connectivity services. TDF hosts your IT projects :
- within its edge data centers (Bordeaux, Marseille, Lille and Rennes)
- by deploying your dedicated data centers close to your business needs
- within its edge data centers (Bordeaux, Marseille, Lille and Rennes)
- by deploying your dedicated data centers close to your business needs
Activities
- DATA CENTER
Description TEHTRIS is a European Software publisher and expert in the fight against cyber espionage and sabotage. Its TEHTRIS XDR Platform is THE hyper-automated cyber defense solution that detects and neutralizes cyberattacks in real time, without human action. Interoperable, the TEHTRIS XDR Platform is compatible with market security solutions via its APIs.
Activities
- CYBERSECURITY
Description Telehouse provides
its customers with resilient
resilient data centers designed to combine technological performance and energy efficiency.
Our data centers enable
support the digital transformation
companies' digital transformation
enabling them to deploy
agile solutions in the cloud
solutions in the cloud.
its customers with resilient
resilient data centers designed to combine technological performance and energy efficiency.
Our data centers enable
support the digital transformation
companies' digital transformation
enabling them to deploy
agile solutions in the cloud
solutions in the cloud.
Activities
- DATA CENTER
Description Tenacy's mission is to simplify and automate cybersecurity management for all CISOs and their teams.
In an all-in-one SaaS platform, Tenacy helps more than 120 customers to manage their cybersecurity by providing an innovative framework, streamlining every operations and ensuring performance.
In an all-in-one SaaS platform, Tenacy helps more than 120 customers to manage their cybersecurity by providing an innovative framework, streamlining every operations and ensuring performance.
Activities
- CYBERSECURITY
Description As a global leader in cybersecurity solutions with more than 30 years of expertise, Trend Micro protects people, organisations and governments with connected security solutions built on its Unifed Cybersecurity platform for the Cloud, Endpoints, messaging, IIoT, and network environments.
Activities
- CYBERSECURITY
Description TrustBuilder is your reliable partner in cybersecurity. We deliver robust & secure solutions, fostering trust among enterprises. Our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA & CIAM technology, we ensure uninterrupted access while safeguarding identities.
Activities
- CYBERSECURITY
Description TYREX, the French leader in white station solutions, provides cutting-edge options to secure USB devices. Embraced by government entities, energy, transportation, and defense industries, TYREX addresses both cyber and regulatory challenges (II901 / IGI1300).
Activities
- CYBERSECURITY
Description UBIKA, the new DenyAll, is a European cybersecurity provider. Its mission is to protect enterprise applications and APIs against cyber-attacks. Our ubiquitous, cloud-agnostic Web Application & API Protection (WAAP) technology can be deployed on-premise, in the cloud, or in SaaS mode.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Up2Change helps improve your employee engagement towards your digital transformation projects, with a focus on people, our passion for technology and our awareness of your issues. Through communication and change management, we support IT organizations in addressing their challenges.
Activities
- CONSULTING AND TRAINING
Description Vade is a French cybersecurity company providing robust AI-driven mailboxes protection solutions and automated threat remediation. Vade is a trusted choice for some of the world's largest ISPs, ensuring the security of 1.4 billion mailboxes worldwide.
Activities
- CYBERSECURITY
Description Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
Activities
- CYBERSECURITY
Description Versa Networks, a leader in single-vendor Unified SASE platforms, delivers AI/ML-powered SSE and SD-WAN solutions. The platform provides networking and security with true multitenancy and sophisticated analytics via the cloud, on-premises, or a blended combination to meet SASE requirements for small to very large enterprises and Service Providers.
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
Description WithSecure™ is cyber security’s reliable partner. Our AI-driven protection secures endpoints and cloud collaboration, and our intelligent detection and response are powered by experts who identify business risks by proactively hunting for threats and confronting live attacks.
Activities
- CYBERSECURITY
Description Wiz provides a SaaS Cloud Security solution and its main differentiators are:
- Coverage of your entire Cloud environment in a single platform
- An analysis that goes beyond existing solutions by contextualizing and prioritizing risks
- A segmentation by project that makes it possible to integrate Dev
- Coverage of your entire Cloud environment in a single platform
- An analysis that goes beyond existing solutions by contextualizing and prioritizing risks
- A segmentation by project that makes it possible to integrate Dev
Activities
- CYBERSECURITY
Description Founded in 2002 by experts in penetration testing, XMCO now supports the largest companies in their cybersecurity challenges.
XMCO's mission is to provide the best services
thanks to its cybersecurity experts who are constantly evolving from a technical, methodological and/or managerial point of view.
XMCO's mission is to provide the best services
thanks to its cybersecurity experts who are constantly evolving from a technical, methodological and/or managerial point of view.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Yubico is the inventor of the YubiKey, the gold standard in phishing-resistant multi-factor authentication (MFA), and a creator and contributor to FIDO open authentication standards.
The company is a pioneer in delivering hardware-based passkey authentication to customers in 160+ countries.
The company is a pioneer in delivering hardware-based passkey authentication to customers in 160+ countries.
Activities
- CYBERSECURITY
Description Zero Trust, cybersecurity experts, offers a complete managed SOC which has received the JEI Young Innovative Company label for its performance and innovations. It allows mid-sized companies to equip themselves with a real SOC at an attractive price and thus prove their security to their customers and partners. Our customers can testify.
Activities
- CONSULTING AND TRAINING
- CYBERSECURITY
- MANAGED SERVICES
Description Zerto, a Hewlett Packard Enterprise company, empowers customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications. Built for enterprise scale, Zerto’s simple, software-only solution uses continuous data protection to eliminate the risks and complexity of modernization and cloud.
Activities
- CYBERSECURITY
Description Nodegrid allows operational teams to remotely take control of critical network and IT infrastructures (reboot, turn on/off, reconfigure.) especially in cases of major crisis (network failure, Cyber attack, loss of services.). This is made possible thanks to serial consoles based on Intel/linux servers, service routers and a whole series of sensors
Activities
- CLOUD COMPUTING
- DATA CENTER
- CYBERSECURITY
- NETWORKS AND TELECOMS
- MANAGED SERVICES