<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.defensx.com/blog/techzone360-editorial-feature-by-matt-vulpis/</loc>
<lastmod>2022-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/as-the-number-of-devices-used-continues-to-grow-in-a-work-from-everywhere-world-zero-trust-security-solutions-matter-more-than-ever/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/assembling-experts-passionate-about-cybersecurity-and-innovation/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/behind-the-scenes-isoolate-s-journey-to-our-new-brand-name-defensx/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/blog-addressing-new-mobile-threats-with-client-side-browser-isolation-solutions/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/browser-isolation-the-solution-to-persistent-threats-and-browser-vulnerabilities/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/defensx-is-honored-to-bring-cybersecurity-solutions-to-market-with-connx/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/endpoint-protection/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/growing-collaboration-among-criminal-groups-heightens-ransomware-threat-for-healthcare-sector/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/how-remote-web-mobile-browser-isolation-technologies-enhance-the-sase-model-and-future-of-enterprise-security/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/learn-how-to-reduce-risk-and-improve-productivity-with-defensx-s-advanced-threat-isolation-software/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/mobile-devices-at-work-the-attack-surface-expands-as-remote-workers-grow/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/what-is-remote-browser-isolation/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/zero-trust-from-defensx-web-protection-for-the-modern-workforce/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/risky-emails/</loc>
<lastmod>2022-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/for-small-companies-with-big-ambitions-securing-the-internet-is-the-key/</loc>
<lastmod>2022-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/the-answer-to-adversary-in-the-middle-attacks-our-common-sense-solution-stopping-web-borne-threats-at-the-edge/</loc>
<lastmod>2022-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/managed-service-providers-continue-to-step-up-to-help-their-customers-stay-protected-and-prosperous/</loc>
<lastmod>2022-09-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/an-exciting-finish-to-a-big-year-for-defensx/</loc>
<lastmod>2022-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/with-customers-and-partners-in-three-of-the-world-s-largest-business-regions-defensx-welcomes-an-exciting-new-year/</loc>
<lastmod>2023-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/defensx-continues-to-expand-as-we-welcome-exertis-mena-as-a-major-distribution-partner/</loc>
<lastmod>2023-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/a-great-day-for-our-customers-channel-partners-and-company/</loc>
<lastmod>2023-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/automatically-block-web-threats-using-advanced-threat-isolation-technologies/</loc>
<lastmod>2023-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/another-great-day-along-the-way-we-are-proud-to-join-the-invest101-family/</loc>
<lastmod>2023-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/stop-adware-at-the-gate-secure-browsing-prevents-attacks-and-protects-productivity/</loc>
<lastmod>2023-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/as-exponentially-more-employees-work-from-anywhere-traditional-approaches-require-hardening-at-the-edge-with-every-endpoint-secured/</loc>
<lastmod>2023-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/preventing-data-loss/</loc>
<lastmod>2025-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/content-based-filtering/</loc>
<lastmod>2025-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/credential-theft/</loc>
<lastmod>2025-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/what-is-dns-security/</loc>
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/the-ai-revolutions-achilles-heel-browser/</loc>
<lastmod>2025-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/the-ai-revolutions-achilles-heel-browser/</loc>
<lastmod>2025-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/why-its-time-to-move-beyond-vpn-the-shift-to-ztna/</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/blog/phishing-can-be-effectively-prevented-only-with-multiple-layer-of-defense/</loc>
<lastmod>2026-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.defensx.com/news/10-000-attacks-reported-by-microsoft-shows-importance-of-dns-security/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/a-great-day-for-our-customers-channel-partners-and-company/</loc>
</url>
<url>
<loc>https://www.defensx.com/white-papers/addressing-new-mobile-threats-with-client-side-browser-isolation-solutions/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/addressing-one-of-the-fastest-growing-threats-in-the-work-from-anywhere-age-revo-capital-funds-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/ai-data-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/ai-data-protection2/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/an-exciting-finish-to-a-big-year-for-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/announcing-new-ztna-solution-zero-trust-network-access-replacing-vpn-and-thin-client/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/another-great-day-along-the-way-we-are-proud-to-join-the-invest101-family/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/as-attacks-grow-lifecell-launches-cyber-security-solution-in-ukraine/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/as-attacks-on-browsers-escalate-lifecell-and-defensx-partner-to-address-growing-threat/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/as-cyber-attacks-on-manufacturers-rise-defensx-announces-new-financing-from-revo-capital/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/as-exponentially-more-employees-work-from-anywhere-traditional-approaches-require-hardening-at-the-edge-with-every-endpoint-secured/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/as-microsoft-reports-10-000-mfa-breaches-security-solution-providers-step-up/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/as-the-internet-continues-to-expand-exponentially-so-do-web-borne-cyber-attacks-in-asia/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/as-the-number-of-devices-used-continues-to-grow-in-a-work-from-everywhere-world-zero-trust-security-solutions-matter-more-than-ever/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/assembling-experts-passionate-about-cybersecurity-and-innovation/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/automatically-block-web-threats-using-advanced-threat-isolation-technologies/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/behind-the-scenes-isoolate-s-journey-to-our-new-brand-name-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/beyond-amsterdam/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/blog-addressing-new-mobile-threats-with-client-side-browser-isolation-solutions/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/browser-data-loss-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/browser-data-loss-protection2/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/browser-isolation-the-solution-to-persistent-threats-and-browser-vulnerabilities/</loc>
</url>
<url>
<loc>https://www.defensx.com/buyers-guide/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/cloud-first-cybersecurity-company-receives-investment-to-scale-up-zero-trust-solution-globally/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/</loc>
</url>
<url>
<loc>https://www.defensx.com/compliance-policy/</loc>
</url>
<url>
<loc>https://www.defensx.com/contact-us/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/content-based-filtering/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/cracking-down-on-the-rising-tide-of-web-borne-threats-with-a-secure-browser/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/credential-theft/</loc>
</url>
<url>
<loc>https://www.defensx.com/data-privacy-regulations/</loc>
</url>
<url>
<loc>https://www.defensx.com/datasheets/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-and-connx-partner-to-protect-users-working-anywhere-over-any-network-and-on-any-device/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-and-lifecell-partner-to-protect-ukrainians-from-cyber-attacks/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-and-sms-global-technologies-launch-partnership-to-protect-users-from-growing-cyber-attacks-anywhere-on-any-network-and-on-any-device/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-and-ukranes-lifecell-protect-subscribers-from-web-born-browser-based-attacks/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-announces-additional-financing-to-address-rising-social-engineering-threats/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-announces-distributor-deal-with-spikeit-to-offer-cyber-security-bundle-in-europe-and-middle-east/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-announces-first-customer-in-asia-queby-recovery-management-sdn.-bhd/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-appoints-al-onove-as-chief-revenue-officer-martina-aufiero-as-chief-financial-officer-selcan-taskiran-as-chief-marketing-officer-and-mary-ivaliotis-as-chief-customer-officer/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-closes-funding-round-led-by-revo/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/defensx-continues-to-expand-as-we-welcome-exertis-mena-as-a-major-distribution-partner/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-founder-ceo-halis-osman-erkan-interviewed-by-arti-loftus-for-techzone360/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-honored-with-pax8-global-innovation-award-at-beyond-2025/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/defensx-is-honored-to-bring-cybersecurity-solutions-to-market-with-connx/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-joins-comptia-as-part-of-north-american-expansion-program/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-names-david-arthur-walsh-chairman/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-secure-browser-adds-support-for-openai-atlas-delivering-zero-trust-protection-and-ai-safety-at-scale/</loc>
</url>
<url>
<loc>https://www.defensx.com/defensx-secure-browser/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-teams-up-with-exertis-mena-announcing-regional-distribution-agreement/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/defensx-to-demonstrate-msp-success-stories-with-cyber-risk-visibility-for-smb-s-with-its-secure-browser-at-pax8-s-beyond-event-in-denver/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/defensx-to-exhibit-at-msp-expo-and-future-of-work-expo-2022-part-of-the-techsupershow/</loc>
</url>
<url>
<loc>https://www.defensx.com/distributors/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/end-point-web-security-leader-isoolate-expands-offering-and-emerges-as-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/endpoint-installation-success/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/endpoint-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/endpoint-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/enterprise-buyer-s-guide/</loc>
</url>
<url>
<loc>https://www.defensx.com/events/</loc>
</url>
<url>
<loc>https://www.defensx.com/features-buyer-s-guide/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/for-mobile-operators-and-mvnos-cyber-security-services-add-new-revenues-while-addressing-growing-browser-based-threats/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/for-small-companies-with-big-ambitions-securing-the-internet-is-the-key/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/growing-collaboration-among-criminal-groups-heightens-ransomware-threat-for-healthcare-sector/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/how-remote-web-mobile-browser-isolation-technologies-enhance-the-sase-model-and-future-of-enterprise-security/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/human-risk-management/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/human-risk-management2/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/in-a-mobile-cloud-first-world-social-engineering-threats-are-growing-and-investors-are-taking-notice/</loc>
</url>
<url>
<loc>https://www.defensx.com/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/invest-101-venture-capital-investment-fund-invests-in-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/invest101-and-defensx-announce-growth-funding-to-accelerate-commercialization-of-social-engineering-cyber-security-threats/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/learn-how-to-reduce-risk-and-improve-productivity-with-defensx-s-advanced-threat-isolation-software/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/managed-service-providers-continue-to-step-up-to-help-their-customers-stay-protected-and-prosperous/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/massive-increase-in-cyber-crime-sends-businesses-racing-to-protect-assets/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/mobile-devices-at-work-the-attack-surface-expands-as-remote-workers-grow/</loc>
</url>
<url>
<loc>https://www.defensx.com/download-buyer-s-guide/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/novel-social-engineering-attacks-exploding-in-growth-new-report-from-darktrace/</loc>
</url>
<url>
<loc>https://www.defensx.com/white-papers/operationalize-australian-ai-policy/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/pax8-and-defensx-announce-new-partnership-to-provide-msps-zero-trust-endpoint-security-capabilities-for-all-devices/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/phishing-and-other-web-borne-threats-pose-serious-risk-in-2023/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/phishing-resistant-web-browser/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/phishing-resistant-web-browser2/</loc>
</url>
<url>
<loc>https://www.defensx.com/press/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/preventing-data-loss/</loc>
</url>
<url>
<loc>https://www.defensx.com/product/</loc>
</url>
<url>
<loc>https://www.defensx.com/testimonials/quality-assistance-testimonial/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/remote-browser-isolation/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/remote-browser-isolation2/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/remote-work-continues-to-prevail-but-when-browses-are-left-unprotected-attacks-increase/</loc>
</url>
<url>
<loc>https://www.defensx.com/resources/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/risky-emails/</loc>
</url>
<url>
<loc>https://www.defensx.com/use-case/saas-access-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/secure-cloud-and-saas-access/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/secure-cloud-and-saas-access2/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/securing-every-endpoint-has-become-vitally-important-for-every-business-small-or-large/</loc>
</url>
<url>
<loc>https://www.defensx.com/security-for-enterprises/</loc>
</url>
<url>
<loc>https://www.defensx.com/security-for-msps/</loc>
</url>
<url>
<loc>https://www.defensx.com/soc2-type1/</loc>
</url>
<url>
<loc>https://www.defensx.com/use-case/social-engineering-protection/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/stop-adware-at-the-gate-secure-browsing-prevents-attacks-and-protects-productivity/</loc>
</url>
<url>
<loc>https://www.defensx.com/white-papers/stop-session-theft-and-aitm-browser-security/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/tackling-a-top-cybersecurity-threat-against-distributed-workforces/</loc>
</url>
<url>
<loc>https://www.defensx.com/team/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/techzone360-editorial-feature-by-matt-vulpis/</loc>
</url>
<url>
<loc>https://www.defensx.com/terms-conditions/</loc>
</url>
<url>
<loc>https://www.defensx.com/testimonials/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/the-answer-to-adversary-in-the-middle-attacks-our-common-sense-solution-stopping-web-borne-threats-at-the-edge/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/titanium-taps-defensx-for-zero-trust-secure-browser-advanced-dns-filtering-and-protection-against-social-engineering-attacks/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/twilio-cyber-attack-social-engineering-is-real-and-really-dangerous/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/vpn-friendly-dns-security/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/vpn-friendly-dns-security2/</loc>
</url>
<url>
<loc>https://www.defensx.com/watch-the-demo/</loc>
</url>
<url>
<loc>https://www.defensx.com/use-case/web-dns-protection-use-case/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/what-is-dns-security/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/what-is-remote-browser-isolation/</loc>
</url>
<url>
<loc>https://www.defensx.com/whitepapers/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/why-empowering-end-users-may-be-the-new-cyber-security-killer-app/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-anyconnect-vpn-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-forticlient-vpn-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-globalprotect-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-perimeter-81-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-sophos-connect-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-are-switching-from-zscaler-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-should-switch-from-openvpn-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-should-switch-from-pulse-secure-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/comparison-datasheets/why-msps-should-switch-from-sonicwall-netextender-to-defensx/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/with-customers-and-partners-in-three-of-the-world-s-largest-business-regions-defensx-welcomes-an-exciting-new-year/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/with-more-sophisticated-and-pervasive-attacks-on-mobile-devices-enterprises-turn-to-mobile-web-browser-isolation-advances/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/you-are-not-losing-security-at-the-firewall-you-are-losing-it-in-the-browser/</loc>
</url>
<url>
<loc>https://www.defensx.com/news/you-may-be-surprised-how-quickly-msps-can-deploy-cloud-security-for-every-endpoint/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/zero-trust-from-defensx-web-protection-for-the-modern-workforce/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/zero-trust-remote-access/</loc>
</url>
<url>
<loc>https://www.defensx.com/solutions/zero-trust-remote-access2/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/zero-trust-secure-web-browser-for-msps/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/2/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/3/</loc>
</url>
<url>
<loc>https://www.defensx.com/blog/4/</loc>
</url>
</urlset>
