<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<!--
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
-->
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://securolytics.io/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iot-security-products/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/pricing/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/blog/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/company/about-us/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/company/events/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/free-tools/exploitable-port-scanner/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/counter-attack/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/partners/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/partners/channel-partners/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/partners/technology-partners/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/partners/become-a-partner/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iotmini/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/wp-content/uploads/2021/03/Sample-Threat-Report-Version-B.pdf</loc>
  <lastmod>2021-03-17T15:07:19+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/unmanaged-devices-6-reasons-you-should-care-if-theyre-on-your-network/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iot-security-and-it-year-in-review-2020/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iot-ransomware-growing-threat-to-unmanaged-devices/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/6-most-common-security-threats-for-medical-and-iot-devices/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/amnesia33-new-iot-security-flaws-affect-millions/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/productsold/iot-firewall/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/productsold/office-365-security/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/productsold/log-management/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/free-tools/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/company/privacy-policy/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/medigate-armis-zingbox-ordr-why-choose-securolytics/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/beyond-nmap-port-scanner-better-detail-without-device-interference/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/ransomware-attacks-and-unmanaged-medical-devices/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/5-critical-steps-for-effective-iot-security/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/blog/2/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/case-studies/top-us-hospital-protects-connected-medical-devices/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/case-studies/mining-company-secures-industrial-iot/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/iot-management-access-control/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/case-studies/st-anns-community-hospital-safeguards-phi/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/enhanced-anti-spam-for-office-365/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/enhanced-archiving-for-office-365/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/enhanced-data-loss-prevention-for-office-365/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/enhanced-email-encryption-for-office-365/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/single-sign-on-for-office-365/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/social-media-archiving/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/enterprise-web-filtering/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/resources/data-sheets/log-storage/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/medical-device-security-perception-vs-reality-in-shadow-it/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iot-growth-security-control/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/industrial-control-systems-ghosts-in-the-healthcare-machine/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/iot-cybersecurity-improvement-act/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>
<url>
  <loc>https://securolytics.io/blog/3/</loc>
  <lastmod>2021-08-05T18:11:33+00:00</lastmod>
</url>


</urlset>
