<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.mamori.io/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/2025-ransomware-lessons-learned</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/df940b0c-89cd-40d3-8bf1-40fd6eb58e7c/ransomware+red+lock.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Lessons Learned from Top 10 Ransomware Incidents in 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Lessons Learned from Top 10 Ransomware Incidents in 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/firewall-to-zero-trust-10-best-practice-business-data-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1760844429378-SI4SCX138DJYC2AH7KJ8/zero-trust-authentication-foundation-security.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/remote-access-security-modern-approach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1d131b2b-75b8-46bc-8b18-2ff837056db6/remote+access+security+laptop+lock-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Remote Access Security: Traditional vs. Modern Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Remote Access Security: Traditional vs. Modern Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/mitigating-jump-server-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1719368656847-DXHVXKYWR8XZQD8FA023/jump+server+computer+screen.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Understanding and Mitigating Jump Server Security Risks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/46430703-969e-4ce6-99bd-e89fe0dc1ffb/circumventing+privileged+access+jump+server+security+risk.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Understanding and Mitigating Jump Server Security Risks - Make it stand out</image:title>
      <image:caption>Above: Workstation can circumvent access to privileged resources when the security architecture is misconfigured. Image source: Improsec.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/ransomware-prevention-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1650442622583-D218T8MLYN76QM8UI4TE/Ransomware+prevention+data-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/0b5afa9f-a38e-44f6-b83b-1d3e30d31eb9/Stages+of+a+Ransomware+Attack+-+Mamori-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Download the PDF version of this image.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/5b5c538b-19d1-4947-96dc-dcc9236d21e3/employee+education+against+ransomware-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Although employee education is one of the best lines of defense against ransomware, employees can get careless or accidentally visit a website with a drive-by-download.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eb742e29-c63c-40e2-975b-808b44d3c846/Screen+Shot+2022-03-06+at+5.57.20+pm.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Image: Mamori M4PAM complements your existing PAM solution by extending controls down into database operations and data</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/77bde4c2-0260-40cb-879e-c6b6f53e5e99/Screen+Shot+2022-03-06+at+6.10.08+pm.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Image: Mamori M4PAM has all the controls required by security and data privacy compliance requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Ransomware Prevention Best Practices 2026: A Complete Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/are-corporate-vpns-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/12ca5bfd-1f64-428f-be22-6d56a03daa3c/vpn+lock+image-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Are Corporate VPNs Secure? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/how-to-simplify-and-automate-iso-27001-access-controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/5ec8e6af-e0d9-4346-8a60-5e381766d111/business+process+automation+iso+27001+mamori.io-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - How to Simplify and Automate ISO 27001 Access Controls - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/d5ab31f9-20fb-4994-8b67-b25b01ae4e6f/ISO+27001+automated+workflow+using+Mamori.io.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - How to Simplify and Automate ISO 27001 Access Controls - Make it stand out</image:title>
      <image:caption>Above: When new employees or 3rd parties join your organization, a role is assigned to them. When they access via the Web Access Portal, their identity is confirmed and role-based access controls (RBAC) are applied. The user then requests for a single resource or a collection of resources that the role has authorized access to. When the request is approved by the manager, the user starts the access. Finally, the user’s access is terminated based on policy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/2023-5-why-are-secure-companies-still-being-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Why are “Secure” Companies Still Being Hacked? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Why are “Secure” Companies Still Being Hacked? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/microsegmentation-importance-strategy-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/c87fee3a-e884-4c80-976c-7c9ba9c423fb/micro+segmentation+network+mamori.io-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Why Micro-Segment Networks? – Importance, Strategy &amp;amp; Best Practices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - Why Micro-Segment Networks? – Importance, Strategy &amp;amp; Best Practices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/pam-cybersecurity-strengths-flaws-and-a-better-approach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1673426535311-QF3XGLOVVO091B0U9E86/PAM+Cybersecurity+privileged+access+strengths+flaws-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/9c191447-8fe6-41ce-9f12-3d274bdbdbee/Mamori+Closes+PAM+Cybersecurity+Gaps.JPG</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1395afb4-9b46-4419-bd0d-b39075bdc47a/Why+PAM+Doesn%27t+Stop+Ransomware.JPG</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3fb5a3bc-407e-439c-ab95-327a1d5bc2a0/MMR+Native+Ad+-min.png</image:loc>
      <image:title>Zero Trust Data Security Blog - PAM for Cybersecurity: Strengths, Flaws, and a Better Approach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/cybersecurity-threats-businesses-face</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3526926a-035d-4be4-b0a7-cbcf5dc9dee5/cybersecurity+for+businesses+2023-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/9c7308a3-e689-415e-8fbc-b1255f783933/frank+abagnale+cnbc.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Frank W. Abagnale</image:title>
      <image:caption>Frank W. Abagnale. Image Source.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/22e5c07b-3903-4f39-b11f-cae95c997c12/Roger+Grimes.png</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Roger Grimes - Data-Driven Defense Evangelist</image:title>
      <image:caption>Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6ecfe39c-76b0-4429-91cd-78af11abbaf8/Adam+Levin.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Adam Levin</image:title>
      <image:caption>Adam K. Levin is a consumer affairs advocate and serial entrepreneur with more than 40 years of experience. He is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. At age 27, Levin became the youngest Director in the history of the New Jersey Division of Consumer Affairs — one of the most powerful consumer protection agencies in the U.S. He is a graduate of Stanford University and the University of Michigan School of Law.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1943b3f5-7d97-4f36-9b3f-b313f9d46bfb/ian+moyse+400x400.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Ian Moyse</image:title>
      <image:caption>Ian Moyse, has over 30 years of experience in the IT Sector, with nine of these specialising in security, 12 in cloud and over 23 years of channel experience and is a fellow of the Institute of Sales Management (ISM) and member of the Association of Professional Sales (APS).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6f78c603-64bf-4c07-8453-eed9d63b86a9/Rafay+Baloch.jpeg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Rafay Baloch</image:title>
      <image:caption>Rafay Baloch, is a Pakistan ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been featured and known by both national and international media and publications like Forbes, BBC, The Wall Street Journal, and The Express Tribune.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/fb94b736-f4f6-4a49-ab57-752e124a80f4/Omar+Masri-min.jpeg</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Omar Masri</image:title>
      <image:caption>Omar Masri is a software entrepreneur, founder and CEO of Mamori.io, which helps businesses overcome the cost and complexities of cybersecurity – preventing attacks, meeting compliance and cyber insurance requirements. He is also a director of a data migration and security services company and is co-incubating a non-emergent transport services startup.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6a1d30d0-d137-4d82-a1a7-17638049582a/Mamori.io+Layers.png</image:loc>
      <image:title>Zero Trust Data Security Blog - 6 Experts Share the #1 Cybersecurity Threat that Businesses Face in 2023 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/cost-breakdown-to-fully-cyber-secure-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1664431584503-9LZDU73EHJ1CPPZIM5M9/cost+of+cybersecurity-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Cost Breakdown to Fully Cyber Secure Your Business - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/great-news-for-small-businesses-without-a-budget-for-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/0908c44c-96b3-45ef-bebd-ce2ca907e841/free+cybersecurity+solution+small+business-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Great News for Small Businesses without a Budget for Cybersecurity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/blog/top-5-zero-trust-misconceptions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1654502728701-KN0THVJW2GFFT4WGLKEA/data+security+zero+trust+misconception-min.jpg</image:loc>
      <image:title>Zero Trust Data Security Blog - Don’t Fall for These Top 5 Misconceptions about Zero Trust - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/e3816dad-4083-49fc-9e17-172d206d2c23/Mamori.io+BKK.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/cf17a873-1f18-4b8d-9161-bd8c75ef057b/Mamori.io+Trends+2</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/27d181a3-f354-4a11-bcf4-c45d2b0e9d90/Mamori+Singapore+Business+Federation+event-min.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-01-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/035b5737-629e-4331-992e-d9d4810e5c4a/Asia_One_-_Transparent.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/94f6017f-4f3c-4aec-8e43-89ffe9d417f4/benzinga-logo-black-transparent.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f4947ac2-cae1-4bb2-bf86-2cc5fe1b4828/MarketWatch-Logo-PNG-Grayscale.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/2919c64d-7db8-4bc6-bdb0-04e695016405/newsmax+logo+png+black+white.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/4163655f-40b0-44c1-9ba0-fce2398c9681/digital-journal-logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/10fbffbd-8c73-45d6-b4de-29cc0eb2d672/associated-press-logo-black-and-white.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/ace5ade5-99da-4a81-94db-357ef57e4404/Screen+Shot+2022-03-04+at+9.07.18+am.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/54cd0ea5-d864-4553-9380-044c8c1202b9/acsc-au-asd-2-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-09-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/15d82144-7999-4a41-b3fb-74f4f6cb328e/contact-us.png</image:loc>
      <image:title>Contact - Contact us.</image:title>
      <image:caption>Contact Us.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/appointment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/eula</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/privacy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-26</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/m4ip</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/538323cf-664d-490e-a13a-b464f679c1e0/Screen+Shot+2022-03-06+at+4.39.52+pm.png</image:loc>
      <image:title>M4IP - Mamori for IP Resources - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/server</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-05-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/019a2bf2-d833-4ebe-bc91-fe5981dd9f33/unsplash-image-aOqZgLQ3hU8.jpg</image:loc>
      <image:title>Mamori Server - Using Zero Trust Security to Protect Your Data - Simple and fast to deploy</image:title>
      <image:caption>How to deploy Docker install (docker hub) No Agents No changes to servers, directories, or databases required Deploy in the cloud or on premise Self-host or let us manage a cloud service for you Click here for server requirements and installation guide How to Buy Mamori is licensed on a per-user or per-application annual subscription basis. No charges per mamori server or proxies. You are free to deploy as many as required. Businesses with under twenty staff qualify for a free license (premium support not included).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/efe0c43b-4f69-468a-908c-b60f655d2ceb/mamori-2fa.png</image:loc>
      <image:title>Mamori Server - Using Zero Trust Security to Protect Your Data</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f3987d3c-1043-49e2-8788-509e2126a452/Screen+Shot+2022-03-04+at+8.06.28+am.png</image:loc>
      <image:title>Mamori Server - Using Zero Trust Security to Protect Your Data - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1646343583273-TSMBGFJSQGYUFPYGSLPU/unsplash-image-5fNmWej4tAA.jpg</image:loc>
      <image:title>Mamori Server - Using Zero Trust Security to Protect Your Data - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/datasheets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/b44c24c3-fbc0-4d15-bf45-e51dfff64eb9/Screen+Shot+2022-03-10+at+10.14.42+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/db29ad04-d12b-4594-a3f1-4eeb5ff3c2c0/Screen+Shot+2022-03-04+at+3.09.04+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/403aadc7-57a9-417c-8d77-87722ce9f230/Screen+Shot+2022-03-04+at+3.09.22+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/e392ec7f-4071-46ea-a6ca-ff2744d75f23/Screen+Shot+2022-03-07+at+1.46.53+am.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3091ab02-f2e9-4556-a6ad-c425fb20e137/mamori_data_privacy_solution_Page_01.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/947d3f9e-c35a-4c20-9f8f-2e8d6fdc9513/Screen+Shot+2022-03-04+at+2.44.11+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1cdb9959-ff09-4171-ab71-8d5a0bcb97da/Screen+Shot+2022-03-04+at+2.49.08+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/8d50124e-c754-4a0e-bb11-8c0d82002af5/Screen+Shot+2022-03-04+at+2.55.05+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/44184091-423a-4e3e-b195-7fb98ae17672/Screen+Shot+2022-03-04+at+2.55.50+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/7bf80847-f57e-456c-983d-1f0cb2ca9de8/Screen+Shot+2022-03-04+at+2.55.18+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/810db7e9-7f71-425f-ad1a-19f8c555b138/Screen+Shot+2022-03-04+at+2.55.37+pm.png</image:loc>
      <image:title>Datasheets - Make it stand out</image:title>
      <image:caption>Click to download</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/m4app</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-08-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/0d8b3b6a-d80c-42ac-82b8-125f96bb993c/Screen+Shot+2022-03-06+at+8.51.52+pm.png</image:loc>
      <image:title>M4APP - Mamori for Applications Protection - SSO &amp; multi-factor your cloud or local applications without the need to send requests to a 3rd party cloud service</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/23a8f06b-235c-41f6-b055-eff5be8d025c/Screen+Shot+2022-03-06+at+9.14.05+pm.png</image:loc>
      <image:title>M4APP - Mamori for Applications Protection - Apply session, end-point and data privacy controls without changing code. Works with REST, SOAP and XML RPC applications and APIs</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/m4pam</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-01-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eb742e29-c63c-40e2-975b-808b44d3c846/Screen+Shot+2022-03-06+at+5.57.20+pm.png</image:loc>
      <image:title>M4PAM - Mamori Privileged Access Management (PAM) - Complement your existing PAM solution by extending controls down into database operations and data</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/bbba5095-2ea6-49e2-907a-3bf6154c1db6/Screen+Shot+2022-03-06+at+6.13.46+pm.png</image:loc>
      <image:title>M4PAM - Mamori Privileged Access Management (PAM) - Don’t have an existing PAM? M4PAM has all the controls required by security and data privacy compliance requirements</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eeecec24-2ff0-4597-a18d-e304b8877528/Screen+Shot+2022-03-06+at+8.08.10+pm.png</image:loc>
      <image:title>M4PAM - Mamori Privileged Access Management (PAM) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1aed9e98-2187-4441-ab1a-72951a712916/Screen+Shot+2022-03-06+at+8.08.22+pm.png</image:loc>
      <image:title>M4PAM - Mamori Privileged Access Management (PAM) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/ransomware-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/df6cdfef-4416-4cb2-8121-976099558f7a/remote-access.png</image:loc>
      <image:title>Ransomware Protection - Securing Access</image:title>
      <image:caption>One stolen password took down the Colonial Pipeline, and compromised remote desktop protocol connections (RDP) were the most common attack vector in Q1 of 2021 (Coveware). You need to have the same level of security for all access to file shares, databases and data, whether local or remote. Device Registration – Define which devices are allowed to access what kind of resources. Two Factor Authentication (2FA) – Secure a person’s credentials using Mamori’s built-in 2FA or by integrating with your existing 2FA providers. Access Controls by IP/Netmask – Only allow access by IP, netmask or a combination of all using Single Sign-On (SSO).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/43af6590-8f88-4b17-af0a-ece8a0693691/segmentation.png</image:loc>
      <image:title>Ransomware Protection - Micro-Segmenting Networks</image:title>
      <image:caption>Micro-segmentation involves splitting a larger network into smaller network segments, which protects against lateral movement on your network by ransomware hackers. A common practice is to segment more vulnerable networks so even when that network is compromised, other networks are protected. Segment Based on Roles – It is common to segment a network for third parties or more vulnerable parts of the network. Segment Based on Identity Workload – Networks that require more bandwidth should be segmented for faster and easier monitoring. Secure Network Connection – Access to different networks can be provisioned with configurable Open VPN and SSH tunnels.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/17d505ab-9d52-41f7-b163-3610484e744d/intrusion-detection.png</image:loc>
      <image:title>Ransomware Protection - Detecting and Blocking Intrusions</image:title>
      <image:caption>Ransomware hackers scan for open ports to scope out the target environment to find vulnerabilities. Mamori effectively detects and blocks any unauthorized access and actions and notifies relevant users of such activities. Network Access Identity – Network access can be identified as authorized or unsolicited, based on the device’s identity and permission levels. Prevent Network Scans – Unsolicited attempts of a network scan will be automatically detected and blocked. Access Notifications – Admins and owners of the compromised device and will be notified immediately of unauthorized use.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f30265ef-3ebc-4012-9e57-6cdb37a60c15/protect-data.png</image:loc>
      <image:title>Ransomware Protection - Securing Data</image:title>
      <image:caption>Even when a ransomware hacker is at the doorsteps of your data, their efforts can still be thwarted because their access is unauthorized. Mamori allows you to set controls on the data level, so access to sensitive information will be blocked or masked, rendering them useless to cybercriminals. Any unauthorized database operations will also be blocked. Control Database Operations – Restrict the ability to run SQL or database commands based on level of access or preset table rules. Masking &amp; Obfuscating Data – Sensitive data can be masked, making them little to no value to unauthorized access.  Control Tables, Rows &amp; Columns – Limit access to each database tables with multiple rules, including what rows and columns they have access to.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f3987d3c-1043-49e2-8788-509e2126a452/Screen+Shot+2022-03-04+at+8.06.28+am.png</image:loc>
      <image:title>Ransomware Protection - Monitoring, Alerting and Recording</image:title>
      <image:caption>Ransomware hackers need time to scope out and carry out their attacks. With Mamori’s monitoring, alerting and recording, any attack attempt can be easily identified and recorded by activity monitoring, with the users and admins notified of such activity.  Monitor Connections &amp; Activity – Database connection sessions and their activities are monitored for anomalies. Instant Alerts on Activities – Define the types of activities you want to be notified. Session Recording – Direct database accesses and sessions are automatically recorded.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/db-pam-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1646266625312-DAB9XE5P4NBQOXDK7LFT/hexagons-m4-pam.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/52f538f2-d1fd-435f-a193-bce321de3c91/without+mamori+db+pam-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/131bd97b-28a0-4c53-9516-1d320ad1bbc9/with+mamori+db+pam-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/77bde4c2-0260-40cb-879e-c6b6f53e5e99/Screen+Shot+2022-03-06+at+6.10.08+pm.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/bbf63060-acbb-47ed-be44-5e8ad886761d/db-access.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f30265ef-3ebc-4012-9e57-6cdb37a60c15/protect-data.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/8256fbcb-7052-42d5-b2ae-9e5004d4a803/working+with+existing+pam+jumpbox+direct-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/71007cb1-cfc6-4f45-b6ea-481b8666eac7/mamori+databasses+secured-min.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/ztna-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/95fe5112-0ed9-46f5-8857-4618c87f4359/device-registry.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/cfc6e4eb-bb25-4f92-b63e-704bd9dfdbe6/zero+trust+image-min.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/privacy-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/bbf63060-acbb-47ed-be44-5e8ad886761d/db-access.png</image:loc>
      <image:title>Data Privacy Compliance - Secure Access to Sensitive Data</image:title>
      <image:caption>Access should be granted only to those who need sensitive data to perform their job function. Their access connection should be secure to safeguard the data. Role-based Least-Privileged Access – Define what roles, groups or individuals have access to sensitive data required to do their job. Secure All Access using Zero Trust – Control how internal or external third parties access your data. Mamori secures all connections using a zero-trust network access approach. Micro Segmenting Network – Create another layer of network access that can be connected using configurable VPN or an SSH tunnel. Access Controls by IP/Netmask – Only allow access by IP, netmask or a combination of all using Single Sign-On (SSO).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f30265ef-3ebc-4012-9e57-6cdb37a60c15/protect-data.png</image:loc>
      <image:title>Data Privacy Compliance - Secure Data Visibility and Operations</image:title>
      <image:caption>Even when people have access to sensitive data, there should be limits to what they see and what they can do with those data. Data Encryption – All data are encrypted in motion or at rest. Access Controls by Tables, Columns or Rows – Control who has access to certain tables, and further defining what rows or columns they can use or operate on. Access Control by Operation Type – Allow or block the ability to run executable operations or SQL commands, or restrict by specific types of command. Mask Data without Code Changes – Sensitive data can be displayed but masked and obfuscated to protect personal, sensitive data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f3987d3c-1043-49e2-8788-509e2126a452/Screen+Shot+2022-03-04+at+8.06.28+am.png</image:loc>
      <image:title>Data Privacy Compliance - Monitor, Alert and Recording for Audit Reports</image:title>
      <image:caption>All sensitive data should be protected from breaches, and the data lifecycle should be logged in auditable reports.  Detect &amp; Block Intrusions – Even when your network is penetrated, such as by a ransomware attack, Mamori can block further actions, and relevant users will be notified immediately. Logs &amp; Reports – From login, request, approval, and data processing, the full lifecycle of the workflow is logged. Session Recording – Privileged sessions and their actions are recorded, including database SQL sessions. Session Monitoring – Monitors real-time access, session changes and what is accessed, also includes Database Activity Monitoring (DAM).</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/0908c44c-96b3-45ef-bebd-ce2ca907e841/free+cybersecurity+solution+small+business-min.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/17d505ab-9d52-41f7-b163-3610484e744d/intrusion-detection.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f30265ef-3ebc-4012-9e57-6cdb37a60c15/protect-data.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/95fe5112-0ed9-46f5-8857-4618c87f4359/device-registry.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/thank-you</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-09-06</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/contact-us-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-09-06</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/freemium-request-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-09-06</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/evolve</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/8be34005-8242-42d3-9989-463a61af9ed3/16467416011644336495logo-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/m4mcs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
      <image:title>M4MCS - Managed Cybersecurity Services - A Comprehensive Solution with Advanced Features</image:title>
      <image:caption>Many cybersecurity services only provide basic solutions, such as endpoint security, email spam and malware protection. Those solutions are a good start, but they rely on a database of known attacks and cannot protect you from new attacks or more seasoned hackers. M4CS provides advanced functionalities only available to businesses with large budgets. These advanced functionalities include Zero Trust Network Access (ZTNA), two factor authentication (2FA), intrusion detection, privileged access management (PAM), SQL firewall, and more – effectively creating multiple layers of defense that fortifies your business against new and sophisticated attacks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1664431584503-9LZDU73EHJ1CPPZIM5M9/cost+of+cybersecurity-min.jpg</image:loc>
      <image:title>M4MCS - Managed Cybersecurity Services - Significant Cost Savings</image:title>
      <image:caption>Cybersecurity is complex and costly. It typically costs $2,577 - $18,088 annually per user and $18,368 - $47,312 annually per server. (See cybersecurity cost breakdown) In addition, it costs around $100,000 annually to hire an in-house cybersecurity expert to plan, implement, manage and monitor your security perimeters. M4CS is only a fraction of the cost mentioned above. We provide the most advanced functionalities, which translates to significant cost savings for you. Not only do we manage and monitor everything for you, we also provide you with the technical expertise so you invest more into your core business instead of into cybersecurity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/de4dfe5f-728d-42f5-95d0-ef3b01d7c427/tech+team+working+mamori.io.jpg</image:loc>
      <image:title>M4MCS - Managed Cybersecurity Services - Access to Enterprise-Level Expert Experience</image:title>
      <image:caption>Our team of cybersecurity experts all have experience dealing with cybersecurity in enterprises, including Dell, Quest Software, Hewlett Packard, and more. From developing strategy to managing incident response and mitigation strategies, our talent can bring strategic and operational leadership to those who needs the expertise but can’t afford or don’t need a full-time resource.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/c821b54f-1a45-4ca1-86d9-e0d95a8f5891/server+hd+image.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/094f605b-2b53-414b-8cbe-b968a6a2e72f/server+room.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3619e986-a8bd-4d32-901b-eec0bfec74c9/Michael+Coffman+headshot.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/be256e42-1294-43e1-a197-9f07c2b875ab/OneSearch+Inc+Logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/21b94aaf-81b3-4528-be39-dc67cbe48d36/SherpApps.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/6dc1cb8d-4f7e-4e38-a55d-bdc92aff393a/GSI+logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eb8554af-5adb-4042-8fb4-07daf0957616/Business+Visuals+Logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/10572060-bb9b-4939-88c8-daf4032c2341/Logo_OneSearch+Incorporated.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/964fa5a3-6b8e-4b30-a476-e5e3c0127f49/logo-softit.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/become-partner</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/about-omar-masri</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/fb94b736-f4f6-4a49-ab57-752e124a80f4/Omar+Masri-min.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-pam-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/77bde4c2-0260-40cb-879e-c6b6f53e5e99/Screen+Shot+2022-03-06+at+6.10.08+pm.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/bbf63060-acbb-47ed-be44-5e8ad886761d/db-access.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1673426535311-QF3XGLOVVO091B0U9E86/PAM+Cybersecurity+privileged+access+strengths+flaws-min.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/zero-trust-network-access-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/95fe5112-0ed9-46f5-8857-4618c87f4359/device-registry.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 1. Securing Devices</image:title>
      <image:caption>The first step is to secure all devices using device registry. Mamori allows you to manage and monitor all devices that are able to access your organization’s resources. Devices that can be secured include: Desktops and Laptops Mobile devices Internet of Things (IoT) Servers and Databases</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/efe0c43b-4f69-468a-908c-b60f655d2ceb/mamori-2fa.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 2. Securing Access by Identity &amp; 2FA</image:title>
      <image:caption>In addition to securing devices, the users accessing the devices should also be secure using two factor authentication (2FA). The approach is to always verify the access to ensure the right person is behind the right device. The types of access that can be secured include: Secure Shell (SSH) Remote Desktop Protocol (RDP) Direct Database Access IP Address</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/43af6590-8f88-4b17-af0a-ece8a0693691/segmentation.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 3. Micro-Segmenting Networks</image:title>
      <image:caption>Micro-segmentation splits a larger network into smaller network segments, which protects against lateral movement on your network by ransomware hackers. A common practice is to segment vulnerable networks or networks for third parties. With Mamori, networks can be further segmented based on: Identity workload Role-based workload</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/3ccc08fb-8a94-4ed7-ab5b-f6bf3481b221/least-privilege.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 4. Implement Least Privileged Access</image:title>
      <image:caption>To implement least privilege, legacy security systems require you to select what access and resource to block, which is complex and difficult to manage. A zero-trust approach blocks everything and grants access based on the person’s identity or role, which is a simpler and more secure approach. Mamori allows you to define access rules such as: Identity &amp; role-based access On-demand, as needed access Database, data &amp; application access Data operation controls</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/17d505ab-9d52-41f7-b163-3610484e744d/intrusion-detection.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 5. Detecting and Blocking Intrusions</image:title>
      <image:caption>Every access and activity on the network should be identified and verified. Any unidentified network access, such as those by ransomware hackers, will be immediately identified. Their subsequent action, which is to scan the network to scope the environment, will be blocked, and relevant users will be notified. Mamori’s network intrusion detection features include: Network access identity verification Automatically block unsolicited network scans Notifications for compromised access and activities</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f3987d3c-1043-49e2-8788-509e2126a452/Screen+Shot+2022-03-04+at+8.06.28+am.png</image:loc>
      <image:title>Zero Trust Network Access Solution - 6. Monitor, Alert and Recording for Audit Reports</image:title>
      <image:caption>Any security solution is incomplete without analytics, logs and reporting. With Mamori, the entire lifecycle of any access session is logged and recorded. This includes who access the data, from what device, and what operations were completed in that session. Security Analytics and Reports Logs &amp; Reports for each access Recording &amp; monitoring for each access Session and activities monitoring &amp; Alerts</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-ztna-request-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/free-pam-request-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/case-studies</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/ce88ca09-3419-4311-a194-82048c154721/SG+Pools+Case+Study_Page_1-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/8ee2ecff-bbb7-4436-80ff-194e8f973e4d/MMR+Use+Case+-+Telecomm_Img+1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/f19b8044-e39d-4361-866e-5b309269f32e/MMR+Case+Study+-+Gov+Data+Lake-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/cb05fc67-cd25-4de4-bf63-320806d2b4e0/MMR+Case+Study+-+CII-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/884bb4fa-b122-4352-8adf-54decec3d8c4/MMR+Use+Case+-+Manufacturers_Img+1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/12f8ee08-f3d2-4f1a-8d69-a2c9f2c7465e/MMR+Use+Case+-+DBA_Page_1-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/897ad100-681f-4dc4-abaf-0ba1d39451aa/MMR+Case+Study+-+Hospital+Integrated+DB-min.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/m4dbpam</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eb742e29-c63c-40e2-975b-808b44d3c846/Screen+Shot+2022-03-06+at+5.57.20+pm.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/bbba5095-2ea6-49e2-907a-3bf6154c1db6/Screen+Shot+2022-03-06+at+6.13.46+pm.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eeecec24-2ff0-4597-a18d-e304b8877528/Screen+Shot+2022-03-06+at+8.08.10+pm.png</image:loc>
      <image:title>M4DBPAM - Database Privileged Access Module - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-intrusion-detection-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/91136e40-979b-4258-a018-0737a8109a54/Picture2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/95fe5112-0ed9-46f5-8857-4618c87f4359/device-registry.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/5ec8e6af-e0d9-4346-8a60-5e381766d111/business+process+automation+iso+27001+mamori.io-min.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-intrusion-detection-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-19</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/white-papers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eed8ec6f-79e0-4bf3-ae91-484172e38832/Mamori+-+Free+Cybersecurity+for+Small+Business+FTC-min.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/68d58f0d-aeac-4453-b61a-be0b06eb7e57/mamori+-+PAM+gives+a+DAM+-min.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/white-paper-achieve-cyber-resilience</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/eed8ec6f-79e0-4bf3-ae91-484172e38832/Mamori+-+Free+Cybersecurity+for+Small+Business+FTC-min.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/white-paper-pam-give-a-dam</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/68d58f0d-aeac-4453-b61a-be0b06eb7e57/mamori+-+PAM+gives+a+DAM+-min.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-database-security-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1170e2e7-7534-4595-8af1-0dd566675c50/protect-data.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/74aad84e-d677-4af5-aef9-81978a1f636b/database-security.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-db-security-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-26</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/free-dam-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/e6aad11e-3c24-48b4-b992-4e522a398180/Connection+Log-min.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/a846fbde-15ed-47a4-bb5a-214dd43fbff6/Query+session+log-min.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1172054e-f046-40f4-a57e-2b1627f3310b/Query+access+log+%28detail%29-min.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/879cdf09-1918-4b6c-a864-63a73a48c11e/DB+PAM+Mamori.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-dam-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-26</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/free-zero-trust-solution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/95fe5112-0ed9-46f5-8857-4618c87f4359/device-registry.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1170e2e7-7534-4595-8af1-0dd566675c50/protect-data.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/038f6ab0-87aa-4fec-880b-5a5902a00cb0/zero-trust-image.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/free-zero-trust-architecture-request-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/partners-deal-registration</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/freemium-customer-support</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/ccop-compliance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1772969044086-F2WAQXEVLZ51KLMVGGYH/unsplash-image-vdBE638sszE.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1772969288698-GQKNAB14M4EB25RJ8UTJ/unsplash-image-rIymmvOq3P8.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1772969074684-HJX7RAF0KHHRG626Y6Q1/unsplash-image-hyPt63Df3Dw.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/1772969322036-STUCBRJKT453S2F6R7BK/unsplash-image-yETqkLnhsUI.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6215be0e0704501833d0c76d/515e2051-bf77-40f9-b192-c72cbf3c6356/all-in-one-merge.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.mamori.io/videos</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-03-10</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/2fa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-19</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/videos-m4ip</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/videos-m4pam</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/videos-mserver</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-10</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/m4pam-web-secure-access-to-desktop-applications-vdi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/m4pam-audited-access-to-internal-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-03-01</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/m4dbpam-database-data-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/m4pam-lite-web-access-to-ssh-rdp-and-sqlnosql-sessions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-29</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/access-ondemand</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/block-ransomware-scans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.mamori.io/videos/v/2fa-resource-access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-20</lastmod>
  </url>
</urlset>

