<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.protectedit.net/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2021-03-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1030d521507c73a1fb10db/1594896597888/</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0c5417aee1c9281ab539ae/1594895703417/revenue-loss.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f154b6a237a9f21baf19580/1595231084874/</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0c548045628c2a554ab76a/1594643591031/data-breach.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0c545060bdf3313368dfbc/1594643597018/hacker.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0c5409d170fb792c070517/1594643471098/records.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f154c0be28e0f1e8850585a/1595231245318/</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0d8b0baa6bc41509ff7fd5/1594815380786/press-release.jpg</image:loc>
      <image:title>Home - Virsec Partners with ProtectedIT</image:title>
      <image:caption>SAN JOSE, CA, January 16, 2020 – Virsec, a cybersecurity company delivering a radically new approach to protect against advanced targeted attacks, announced it has partnered with ProtectedIT, a leader in delivering enterprise security solutions, remote infrastructure, and cloud services to offer advanced cyber security protections to its clientele.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0ef4bd5d535d77f9071d57/1594883261069/divider.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f3b25334bcd141ff0143f6e/5f3b277c20f7791bf972c4d6/1596822799386/Virsec_logo_RGB-1650+%28002%29+for+Web+August+2020.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f3b25334bcd141ff0143f6e/5f3b28086b45481070722100/1597819752173/threatconnect-lg-1.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f3b25334bcd141ff0143f6e/5f3b2842436ad8569546e647/1597819229269/Tenable.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f3b25334bcd141ff0143f6e/5f46e3ccded4150cf13398b5/1598481360969/rsa-logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f3b25334bcd141ff0143f6e/5f46e3ee575ff6699084b848/1598481415600/cybersaint-logo.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f0ffcbdfb223d5eaf2a2364/1594883263482/divider.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f15638070c97841c3011c73/1595501950932/bg-1.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f196d7e3a0dd62e0e042387/1595237250190/bg-1.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-clients-list</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-19</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ce369fab5136c596f265d/1594721292055/</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d840c0efc4d3eaf9a96a4/1594720795221/</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d84130e7f6263b856415d/1594720778533/recruit.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d84198480bd4a7f2f6183/1594720756103/</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d84206318062051cf2484/1594720724143/infosys.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d8427bfa4f919d02fb226/1594720711550/hong-leong-bank.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d842da1941063f2da8dc8/1594720692838/grupo-financiero-banorte.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d8435e4b78a3c979f18a6/1594720667049/</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d843ce892147e14a42961/1594720630869/eastern-bank.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d84439716383665c77470/1594720616909/du-client.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d844b3284fa7dbd48d4c6/1594720602879/</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/5f0d83cd6318062051cf1c5e/5f0d8453f8c3516ffa8dd328/1594720591984/amore-pacific.jpg</image:loc>
      <image:title>Our Clients</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-partners-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-partners-1/dell-technologies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-partners-1/rsa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-partners-1/virsec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-partners-1/techdata</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/virsec-partners-with-protectedit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/what-is-business-continuity-in-the-new-world</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/press-release</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1ae79ab361895058317c70/1595598749948/logo.jpg</image:loc>
      <image:title>In the News - ProtectedIT partners with SOAR leader ThreatConnect.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1ae7791e0a105e4e323db6/1595598721625/threat-connect-global-partner.jpg</image:loc>
      <image:title>In the News - ProtectedIT partners with SOAR leader ThreatConnect.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/ceo-damian-ehrlicher-shares-his-concerns-with-other-technology-leaders-in-forbes-about-patient-data-amp-genomics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protecting-critical-infrastructure-from-cyber-attacks-during-global-disruption-13-october-1pmest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-chief-executive-damian-ehrlicher-accepted-into-forbes-technology-council</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/virsec-joins-protectedit-for-a-nice-chat-about-the-new-norm-and-demands-in-the-iot-security-space</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-14</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/the-protectedit-engineering-team-presents-a-technical-white-paper-on-rsa-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/damian-ehrlicher-comments-on-partner-virsec-news-application-security-firm-virsec-taps-dave-furneaux-as-ceo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/the-protectedit-engineering-team-presents-high-availability-for-log-collection-in-rsa-netwitness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/forbes-14-smart-city-tech-features-that-will-soon-change-urban-centers-protectedit-says-ot-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-have-announced-that-they-have-become-a-member-of-the-tenable-assure-partner-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/why-is-ot-security-as-important-as-it-security-xy8k9</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-have-announced-that-they-have-become-a-member-of-the-tenable-assure-partner-program-3lx9t</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46b489c1889c1aebcea399/1598469259217/Logo.png</image:loc>
      <image:title>In the News - ProtectedIT and CyberSaint Align to Provide Automated, Intelligent Cybersecurity Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46b477135d856fe97bbe46/1598469241996/ProtectedIT_medium.png</image:loc>
      <image:title>In the News - ProtectedIT and CyberSaint Align to Provide Automated, Intelligent Cybersecurity Risk Management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/forbes-14-smart-city-tech-features-that-will-soon-change-urban-centers-protectedit-says-ot-security-klytz</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46bbc37006fc0cbc5116a8/1598479800535/IT%2FOT+Security+Convergence+And+Risk+Mitigation</image:loc>
      <image:title>In the News - IT/OT Security Convergence And Risk Mitigation - Damian Ehrlicher, Chair &amp;amp; CEO at ProtectedIT</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/pro-active-cybersecurity-solutions-for-smes-gain-currency-but-high-costs-a-major-impediment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46de9bfc97fa0e2e9ca581/1598480041056/Pro-active+cybersecurity+solutions</image:loc>
      <image:title>In the News - Pro-active Cybersecurity Solutions For SMEs Gain Currency, But High Costs A Major Impediment.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tenable-cybersaint-protectedit-present-us-energy-sector-spotlight-discussion-100pm-est</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-14</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-selected-as-rsa-netwitness-platform-global-managed-security-services-partner-mssp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46e156575ff669908450a9/1595598749948/logo.jpg</image:loc>
      <image:title>In the News - ProtectedIT selected as RSA Netwitness® Platform Global Managed Security Services Partner (MSSP)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46e19c8c520502c1265180/1598480799530/RSA+edit.png</image:loc>
      <image:title>In the News - ProtectedIT selected as RSA Netwitness® Platform Global Managed Security Services Partner (MSSP)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-have-announced-that-they-have-become-a-member-of-the-tenable-assure-partner-program-3lx9t-eg2zs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f47d55ea1f7357f096eab58/1598543209058/Virsec+Press+Release+Jan+2020.jpg</image:loc>
      <image:title>In the News - Virsec and ProtectedIT Partner to Deliver Advanced Cybersecurity Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/protectedit-exclusively-presents-a-government-case-study</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-22</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/gadets360-reports-as-pandemic-pushes-digital-payments-online-frauds-become-more-common-in-india</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-08</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/forbes-presents-14-project-management-tips-for-new-tech-leaders-by-expert-panel-forbes-councils-member</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-16</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/automation-in-the-cybersecurity-world</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-05</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/category/Webinars</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/category/White+Papers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/category/News+Coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/category/Blog+Post</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/category/Press+Releases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/NOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/threatconnect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/SOC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/Gadets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/threat+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/SOAR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/machine+learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/latest-news-posts/tag/India</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/the-california-consumer-privacy-act-ccpa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-23</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/why-is-ot-security-as-important-as-it-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-04</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/hackers-are-coming-for-the-2020-electionand-were-not-ready-part-i-of-a-iv-part-series</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f366bcce18eb51f00446041/1597402072890/hackers-blog-image.jpg</image:loc>
      <image:title>Blog Posts - Hackers are coming for the 2020 election…And We’re Not Ready: Part I of a IV Part Series</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/what-really-happened-during-the-presidential-election-of-2016-part-ii-of-a-iv-part-series</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-02</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f366c3dcdd938046cca0859/1597402203792/ThreatConnect+Logo+-+Logo+RGB.png</image:loc>
      <image:title>Blog Posts - What really happened during the presidential election of 2016? Part II of a IV Part Series</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/comparison-perspective-fielding-election-hacks-outside-of-the-usa-part-iii-of-iv</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/cyber-threats-amp-elections-part-iv-of-iv</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-02</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4f7e22e558153043066c47/1599045179760/ProtectedIT_high.jpg</image:loc>
      <image:title>Blog Posts - Cyber Threats &amp;amp; Elections; Part IV of IV</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/we-make-it-accessible-nbsp-protectedits-automation-conversation-with-cybersaint-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-30</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f742144bdab9a4328e05622/1601446323927/ProtectedIT_symbol_high.jpg</image:loc>
      <image:title>Blog Posts - “We Make It Accessible” -&amp;nbsp; ProtectedIT’s Automation Conversation with CyberSaint Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f741d8005bb334fc472e8e9/1601446383695/Logo+and+wordmark_color_Large.png</image:loc>
      <image:title>Blog Posts - “We Make It Accessible” -&amp;nbsp; ProtectedIT’s Automation Conversation with CyberSaint Security</image:title>
      <image:caption>“ProtectedIT has a proven model for deploying Certified Managed Security Services around the world &amp; across all sectors with award-winning product companies. We welcome this opportunity to align.” — JERRY LAYDEN, CHIEF REVENUE OFFICER AT CYBERSAINT</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/the-true-value-of-platform-as-a-service-paas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-19</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/secure-access-service-edge-sase</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Integrated+Risk+Mgmt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/PaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/GRC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Advanced+Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Integrated+Risk+Managemen</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/category/Infosec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Elections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/RSA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Virsec+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Operational+Technology+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/PaaS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Vote2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Tenable</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/CyberSaint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/ProtectedIT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/ThreatConnect</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog-posts/tag/Voting+Systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f17/1597701517864/Untitled+design+%2816%29.png</image:loc>
      <image:title>SIEM - Extensive Metadata</image:title>
      <image:caption>Uses specialized algorithms to automatically extract threat-relevant metadata from disparate sources into more than 200 metadata fields.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f1d/1597701517872/Untitled+design+%2818%29.png</image:loc>
      <image:title>SIEM - Session Replay</image:title>
      <image:caption>Capable of replaying entire suspect sessions (Web, FTP, email, etc.) as well as providing a view of exactly what data was exfiltrated in an attack.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f11/1597694855977/</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f20/1597701517876/Untitled+design+%2819%29.png</image:loc>
      <image:title>SIEM - Complete Incident Management</image:title>
      <image:caption>RSA NetWitness Orchestrator delivers complete incident management, innovative interactive investigations, a machine learning-powered Chatbot, and full playbook automation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f23/1597701517880/Flexible+Deployment+Options.png</image:loc>
      <image:title>SIEM - Flexible Deployment Options</image:title>
      <image:caption>Deploys as a single appliance or dozens, partially or fully virtualized, on premises or in the cloud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f1a/1597701517868/Untitled+design+%2817%29.png</image:loc>
      <image:title>SIEM - Multifaceted Analitycs</image:title>
      <image:caption>Identifies threats from various analytics vectors including rules, threat intelligence, malware analysis, and user and entity behavior analytics (UEBA) to provide sophisticated threat detection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b18452bdfc621561514ea/1597731872045/Untitled+design+%2821%29.png</image:loc>
      <image:title>SIEM - Real-Time Data Enrichment</image:title>
      <image:caption>Enriches data in real time, at capture time, with threat intelligence and business context, making security data much more useful for analysts during investigations.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b189e8494282166aa98a7/1597743807993/Untitled+design+%2822%29.png</image:loc>
      <image:title>SIEM - Session Replay</image:title>
      <image:caption>Capable of replaying entire suspect sessions (Web, FTP, email, etc.) as well as providing a view of exactly what data was exfiltrated in an attack.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ad65674730965091f4f27/1597734949593/Definitive+Response.png</image:loc>
      <image:title>SIEM - Definitive Response</image:title>
      <image:caption>Connects incidents over time to expose the full scope of an attack and provides analysts with orchestration and automation capabilities to eradicate threats before business impact.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1adde9c109fc68201e5f8d/1595327878641/</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b1c1c8494282166ab2975/1597734838878/Untitled+design+%2823%29.png</image:loc>
      <image:title>SIEM - Benefit #2</image:title>
      <image:caption>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b0d582bdfc62156138d37/1597729797924/9.png</image:loc>
      <image:title>SIEM - Benefit #3</image:title>
      <image:caption>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4467373bcddb62eff6534d/1598318393440/ProtectedIT_medium.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f299599a9f16c514bacfaea/1598613877741/RSA+Netwitness+Circle+Graphic.png</image:loc>
      <image:title>SIEM</image:title>
      <image:caption>Gartner Security 2020</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b1e1e23d0af47094378e0/1597709859374/Big+Red+Logo.jpg</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a4c8477b6361fd34188f4/1597655527961/divider.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a4c8477b6361fd34188f0/1595501950932/bg-1.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ac28346bbaa3d38124d3c/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ac2fb3a2279039cafaf24/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afef6519e5066c8567f0e/1595501950932/bg-1.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b1308fb307b0ee10cab40/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>SIEM</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/soar</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3beaaeab405616120272b6/1597762231833/alert.png</image:loc>
      <image:title>SOAR - Centralization and Normalization of Internal and External Security Data</image:title>
      <image:caption>This will lead to better analytics for better decisionmaking. Decisions are informed by intelligence.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc6378a32d21577506b49/1597818425620/alert-2.png</image:loc>
      <image:title>SOAR - Automation and Workflows</image:title>
      <image:caption>For cybersecurity teams to simultaneously address the pressures of attacks and maximize the efficiency of limited staff, they must have repeatable documented automation and workflows.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e6e1f1849fd6f69910425/1595334303577/</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bea5bd05ef7771c702ba6/1597762141926/documentation.png</image:loc>
      <image:title>SOAR - Dashboards and Reporting</image:title>
      <image:caption>Visualizations and capabilities for collecting and reporting on metrics and other information.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3be99f436ad856955ba23e/1597761956853/management.png</image:loc>
      <image:title>SOAR - Incident Management and Collaboration</image:title>
      <image:caption>End-to-end management of an incident by people</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b6c05ae442513123b6e63/1597731897833/9.png</image:loc>
      <image:title>SOAR - Orchestration</image:title>
      <image:caption>How different technologies - both security-specific and non-security-specific are integrated to work together.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3be92d436ad856955b8b04/1597761840516/2.png</image:loc>
      <image:title>SOAR - Automation</image:title>
      <image:caption>How to make machines do task-oriented “human work”.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e6c957a84bb2a0242d164/1595328944417/</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f435e5a7851a152fd346f2c/1598613914181/TC+SOAR+Diagram.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4465a812ef3956120a3b58/1598317994596/ProtectedIT_medium.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f299bb91e77a021717da864/1597655004714/ThreatConnect+Logo+-+Logo+RGB.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e6e7385d7250b813c7358/1595501950932/bg-1.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b66598ea6a1347c03b290/1597728571683/PIT+product-banner-services.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b688e07bfe7051915f03d/1597686406776/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b91396b454810707d2cd6/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>SOAR</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/ueba</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc8088a32d215775089d9/1597832253793/icon.png</image:loc>
      <image:title>UEBA - Comprehensive Detection of Unknown Threats</image:title>
      <image:caption>Patented machine learning algorithms alert analysts to a wide variety of threats including compromised accounts, command and control activity, data exfiltration and staging, lateral movement, advanced malware, shared user credentials, privileged user account abuse, geolocation and remote access anomalies, and snooping and reconnaissance.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc7f9eda20009a57549cf/1597818875539/investigation.png</image:loc>
      <image:title>UEBA - Faster Investigations</image:title>
      <image:caption>RSA NetWitness UEBA accelerates detection and investigation by correlating disjointed events and identifying abnormal activities and user threats in a single user interface. It provides analysts with all the information they need in one spot to rapidly investigate a threat.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc81dd204ae4169f5e602/1597818911021/2.png</image:loc>
      <image:title>UEBA - More Efficient, Effective Analysts</image:title>
      <image:caption>RSA NetWitness UEBA zeros in on suspicious behavior and applies its advanced risk scoring engine to identify and filter the highest priority threats, resulting in fewer false positives and higher-fidelity alerts that are easier for analysts to understand and act upon.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e72f833dc544479396b0d/1595422788557/</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc827fdf8ac68a529852f/1597818924222/</image:loc>
      <image:title>UEBA - Automated, Continuous Threat Detection</image:title>
      <image:caption>RSA NetWitness UEBA never stops monitoring the huge volume of log, network and endpoint security data that organizations produce. As part of the RSA NetWitness Platform, it correlates its behavioral analysis with threat intelligence and business context to produce focused, actionable alerts for SOC analysts that help to reduce mean time to investigate and respond.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2acf697561461109950f43/1597656303249/Big+Red+Logo.jpg</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f29a00289430f3fdd7bea45/1598614143465/RSA+Netwitness+Diagram+for+Web+and+Deck.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f43623c3ce4e4729a00c3ca/1598614117840/UEBA+Web+site+Image.jpg</image:loc>
      <image:title>UEBA</image:title>
      <image:caption>ProtectedIT deploys the most advanced technology to support your Security team in mitigating targeted threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e72c32189c2206f67728e/1595421349389/divider.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc64fd204ae4169f5c1d0/1597818449456/out-of-the-box.png</image:loc>
      <image:title>UEBA - Out-of-the-Box Machine Learning</image:title>
      <image:caption>RSA NetWitness UEBA starts working to accurately identify unusual behavior the moment you turn it on. The zero-touch, turn-key approach means there are no rules to set up, no metadata to customize, no long machine training times, and no need to continually tune the underlying models.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc732fdf8ac68a5297338/1597818678286/2.png</image:loc>
      <image:title>UEBA - Innovative Risk Scoring</image:title>
      <image:caption>Rather than alerting on any and all abnormal behaviors, RSA NetWitness UEBA aggregates multiple indicators of suspicious activity and applies a dynamic, statistical risk-scoring mechanism to them. When the risk score exceeds established thresholds, only then does the system produce a high-fidelity alert.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc72cda5a8e4c4fb606aa/1597818670971/</image:loc>
      <image:title>UEBA - Scalable Platform</image:title>
      <image:caption>RSA NetWitness UEBA scales to process billions of events per day and analyze hundreds of thousands of organizational entities. Data collection, enrichment, analysis and investigation capabilities can be streamed or batch loaded on a Hadoop infrastructure.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc71f431b73526c41ea40/1597818658676/Untitled+design+%2822%29.png</image:loc>
      <image:title>UEBA - Intelligent Peer Grouping</image:title>
      <image:caption>Since user behavior varies based on individuals’ roles, the type of work they do, their locations and other factors, users shouldn’t be lumped into a single group to create a behavior baseline. RSA NetWitness UEBA uses machine learning to create peer groups and detect deviations within them.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e78bd91bcb241a7ceb1f1/1595501950932/bg-1.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba0b32bdfc6215623fcea/1599132199096/PIT+product-banner-services.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba1cfbd303303e7711cc4/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba560ab40561612fa5350/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>UEBA</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/edr</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf2c7fab5136c59705fd6/1597829834304/endpoint.png</image:loc>
      <image:title>EDR - Continuous Endpoint Monitoring</image:title>
      <image:caption>Delivers full visibility into all processes, executables, events and behavior on all of your endpoints (servers, desktops, laptops and virtual machines).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf2d33d95e537c0d05801/1597829849569/rapid-data-collection.png</image:loc>
      <image:title>EDR - Rapid Data Collection</image:title>
      <image:caption>Collects full endpoint inventories and profiles in minutes, with no discernible impact on end-user productivity, using an extremely lightweight endpoint agent.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf321d204ae4169f94138/1597829923510/9.png</image:loc>
      <image:title>EDR - Behavioral-based Detection with UEBA</image:title>
      <image:caption>Baselines “normal” endpoint behavior, detects deviations, and scores and prioritizes incidents based on potential threat level using UEBA monitoring capabilities and an advanced machine learning algorithm.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf2ffeda20009a5788c8f/1597829894190/efficiency.png</image:loc>
      <image:title>EDR - Scalable and Efficient</image:title>
      <image:caption>Scales easily from hundreds to hundreds of thousands of endpoints. All data storage and most analysis occur on the RSA NetWitness Endpoint database, which ensures data integrity and drastically reduces endpoint impact.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf3290bc87a6e02ccb362/1597829934852/intelligent.png</image:loc>
      <image:title>EDR - Intelligent and Automatic</image:title>
      <image:caption>Collects and automatically analyzes processes, executables and more on endpoints; records data about every critical action surrounding the unknown item; and communicates with the RSA NetWitness Endpoint server for advanced analysis and threat prioritization.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7ad7637dc1200738fafa/1595423491774/</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf58955e4a94af1c2486c/1597832275551/9.png</image:loc>
      <image:title>EDR - Detects All Endpoint Threats</image:title>
      <image:caption>Identifies known, unknown, targeted and non-malware threats that other signature- and perimeter-based solutions miss by providing unmatched real-time visibility into all of an organization’s endpoints—on and off the network.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf5738645e045e1e1c251/1597840645897/Untitled+design+%2823%29.png</image:loc>
      <image:title>EDR - Prioritizes Alerts</image:title>
      <image:caption>Makes it easy for analysts to quickly identify the highest risk threats, understand them at a deeper level and prioritize the right response.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf550a0bc741f2e349471/1597830487735/investigation2.png</image:loc>
      <image:title>EDR - Empowers Security Teams and Accelerates Investigations</image:title>
      <image:caption>Continuously monitors endpoints to detect anomalies and gathers all forensic data needed for incident response and investigations.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf5619712b73227a42351/1597830504979/dwell-time.png</image:loc>
      <image:title>EDR - Reduces Attacker Dwell Time</image:title>
      <image:caption>Analyzes the root cause of a compromise faster and prioritizes threats for security teams to minimize attacker dwell time, improve security analysts’ efficacy and accelerate time-to-response.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7af51849fd6f69920036/1595424245369/divider.png</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf59a3f889b5e15b25f4c/1597830561130/attack.png</image:loc>
      <image:title>EDR - Highlights Full Attack Scope</image:title>
      <image:caption>As a key component of the RSA NetWitness Platform, RSA NetWitness Endpoint is tightly integrated to facilitate correlation of threat data across multiple inputs (including logs and packets), contain affected endpoints, and eradicate threats across the entire organization, not just on a single endpoint.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc9018612216ba0e75970/1597819138211/</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4362d326f6c17cdf231fa9/1598614256169/EDR+for+Web+Site.jpg</image:loc>
      <image:title>EDR</image:title>
      <image:caption>Gain unparalleled endpoint visibility to detect threats with ProtectedIT and RSA Netwitness Endpoint.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7c10b4238228f9f09afa/1595501950932/bg-1.png</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba471d05ef7771c67bd47/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba5302bdfc621562458db/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>EDR</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba54a2f12333a3bfd8af6/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>EDR</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/packets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cfc53171ced13722de2f5/1597832277069/9.png</image:loc>
      <image:title>Packets - Comprehensive Threat Tracking</image:title>
      <image:caption>Allows you to persistently track threats across all phases of the attack cycle, without blind spots.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cfb9299e5cd0f83cf3c52/1597832084145/Untitled+design+%2823%29.png</image:loc>
      <image:title>Packets - Proactive Threat Protection</image:title>
      <image:caption>Makes it easy to find active intrusions inside your network so that you can catch them before these attacks reach your endpoints.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cfc3d36dbe60157e46541/1597832255090/icon.png</image:loc>
      <image:title>Packets - Detailed Attack Reconstruction</image:title>
      <image:caption>Accelerates detailed reconstruction of attacks occurring across your network and endpoints so that analysts can more quickly grasp the full scope of an attack campaign. Armed with these insights, security teams can implement more effective remediation and response plans.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7fc982368d42a1f12299/1594883261069/divider.png</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bafa2bd303303e7724a97/1597832074814/9.png</image:loc>
      <image:title>Packets - Proactive Threat Detection</image:title>
      <image:caption>Provides visibility across all internal and external network traffic, all the way down to individual endpoint processes, so that you can detect and respond to threats before they disrupt your business. Identifies high-risk indicators of compromise (e.g., advanced persistent threat domains, suspicious proxies, malicious networks and malware behaviors) and new attack methods.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cfbee6d52b61cc2229fdc/1597832177560/Definitive+Response.png</image:loc>
      <image:title>Packets - Detailed Attack Reconstruction</image:title>
      <image:caption>Accelerates detailed reconstruction of attacks occurring across your network and endpoints so that analysts can more quickly grasp the full scope of an attack campaign. Armed with these insights, security teams can implement more effective remediation and response plans.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4363449cd6131f92d23d79/1598614390566/Packets.jpg</image:loc>
      <image:title>Packets</image:title>
      <image:caption>Protect your data from Advanced Persistent Threats (APT).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f29a3664f737640b0925f34/1597657500958/RSA+Big+Red+Logo.jpg</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf81a82d51e18e933a90e/1597840738848/threat-intelligence.png</image:loc>
      <image:title>Packets - Integrated Threat Intelligence and Business Context</image:title>
      <image:caption>The RSA NetWitness Platform for threat defense automatically weaves threat intelligence and business context into the incident management lifecycle, making it far easier to prioritize threats based on their potential impact to your businesses.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf7e749880640e2ac7e11/1597831149879/data-speed.png</image:loc>
      <image:title>Packets</image:title>
      <image:caption>Raw data is parsed into metadata and sessionized at capture time to support security analytics and event reconstruction. A highly intuitive and blazing fast user interface speeds data retrieval during investigations.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf7f4da5a8e4c4fb9c3f9/1597831162581/network-detection.png</image:loc>
      <image:title>Packets - Network Detection and Response</image:title>
      <image:caption>The only solution that combines threat detection analytics, automated response and pervasive visibility across your network and endpoints in a single platform. The RSA NetWitness Platform for threat defense eliminates your security team’s blind spots and allows you to see far beyond what your log-centric SIEM can detect.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7f862cda7f10314ca29e/1595426309826/</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf82da0bc741f2e34d790/1597831220344/investigation3.png</image:loc>
      <image:title>Packets - Rapid and Automated Investigations</image:title>
      <image:caption>By analyzing data from across your organization’s entire IT infrastructure (both on premises and in the cloud), the RSA NetWitness Platform for threat defense allows analysts to natively and visually reconstruct network attacks and data exfiltration attempts in their entirety.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cf80a55e4a94af1c27aa8/1597831184745/behaviour-analytics.png</image:loc>
      <image:title>Packets - Automated User and Entity Behavior Analytics (UEBA)</image:title>
      <image:caption>Our unique advanced analytics engine looks for potentially malicious issues across disparate data sets and correlates data across full network packets and endpoints, all prime attack vectors for today’s advanced persistent threats.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e7fbd67aaae35bbe9f914/1595501950932/bg-1.png</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba839f51bd55288ea93bf/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ba875ab40561612fa930d/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Packets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3baf7a057b6a4e657bb920/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Packets</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/data-analytics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc9339712b73227a0da48/1597819189281/ProtectedIT_medium.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1e888285d7250b813e7781/1598615120511/data-analytics.jpg</image:loc>
      <image:title>Data Analytics</image:title>
      <image:caption>Utilise your data in the most efficient way with ProtectedIT bespoke Data Analytics services.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02d48612216ba0ec0411/1597833946360/3.png</image:loc>
      <image:title>Data Analytics - Marketing and Sales Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a5300dc500a47eb418d60/1595426309826/</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02cc36dbe60157e4f15c/1597833917745/1.png</image:loc>
      <image:title>Data Analytics - Financial Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02f28612216ba0ec0577/1597833975295/</image:loc>
      <image:title>Data Analytics - HR Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02e9431b73526c46af14/1597833966932/5.png</image:loc>
      <image:title>Data Analytics - Manufacturing Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02bef7fa1e5583b4c02b/1597833923319/Definitive+Response.png</image:loc>
      <image:title>Data Analytics - Customer Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d02e199e5cd0f83cfffb3/1597833958170/</image:loc>
      <image:title>Data Analytics - Supply Chain Analytics Asset Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d04dff69bd73dc292deb2/1597834466476/Untitled+design+%2823%29.png</image:loc>
      <image:title>Data Analytics - Improved Decision Making to become proactive and anticipate client needs better. Make Informed decisions, leading to better outcomes.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d04f38612216ba0ec2e99/1597834489657/10.png</image:loc>
      <image:title>Data Analytics - Mitigating Risk &amp; Fraud Delivering Relevant Products</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d050bf7fa1e5583b4ed5a/1597834512537/12.png</image:loc>
      <image:title>Data Analytics - Optimizing &amp; Improving the Customer Experience</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0500431b73526c46e9c1/1597834501128/</image:loc>
      <image:title>Data Analytics - Personalisation Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d04ec171ced13722ea513/1597834478940/</image:loc>
      <image:title>Data Analytics - More Efficient Operations</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d04e73d95e537c0d1e221/1597834474203/Definitive+Response.png</image:loc>
      <image:title>Data Analytics - More Effective Marketing. Better Customer Service.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a53141902447baaf0328d/1594883261069/divider.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a5300dc500a47eb418d5d/1595501950932/bg-1.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb0d323d0af47095268a9/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb106a5bf4e68d3be7be2/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb1c5ab40561612fb6ab7/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Data Analytics</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/vulnerability-and-patch-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4363c2a354d12015992224/1598615235287/Vulnerability+Management+Image.jpg</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
      <image:caption>“ProtectedIT shares our commitment to enable organizations to manage, measure and reduce risk in the digital era” says Mark Thurmond, chief operating officer, Tenable</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cccb39712b73227a11b8d/1597820084569/protected-it-icon.jpg</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cc95deda20009a5756883/1597819233686/Tenable.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07aae527ad70e39e3bea/1597835180469/</image:loc>
      <image:title>Vulnerability and Patch Management - Help organizations in identifying programming errors that leads to cyber-attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a56fade22531a4db7a181/1594883261069/divider.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07b5f7fa1e5583b52a66/1597840753766/Untitled+design+%2821%29.png</image:loc>
      <image:title>Vulnerability and Patch Management - Safeguards the business from loss of reputation and money</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07bf8612216ba0ec6f65/1597835201609/</image:loc>
      <image:title>Vulnerability and Patch Management - Protecting the organizations data from malicious attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07aed204ae4169fafcdc/1598422008914/icon.png</image:loc>
      <image:title>Vulnerability and Patch Management - Provide risk management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07a5a0bc741f2e362934/1597835176383/</image:loc>
      <image:title>Vulnerability and Patch Management - Providing organizations a detailed view of potential threats faced by an application</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d07b93d95e537c0d222cc/1597835196210/Untitled+design+%2823%29.png</image:loc>
      <image:title>Vulnerability and Patch Management - Securing applications from internal and external attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d06a4431b73526c47079c/1597834921366/14.png</image:loc>
      <image:title>Vulnerability and Patch Management - Vulnerability Identification</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d06ac22dffe5139f1a53b/1597834929514/15.png</image:loc>
      <image:title>Vulnerability and Patch Management - Documentation Remediation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a56e81902447baaf085c7/1595426309826/</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d069be527ad70e39e283e/1597834912482/13.png</image:loc>
      <image:title>Vulnerability and Patch Management - Cataloging Assets</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a56e81902447baaf085c4/1595501950932/bg-1.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb3a607bfe705191c25b5/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb3c6a5bf4e68d3bec494/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb46b2bdfc6215625d21b/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Vulnerability and Patch Management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/runtime-application-memory-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a59bc551f15457798f20d/1595426309826/</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d08d6fdf8ac68a52eb95b/1597835480727/24.png</image:loc>
      <image:title>Runtime Application Memory Protection - Defence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d08da8a32d2157755906a/1597835484871/2.png</image:loc>
      <image:title>Runtime Application Memory Protection - Pre-Emptive Patching</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d08df857e757f16ce6220/1597835489991/2.png</image:loc>
      <image:title>Runtime Application Memory Protection - Risk Reduction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d08cd0073681a0d62ea68/1597835472263/</image:loc>
      <image:title>Runtime Application Memory Protection - In Depth Application Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d08d249880640e2adf187/1597835476512/icon.png</image:loc>
      <image:title>Runtime Application Memory Protection - Critical Infrastructure</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4467ba5d6fe2719278eaba/1598318524601/ProtectedIT_medium.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f29b5acd1596d7b0f5998c5/1598615341600/Diagram+for+Web+and+Deck+August+2020.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
      <image:caption>“In today’s hostile security environment, we’re seeing an exponential rise in attacks that target application memory during runtime. Virsec is the only solution that directly addresses this risk to all businesses,” says Vishal Patel, Vice President, Enterprise – North America at Virsec</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2c294a81216d6f62e9de84/1596822799386/Virsec_logo_RGB-1650+%28002%29+for+Web+August+2020.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d7b8645e045e1e406cc/1597836669690/9.png</image:loc>
      <image:title>Runtime Application Memory Protection - Guardrails application runtime to prevent attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0dcf6d52b61cc224512f/1597836756837/35.png</image:loc>
      <image:title>Runtime Application Memory Protection - Connecting the context from web to memory</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0da8171ced13722f6788/1597836715295/</image:loc>
      <image:title>Runtime Application Memory Protection - Web, memory, &amp; host Full visibility to the entire kill chain</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d73857e757f16ced1eb/1597836661693/27.png</image:loc>
      <image:title>Runtime Application Memory Protection - Delivers a new yet simple approach to security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d8049880640e2ae6c47/1597836675035/</image:loc>
      <image:title>Runtime Application Memory Protection - Detects and protects in real time, opposed to pre or post execution</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d94eda20009a57b12a7/1597836694519/Untitled+design+%2822%29.png</image:loc>
      <image:title>Runtime Application Memory Protection - Assures applications only execute through memory as designed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a59caa5ff9a5e82e77b07/1594883261069/divider.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d9d55e4a94af1c46a82/1597836704123/Untitled+design+%2823%29.png</image:loc>
      <image:title>Runtime Application Memory Protection - Protects in memory with patented RAMP technology</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0d769712b73227a6564e/1597836664728/</image:loc>
      <image:title>Runtime Application Memory Protection - Assures applications only operate &amp; execute as designed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0da40073681a0d636cf6/1597836711282/</image:loc>
      <image:title>Runtime Application Memory Protection - Secures the full application stack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a59bc551f15457798f20a/1595501950932/bg-1.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bb96223d0af4709533ab3/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bbf784bcd141ff02453c2/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc0cfd05ef7771c6a4551/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Runtime Application Memory Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blockchainaiml</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-18</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f184eb63816d43508c4d32f/1597662049190/blockchain.jpg</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc2e3c1f83c774def541b/1597752038705/</image:loc>
      <image:title>Blockchain/AI/ML - Remote Destruct</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc317ab40561612fd045a/1597752089681/</image:loc>
      <image:title>Blockchain/AI/ML - Object Tagging</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc2b4f51bd55288ed25fc/1597751990998/Untitled+design+%2821%29.png</image:loc>
      <image:title>Blockchain/AI/ML - Data Integrity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6486551f15457799e615/1595426309826/</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc2912904263de469c469/1597751967214/icon.png</image:loc>
      <image:title>Blockchain/AI/ML - Lifetime auditable trails</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc2f38494282166bc43ab/1597752054970/Untitled+design+%2823%29.png</image:loc>
      <image:title>Blockchain/AI/ML - Threat Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc2c22bdfc6215627478c/1597752005612/</image:loc>
      <image:title>Blockchain/AI/ML - Threat Detection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc38b4bcd141ff024b45d/1597752206000/</image:loc>
      <image:title>Blockchain/AI/ML - Information Lifecycle Management</image:title>
      <image:caption>Cradle-to-Grave insight and control over data</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc34c2fce70474b8e232e/1597752144271/Untitled+design+%2823%29.png</image:loc>
      <image:title>Blockchain/AI/ML - Data Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc36a878a1656e3f8ab64/1597752173552/</image:loc>
      <image:title>Blockchain/AI/ML - Compliance</image:title>
      <image:caption>Out of the box compliance with industry regulations</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6496792fdc7dc7b9cab4/1594883261069/divider.png</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6486551f15457799e612/1595501950932/bg-1.png</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc20a4b31496c55fc0bf6/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc27fe0cc631d15db1aa4/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc32f8494282166bc4db0/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Blockchain/AI/ML</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/platformasaservice-paas</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-11-08</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2c06efbcb9d83590494907/1596720905852/TC+SOAR+Diagram.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ccb5122dffe5139ece7a4/1597819730558/</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ccb68a0bc741f2e3177ca/1597819753193/</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0fe1f69bd73dc293ec3c/1598422129976/</image:loc>
      <image:title>Virtual SOC - Detection of Advanced Attacks</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a67992c6d5078f60374b9/1594883261069/divider.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0fe69712b73227a69168/1598421913296/9.png</image:loc>
      <image:title>Virtual SOC - Investigation and Response</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0fd155e4a94af1c494d5/1597837274149/38.png</image:loc>
      <image:title>Virtual SOC - Pervasive Visibility</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0f173d95e537c0d2d419/1597837081619/icon.png</image:loc>
      <image:title>Virtual SOC - Around the clock network security monitoring</image:title>
      <image:caption>Of all IT layers, Enable Controls Management on Identities i.e., Privilege or User with in-depth visibility of user behaviour, advance threats, risks and compliance dashboards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a678957da8940e9e9b7e6/1595426309826/</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d0f129712b73227a67c18/1597837077073/2.png</image:loc>
      <image:title>Virtual SOC - Continuous monitoring for all layers of the IT stack</image:title>
      <image:caption>Network Packets, flows, OS activities, content, Identities, user behaviours and application transactions for protection from advanced threats using integrated Adaptive Security framework.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a678957da8940e9e9b7e3/1595501950932/bg-1.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc3bec1f83c774def7184/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc3d6ab40561612fd1beb/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc40bab40561612fd1e41/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Virtual SOC</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/governance-risk-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4364f73a7875569029c4ae/1598615399860/GRC+Image.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f43642f381f2c334d6214e9/1598252084793/RSA+edit.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2c284e7f83fb13cf3b0f5b/1597663910763/Logo+and+wordmark_color_Large.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2c0d485ce4f550fa842a0b/1598615572451/Governance+Dashboards+Screenshot.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
      <image:caption>“ProtectedIT has a proven model as a lead MSSP,” says Jerry Layden, CRO at CyberSaint Security</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ccbc33d95e537c0cd3cc5/1597819846670/Logo+and+wordmark_color_Large.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4364dd9cd6131f92d26144/1598252346168/tenable.io-logo.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1b4efab5136c5973e668/1597840774273/icon.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Traditional on-premise environments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1b54da5a8e4c4fbce7a4/1597840783551/Untitled+design+%2821%29.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Regulatory response frameworks for ISO 27001, SSAE, ISAE, ISMS, PCI-DSS, FERPA, HIPAA, GDPR, ND1643, COBIT, State and Federal Laws.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1b49857e757f16d03d7f/1598252537025/41.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Compliant Cloud Solutions (AWS, VMware, Microsoft Azure, Microsoft HyperV)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6b775e34e95335f89e51/1595426309826/</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6b8d77b6361fd3441baf/1594883261069/divider.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1c66857e757f16d06623/1598252552163/</image:loc>
      <image:title>Governance Risk &amp; Compliance - Managed GRC Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1c7ef69bd73dc2952918/1598252552174/Untitled+design+%2822%29.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Security Architecture</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1c738a32d215775788db/1597840675073/46.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Roadmap remediation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1c79857e757f16d0689b/1598252552171/Untitled+design+%2823%29.png</image:loc>
      <image:title>Governance Risk &amp; Compliance - Cyber Risk Assessment</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1c6ea0bc741f2e3856ea/1598252552167/</image:loc>
      <image:title>Governance Risk &amp; Compliance - ISMS Policy definition</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6b775e34e95335f89e4e/1595501950932/bg-1.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc51fa5bf4e68d3c0693d/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc575436ad85695567756/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bc65d878a1656e3f8f9a6/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Governance Risk &amp; Compliance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/a-marketers-survival-guide-to-disruptive-go-to-market-change</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/deciding-on-the-rules-of-the-road-for-cyberspace-the-who-what-where-when-how</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1ea11685a63622a2049a25/1595964876809/divider.png</image:loc>
      <image:title>New Events - Deciding on the Rules of the Road for Cyberspace: The Who, What, Where, When, How</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/making-cybersecurity-a-priority-during-a-global-crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/whiskey-with-wenzler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/the-shifting-sands-of-ot-threats-what-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/inform-your-risk-management-strategy-for-the-rest-of-2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/digiville-investigative-report-managing-distributed-workforce-risks-in-times-of-disruption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/closing-the-cyber-exposure-gap-with-ot-operational-technology-security-apac</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/harnessing-hybrid-it-next-generation-cloud-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/the-defenders-dilemma-what-makes-vulnerabilities-persist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/strategizing-your-cybersecurity-maturity-model-certification-plan-of-action</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/the-30-60-90-day-plan-for-customer-service-during-and-after-covid-19</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/tips-to-sustain-and-strengthen-critical-compliance-programs-during-a-crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/infosec-career-survival-skills</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/rsa-conference2020-asia-pacific-amp-japan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/how-to-securely-unify-ot-amp-it-with-an-air-gapped-architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/digiville-diy-spotlight-adapt-compliance-for-business-disruption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/techforums-security-forum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/tampa-cyber-security-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/your-journey-to-risk-based-vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f207f4de3bbe13f385cf581/1595965268403/Tenable.png</image:loc>
      <image:title>New Events - Your Journey to Risk-Based Vulnerability Management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/cyber-resilience-virtual-summit-fireeye</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2080c5aa4ca7166ef08492/1595965641356/threatconnect-lg-1.png</image:loc>
      <image:title>New Events - Cyber Resilience Virtual Summit (FireEye)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/on-the-shoulders-of-giants</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/philadelphia-cyber-security-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/technet-augusta-2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/the-big-quiz-thing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/chicago-cyber-security-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/rsa-charge-2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/gartner-security-amp-risk-management-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/events-post/rsa-conference-rsac</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f207e269eb94c7ad74461a2/1595964975851/RSA.png</image:loc>
      <image:title>New Events - RSA Conference (RSAC)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/ot-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f43653aa354d12015993b5e/1598252347299/GRC+Image.png</image:loc>
      <image:title>OT Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365589cd6131f92d26a93/1598614625294/OT+Security.jpg</image:loc>
      <image:title>OT Security</image:title>
      <image:caption>“OT security has been a blind spot in many organizations for far too long,” says Chairman &amp; Chief Executive Damian Ehrlicher in Forbes August 2020</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d71e527ad70e3a05478/1597840755456/Untitled+design+%2821%29.png</image:loc>
      <image:title>OT Security - Reduce risk by identifying vulnerabilities and potential threats before they become exploits and impact industrial operations.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d8f49880640e2b014f9/1597840784609/Untitled+design+%2821%29.png</image:loc>
      <image:title>OT Security - This enables organizations to detect and mitigate risky events in OT environments.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6d60a5ff9a5e82e93a8a/1594883261069/divider.png</image:loc>
      <image:title>OT Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1cf8a0bc741f2e386016/1597840633799/9.png</image:loc>
      <image:title>OT Security - Gain full visibility across converged IT/OT operations. Eliminate blind spots which can harbor lateral threats that can traverse IT and OT.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d238a32d215775799b2/1597840676210/46.png</image:loc>
      <image:title>OT Security - Roadmap remediation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1dbea0bc741f2e387f57/1597840831932/alert-3.png</image:loc>
      <image:title>OT Security - Context-aware alerts include extended information and a comprehensive audit trail for fast incident response and forensic investigations.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bcd03878a1656e3f9b272/1597754631170/Untitled+design+%2823%29.png</image:loc>
      <image:title>OT Security - Converged Visibility Tenable.ot provides complete enterprise visibility by integrating with Tenable.sc as well as leading IT security tools, such as SIEM, other activity reporting tools, Next Generation Firewalls, vulnerability management tools and more.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d628612216ba0ee7d31/1597840740113/cyber-attack.png</image:loc>
      <image:title>OT Security - Gain deep knowledge and situational awareness into the operation and state.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d053f889b5e15b621c4/1597840647375/Untitled+design+%2823%29.png</image:loc>
      <image:title>OT Security - Detect and mitigate threats that impact industrial and critical operations by leveraging multiple detection methodologies.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bccd8b8362a6b6cac5d6a/1597754592318/</image:loc>
      <image:title>OT Security - Track configuration changes with full audit trail capabilities. Determine whom, what and why changes were made as well as the result of those changes.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3d1d86f69bd73dc2954b96/1597840776167/icon.png</image:loc>
      <image:title>OT Security - The platform also shares information with CMDB, asset inventory platforms, change management tools and more. Our RESTful API is designed to facilitate extraction of data even to proprietary tools, giving a more coherent view of the IT &amp; OT environments in a single pane of glass.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3a6dd5e734c879bcd90317/1595501950932/bg-1.png</image:loc>
      <image:title>OT Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bcc23ab40561612fdf3aa/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>OT Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bdd82c1f83c774df284c1/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>OT Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/data-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-19</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2d6375f22b9b59c509f5ee/1597819860935/Logo.png</image:loc>
      <image:title>Data Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3ccc4f171ced137229ffa8/1597819985061/</image:loc>
      <image:title>Data Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2d63e5fb04bf6f7ea63dc0/1596810237636/Blockchain.jpg</image:loc>
      <image:title>Data Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bcd7afb307b0ee120336d/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Data Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3bcdbd436ad85695576508/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Data Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/real-time-data-enrichment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/extensive-metadata</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/multifaceted-analytics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/session-replay</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/complete-incident-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/siem/flexible-deployment-options</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/identity-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f436608b398394e2d96eee7/1598422035092/divider.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f45fbf814efc67813f15a61/1598422018285/icon.png</image:loc>
      <image:title>Identity Protection - Simplify Authentication</image:title>
      <image:caption>Access simplifies authentication and credential management helping to reduce IT support costs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f45fc717300a35275e5c66e/1598422134265/</image:loc>
      <image:title>Identity Protection - Any Device; Cloud or On-Prem</image:title>
      <image:caption>With a conditional-access and risk-based approach, it ensures users are who they say they are and provides the right level of access from any device, across cloud and on-premises applications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4466cc12ef3956120a5bb1/1598615707369/shutterstock_1405520342.jpg</image:loc>
      <image:title>Identity Protection</image:title>
      <image:caption>In 2019, the Federal Trade Commission (FTC) received over 3.2 million reports of fraud with more reports of identity theft than any other category.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365ec26f6c17cdf2355ba/1598252084793/RSA+edit.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365f8a662a57134654f76/1598421814881/</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f45fb280e49e35288b2a3bd/1598421823684/Untitled+design+%2821%29.png</image:loc>
      <image:title>Identity Protection - Unified identity assurance platform</image:title>
      <image:caption>Unified identity assurance platform</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f45fb7081572138227deb81/1598421886881/icon.png</image:loc>
      <image:title>Identity Protection - Modern authentication for dynamic workforces</image:title>
      <image:caption>RSA SecurID Access empowers employees, partners and contractors to do more without compromising security or convenience. It provides authentication choice to meet the needs of your diverse user base with passwordless, hardware, software and mobile options.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f45fb992add6969dad6405a/1598421928789/9.png</image:loc>
      <image:title>Identity Protection - Identity governance and lifecycle</image:title>
      <image:caption>RSA Identity Governance and Lifecycle delivers continuous access assurance and ensures users have appropriate levels of access. It provides visibility across organizations’ islands of identity in today’s blended cloud and on-premises environments.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365df0f73c2195e21b5d0/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365ec26f6c17cdf2355b1/1597728910303/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4365f8a662a57134654f73/1595501950932/bg-1.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f436608b398394e2d96eee4/1597713074968/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>Identity Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-03-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f181d8558ac01647486a28f/1595415943024/divider.png</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb4268a32d215774f20a2/1597813811602/PIT+product-banner-services.png</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/subscribe-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-20</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/the-team</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f157dbe0bbd2104ee59056c/1597424583666/protected-it-icon.jpg</image:loc>
      <image:title>The Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f157d48b4f17e3c863e79f7/1597408990638/Manny+Chadda.jpg</image:loc>
      <image:title>The Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f157b850bbd2104ee58d79f/1595243398502/</image:loc>
      <image:title>The Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f157d078f488a75b54dc4b1/1597408904114/David+Fadida.jpg</image:loc>
      <image:title>The Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f157c1fe2fd42124a08e3ac/1597408834469/Damian+Ehrlicher.jpg</image:loc>
      <image:title>The Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b2a71fd46d27dcf5d2200/1597713034001/PIT+product-banner-services.png</image:loc>
      <image:title>The Team</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/careers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1aee04c4149b602307ff0b/1595600391235/divider.png</image:loc>
      <image:title>Careers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b2ae42f12333a3bf19252/1597713136189/</image:loc>
      <image:title>Careers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb695e01818041808b14e/1597814427797/generic+images+for+traffic+%2811%29.png</image:loc>
      <image:title>Careers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/commitment-to-veterans</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1585499fbfcc69176d9d6a/1598613551332/mat-reding-yfXhqAW5X0c-unsplash.jpg</image:loc>
      <image:title>Commitment to Veterans</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1584e486531d20ab91ad68/1595245801348/</image:loc>
      <image:title>Commitment to Veterans</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/main-solutions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f168ddb92f0a40baa39ab1d/1595313629705/divider.png</image:loc>
      <image:title>Main Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f15939670c97841c3057b6d/1595249567574/</image:loc>
      <image:title>Main Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/rsa</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3b2bb37b401a59430789ad/1598615749649/RSA+edit.png</image:loc>
      <image:title>RSA</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/tenable</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.protectedit.net/virsec-systems</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2aaa16a482ea4f103b3f6f/1598615789785/Virsec_logo_RGB-1650+%28002%29+for+Web+August+2020.png</image:loc>
      <image:title>Virsec Systems - Introducing the end of the WAF</image:title>
      <image:caption>Virsec Systems 2020</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/threatconnect</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2aad572795162792d023de/1598615817252/ThreatConnect+Logo+-+Logo+RGB.png</image:loc>
      <image:title>ThreatConnect - ProtectedIT partner ThreatConnect offers the only way to reduce human error. Let’’s SOAR ahead.</image:title>
      <image:caption>ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/cybersaint</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f2aaef4c3affd745c48d77d/1598615846535/Logo.png</image:loc>
      <image:title>CyberSaint - Presenting the CyberStrong Platform ™ for Integrated Risk Management (IRM)</image:title>
      <image:caption>Learn more about how ProtectedIT partner CyberSaint improves resiliency whilst rapidly driving business value, using greater intelligence for faster insights thereby leading to smarter decisions and meaningful action.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f16e24f36ee8f6b7faaf51f/1595335250554/divider.png</image:loc>
      <image:title>Blog</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f19978ef5fdc867fc090bba/1595512722252/divider.png</image:loc>
      <image:title>Blog</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3c2b7db61aa41e944ed9a4/1597778826299/PIT+product-banner-services.png</image:loc>
      <image:title>Blog</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/white-papers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f46a3b194e7322db4ab3b92/1598464954148/whitepaper-jpegs_Page_1.jpg</image:loc>
      <image:title>White Papers</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb4f682d51e18e92e46df/1597814008427/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>White Papers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/case-studies</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-21</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb576eda20009a573e6c4/1597814136371/generic+images+for+traffic+%289%29.png</image:loc>
      <image:title>Case Studies</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/in-the-news</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f18172bf722dd359826733c/1595414317138/</image:loc>
      <image:title>In the News</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1aeaf59dee940cee13c4ed/1595599607874/</image:loc>
      <image:title>In the News</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1aeb48ab75d148b9a8463c/1595599690051/</image:loc>
      <image:title>In the News</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1aec01abeba56bd89123e6/1595599875234/</image:loc>
      <image:title>In the News</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1aebc7ee769a6c695c4ccd/1595599818656/divider.png</image:loc>
      <image:title>In the News</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb49655e4a94af1bd1f26/1597813914821/generic+images+for+traffic+%2812%29.png</image:loc>
      <image:title>In the News</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/events</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-20</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb221d204ae4169f42a6d/1597713009986/PIT+product-banner-services.png</image:loc>
      <image:title>Events</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/datasheets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb550e527ad70e39797e7/1597814134068/generic+images+for+traffic+%289%29.png</image:loc>
      <image:title>Datasheets</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/features</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-17</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1addcbadfd2c7bfbbd3acc/1597694855977/</image:loc>
      <image:title>Features</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f1ae3e4ee769a6c695b1783/1595501950932/bg-1.png</image:loc>
      <image:title>Features</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/privacy-statement</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-04</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb36e55e4a94af1bd079b/1597813714158/PIT+bkgnd-bottom.png</image:loc>
      <image:title>Privacy Statement</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/our-story</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f36537cba4e1a2d34b9b588/1597395839654/Big+Red+Logo.jpg</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f36538dd3b01649fe7452d8/1597395856870/ThreatConnect+Logo+-+Logo+RGB.png</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f36539bead1ce6d7d2f3540/1597395869701/</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3653bc3e7bd81b799d972d/1597395902893/</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3653cde3bf13187ef008b4/1597395919936/Logo+and+wordmark_color_Large.png</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f366784cd79e476c15d89dc/1597400967971/divider.png</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb6c78645e045e1dd000f/1597814281634/generic+images+for+traffic+%2810%29.png</image:loc>
      <image:title>Our Story</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/ebooks</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb58f171ced1372283d59/1597814162592/generic+images+for+traffic+%289%29.png</image:loc>
      <image:title>Ebooks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/infographics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-31</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4463b395be297ce45df7dd/1598317635168/ThreatConnect-Security-Operations-Maturity-Model-Infographic-Web.jpg</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f44633df27a116b1811c042/1598317391879/Screen+Shot+2020-08-24+at+8.01.13+PM.png</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f446163d10a1b0c40256ab8/1598316946364/Screen+Shot+2020-08-24+at+7.54.42+PM.png</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f44625e47511f25423489c4/1598317170465/Screen+Shot+2020-08-24+at+7.59.01+PM.png</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4463600858461c765b7ced/1598317669685/ThreatConnect-Managing-the-Program-Infographic.jpg</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4464c96f784a6c15df9269/1598467037773/Virsec_self-protection-infographic_web.jpg</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f4461ff0c9188198a5635c4/1598317071668/</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3cb5a422dffe5139eb2a86/1597814192724/generic+images+for+traffic+%289%29.png</image:loc>
      <image:title>Infographics</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.protectedit.net/features-7wcat</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-17</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afd8d30f8b5338ed213f5/1597694855977/</image:loc>
      <image:title>Features (Copy)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5efccf4a465e682020c69aab/t/5f3afd8d30f8b5338ed213f2/1595501950932/bg-1.png</image:loc>
      <image:title>Features (Copy)</image:title>
    </image:image>
  </url>
</urlset>

