<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.firmguardian.com/home-page</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-06-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1707079535399-XIN3MCH3VK9231KI5O5C/AdobeStock_716543264.jpeg</image:loc>
      <image:title>Home - Protect Your Business</image:title>
      <image:caption>FirmGuardian Today's cyber criminals pose a major threat to businesses of all sizes. Protecting yourself against them requires a persistent and proactive cybersecurity approach. FirmGuardian's goal is to provide the peace of mind that your business is protected, allowing you to focus on serving your clients and customers. About Us</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1707079856633-TBB94G7Z89Z0RYUMTU5I/AdobeStock_616079978.jpeg</image:loc>
      <image:title>Home - Managed Detection and Response</image:title>
      <image:caption>Managed Security Our comprehensive MDR takes a multi-faceted approach that protects your corporate network, cloud infrastructure, and email environments. We pride ourselves in incorporating our expertise from working in large enterprise environments and scaling them down to meet the needs of organizations of any size. Find out how</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1707079741319-6848QBF189GS8E5FOCS9/AdobeStock_704959035.jpeg</image:loc>
      <image:title>Home - Insights into Cybersecurity</image:title>
      <image:caption>Insights into Cybersecurity Information is a critical component in understanding how to address today and tomorrow’s cybersecurity challenges. Our Information Security Blog was created to help organizations cut through the digital noise, and make informed decisions and materially reduce risk to their business. Learn More</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/our-services-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1750299528391-EIXO3FE0F7S70VB3DBY4/slider2.jpg</image:loc>
      <image:title>Our Services - Brand Protection</image:title>
      <image:caption>Digital brand protection services help businesses monitor, detect, and take down unauthorized or fraudulent use of their brand online to safeguard reputation, revenue, and customer trust.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1750299528391-EIXO3FE0F7S70VB3DBY4/slider2.jpg</image:loc>
      <image:title>Our Services - Brand Protection</image:title>
      <image:caption>Digital brand protection services help businesses monitor, detect, and take down unauthorized or fraudulent use of their brand online to safeguard reputation, revenue, and customer trust.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1593011806165-WLOR63ZCXOCQKE1DMK0D/image-asset.png</image:loc>
      <image:title>Our Services - Managed Detection and Response</image:title>
      <image:caption>Our Managed Security Services protect Microsoft 365, Google Workspace, Endpoint Computers, and Network Infrastructure from cyber attack.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1645063540273-N83PPCI7SBJC6NYFH18X/slider5.png</image:loc>
      <image:title>Our Services - Threat Detection &amp; Response</image:title>
      <image:caption>Threat detection and response services identify, investigate, and mitigate cyber threats in real time to minimize damage and ensure swift recovery.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1593011784642-7VSH9R86TLJQ65NEB4NQ/slider5.png</image:loc>
      <image:title>Our Services - Intelligence Library</image:title>
      <image:caption>Selecting effective cyber security solutions starts with an informed understanding of the risk landscape in today’s business world.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/image-storage</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1559171279751-8BIN3NQKMGXI55R37UGI/Virus.png</image:loc>
      <image:title>New Gallery</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1559171279751-8BIN3NQKMGXI55R37UGI/Virus.png</image:loc>
      <image:title>New Gallery</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1590615001755-EQFEQO238XSJUPH75KQY/security-account.png</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1590615207751-UMYH4XUAORFPCJ05BC8M/FG_Background_image_VERT_LIGHTBLUE.png</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1594228115308-7UE2SVMZ7VLLBUUFA37L/FG_ServicesOverview_FINAL_COVER.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1594924988406-X5LDO2KT9HHPX4L0DJW2/FG_RiskManagement.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1594925533478-2SB8E8C4YMWLVDLEZK5K/FG_SecurityAwareness.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595452785499-697DRLL9UYIDR10VVZ9W/FG_VulnerabilityAssessments-1.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1599770742944-REEHHYZARGJ2XV83PKKW/Phishing_Header.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1607544767282-C66J4LSEEX9VU4KK9SCX/FG_CybersecurityInHealthcare.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1608244931924-4FRDRN8JJDQN1MD7SFUP/FG_SOCasaService.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1608250761277-JQK04ZRHNEXENHUHO09U/FG_RiskManagement.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611168436142-XPXCIZC4ZOL282AZXOQM/FG_Partners_NEW.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1614193203188-8F9Y5SGDSELWUS7W437L/AdobeStock_334250792_FINAL.jpg</image:loc>
      <image:title>New Gallery</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/6/17/why-having-an-incident-response-plan-is-crucial</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/6/17/what-spfdkimdmarc-are-and-how-they-prevent-hackers-from-spoofing-your-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-17</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/5/29/why-you-need-a-phishing-awareness-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-29</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/5/22/patch-management-value-amp-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-22</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/5/15/the-importance-of-edr-tooling-for-effective-incident-remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/advantages-of-mmsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/swiss-cheese-model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/30708636-278c-4647-807c-42caac1b31aa/Swiss_Cheese_Model.jpg</image:loc>
      <image:title>Blog - The swiss cheese model of security and why its important to have multiple layers of security - Make it stand out</image:title>
      <image:caption>The Swiss Cheese Model of cybersecurity accounts for cyber threat dynamism by providing an adaptive defense strategy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/product-security-corporate-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/incident-response-planning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/separating-it-and-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2024/2/4/why-is-the-use-of-just-traditional-antivirus-and-cybersecurity-insurance-no-longer-effective-in-battling-cyber-threats-to-a-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1f74ed4a-c20b-4860-9a70-51a497d774fc/AdobeStock_623427305.jpeg</image:loc>
      <image:title>Blog - Why is the use of just traditional antivirus and cybersecurity insurance no longer effective in battling cyber threats to a business? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/3/24/cybersecurity-services-for-law-firms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1585097904620-919IPRR5KZC4UXC8GHG9/Cybersecurity-Law.jpg</image:loc>
      <image:title>Blog - Cybersecurity Services for Law Firms</image:title>
      <image:caption>The growing volume and sophistication of cyber attacks are making it difficult for law firms and their IT departments to devote the time and attention needed to counter these threats.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/12/9/cybersecurity-in-healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-12-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1607545545277-ETP9SEIC2NZWZUR92RL1/FG_CybersecurityInHealthcare.jpg</image:loc>
      <image:title>Blog - Cybersecurity in Healthcare</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/7/16/firmguardian-risk-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-04-15</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/4/13/understanding-data-breach-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586890280110-721SDOP3RHQR4E6TWGIV/CostofBreach_Chart_NEW.jpg</image:loc>
      <image:title>Blog - Understanding Data Breach Risk</image:title>
      <image:caption>Industries such as healthcare and financial organizations have a per record data breach cost substantially higher than the overall mean of $150. Public sector, research, retail and hospitality have a per record cost well under the overall mean value. It is important to note that the highest per record cost of $429 is experienced by healthcare organizations. A reason for the much higher cost is the fact that all healthcare companies in this study are located in the United States, which has the highest per record cost. In other countries, healthcare is classified as a public sector organization.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/4/14/an-antivirus-evolution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586898492280-FX80XO50XSWG4GC4ZZQM/EDR.jpg</image:loc>
      <image:title>Blog - An Antivirus Evolution</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/4/14/identifying-and-addressing-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1590592503971-MXMHUJFIZFF8V8KG0XS4/EndpointVulnerabilitiesSampleChart.jpg</image:loc>
      <image:title>Blog - Identifying and Addressing Risk</image:title>
      <image:caption>Above is an example of a vulnerability report generated by FirmGuardian’s risk management team.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/3/24/risk-assessment-process</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-03</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2020/3/19/cybersecurity-in-the-insurance-industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1584649939215-A264GN2SXTWQMOYG1Q2E/Cybersecurity-Threat.jpg</image:loc>
      <image:title>Blog - Cybersecurity in the Insurance Industry</image:title>
      <image:caption>Cybercriminals use various types of malware to attack insurance companies, such as ransomware, which blocks a company’s access to its systems and data until a ransom is paid.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2019/6/29/cybersecurity-in-healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1584515782014-QJK7ZIPVWXIPUMTI66WC/healthcare-it3-lessgreen.jpg</image:loc>
      <image:title>Blog - Cybersecurity in the Healthcare Industry</image:title>
      <image:caption>Healthcare systems are under increasing cyber threat. Cyberattacks on hospitals and other healthcare providers are growing in frequency and scope.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/2019/6/29/tips-for-addressing-security-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1584637334976-3K83TXLWINCA3KIKIJ1M/iStock-871052724.jpg</image:loc>
      <image:title>Blog - Tips for Addressing Security Exposures</image:title>
      <image:caption>Keeping operating systems and software up to date is an important protection against security breaches.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/category/Insights</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/category/News</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/category/Whitepapers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/risk+assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/antivirus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/overlapping+defense</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Domain-based+Message+Authentication+Reporting+and+Conformance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/SPF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/risk+prioritization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/corpsec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/phishing+awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/patch+management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/incident+response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/notification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/EDR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/prodsec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/cybersecurity+insurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/post-breach+response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Email+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/press+release</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/risk+management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/remediation+planning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/forensic+data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/DomainKeys+Identified+Mail</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/vulnerability+scan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/monitoring</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/phising</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/edr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/SOC+as+a+Service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/threat+visibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/asset+inventory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/internal+risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/lost+business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Law+firms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/external+risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/endpoint+detection+and+response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/DKIM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/vulnerability+assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/risk+mitigation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/healthcare</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Sender+Policy+Framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/threat-hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/Incident+Response+Plan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/whitelisting+tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/In-house+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/MMSP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/cyber+threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/reporting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/disclosure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/health</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/DMARC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/data+collection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/firewall</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/vulnerability+remediation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/swiss+cheese+model</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/cybercriminals</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/blog/tag/ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.firmguardian.com/shieldops-logos</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1582299485008-ZK54EOY1NU4WVXCHRBJV/so_pro.png</image:loc>
      <image:title>ShieldOPS Logos</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1582299485008-ZK54EOY1NU4WVXCHRBJV/so_pro.png</image:loc>
      <image:title>ShieldOPS Logos</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1582299502234-R1ZW4R25G7GI1LY39832/so_enterprise.png</image:loc>
      <image:title>ShieldOPS Logos</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1582299518707-6X815JZJPG05WCWEYEHK/so_elite.png</image:loc>
      <image:title>ShieldOPS Logos</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1571866827581-DX33B16FMUWKRW45PSFJ/Shield_OPS.png</image:loc>
      <image:title>ShieldOPS Logos</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/shield-ops-icons-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-08-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565809138374-1Z0MK9ZS4KYBB65CIIA0/detection.png</image:loc>
      <image:title>Shield OPS Icons 2 - 2. Detection</image:title>
      <image:caption>Our continuously improving and dynamic detection product leverages next-generation Endpoint Detection and Response software. Detection occurs through conventional virus signature confirmation, and more importantly, behavior that is mapped to the MITRE ATT&amp;CK™ knowledge base, and public and private threat intelligence feeds.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565809138374-1Z0MK9ZS4KYBB65CIIA0/detection.png</image:loc>
      <image:title>Shield OPS Icons 2 - 2. Detection</image:title>
      <image:caption>Our continuously improving and dynamic detection product leverages next-generation Endpoint Detection and Response software. Detection occurs through conventional virus signature confirmation, and more importantly, behavior that is mapped to the MITRE ATT&amp;CK™ knowledge base, and public and private threat intelligence feeds.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565209834185-A59H7X1MZ9Z7C1M0G0C5/response.png</image:loc>
      <image:title>Shield OPS Icons 2 - 4. Response</image:title>
      <image:caption>Automated Incident Response activities are a common start in quarantining and deleting suspicious files. However, a more robust Incident Response action can more accurately be performed by human intervention. Too often automated fixes give us a false sense of comfort. Our resident agents provide an automated action, reducing the mean time to remediate, collecting forensic data to be leveraged to strengthen ongoing defenses by understanding the full scope of attacks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/shield-ops-icons</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-08-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565209645349-HH5GZPR893CD2FC2Y533/visibility.png</image:loc>
      <image:title>Shield OPS Icons - 1. Visibility</image:title>
      <image:caption>FirmGuardian leverages industry leading behavioral and signature-based agents to provide the visibility and telemetry of your endpoint machines. Our sensors are quickly deployed to provide a significant amount of data, vastly exceeding the complexity and insight compared to conventional antivirus programs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565209645349-HH5GZPR893CD2FC2Y533/visibility.png</image:loc>
      <image:title>Shield OPS Icons - 1. Visibility</image:title>
      <image:caption>FirmGuardian leverages industry leading behavioral and signature-based agents to provide the visibility and telemetry of your endpoint machines. Our sensors are quickly deployed to provide a significant amount of data, vastly exceeding the complexity and insight compared to conventional antivirus programs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1565809113611-LD0A33VUEDFFKOEVKY7L/investigation.png</image:loc>
      <image:title>Shield OPS Icons - 3. Investigation</image:title>
      <image:caption>This critical analysis step is performed by our Security Operations team. We leverage proprietary alert ingestion to mitigate false positives and provide actionable information from vast data sets. In conventional signature-based cybersecurity solutions, this step is often skipped, or otherwise automated with a hollow assurance. Additionally, we perform Threat Hunting to mitigate false negatives, and search for anomalies in computing behavior.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/managed-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1585724416677-NTTTQRG1G0CYAVU1KIMR/SHIELDOPSHEADER.jpg</image:loc>
      <image:title>Managed Detection and Response - Managed Detection and Response</image:title>
      <image:caption>Managed Detection and Response Our Managed Detection and Response Services are an invaluable solution to regain focus on securing your cloud workspace environments and endpoint devices from threats that bypass your preventative controls.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588198794908-5XTZI58JOLUDYWUWQ8AY/Security+Gap+Analysis.jpg</image:loc>
      <image:title>Managed Detection and Response - Leave no gaps in your security approach</image:title>
      <image:caption>FirmGuardian offers several 24x7 managed cybersecurity options ranging from cloud security, endpoint monitoring, to wide-scale infrastructure protection. Our solutions expand upon a reactive security posture to a prevention-first model, saving you time and money. The numbers and results don’t lie. We provide solutions that not only identify threats, but it also blocks them before they appear in the wild.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1585723332834-V7GQVXKJMBW3AFRZF2Q2/FG_ShieldOPS_ENDPOINT.jpg</image:loc>
      <image:title>Managed Detection and Response</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1585723344555-GHPI6XP6EOHAU2QQSG4V/FG_ShieldOPS_INFRASTRUCTURE.jpg</image:loc>
      <image:title>Managed Detection and Response</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586556785277-YESASMKMJKID7YHW5CYC/FG_ShieldOPS_CLOUD2.jpg</image:loc>
      <image:title>Managed Detection and Response</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1590612146252-UCTRP51913TEFIR25TKG/breach_response.png</image:loc>
      <image:title>Managed Detection and Response</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/icons</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1568091568900-P0ZPB1T24P483MR7HM0Q/slider4.png</image:loc>
      <image:title>Icons</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1568091568900-P0ZPB1T24P483MR7HM0Q/slider4.png</image:loc>
      <image:title>Icons</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1573080116168-EKXITA6QFZV0V850JIY3/slider4.png</image:loc>
      <image:title>Icons</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1573080424897-W07LKXM8U95XPM8YCV04/slider7.png</image:loc>
      <image:title>Icons</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1593619878627-4TQPBH3FMIMJM8PHPV7R/image-asset.png</image:loc>
      <image:title>Icons</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1645063165240-8E9GIR4OVIYGYXXPGNU0/image-asset.png</image:loc>
      <image:title>Icons - Threat Hunting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583961435980-0TPMAA9OZG0T65IHV4U9/image-asset.jpeg</image:loc>
      <image:title>About Us - Cybersecurity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583961587949-PA15NT14V5GXC1RYB9UM/FG_HomepageSLider_2.jpg</image:loc>
      <image:title>About Us - Empowering Workforce</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583961679631-6HTMO1LQNODGMAE40P0I/AdobeStock_162834039.jpg</image:loc>
      <image:title>About Us - Endpoint Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583961384712-XVDI5QXGOJ0VRW2HYL4F/FG_Shield.jpg</image:loc>
      <image:title>About Us - Privacy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588781923983-WEUZIOKTTTLOQ7ZCDDAK/adam_rebhuhn.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588781906880-E24H6VMTZT0ZW6D8UE0O/sean_hall.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1589415280439-UJ9LMA4JYGFVKJWVYYSO/pyyk.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963832585-0VZV9JL5LC4NWDPIGTX8/CEH%2BLogo.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963943997-QJ35FLWL7DBX5NHAAWGX/CISSO-logo.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963832866-ZFMBGBZ5WIA4LRSK99BP/cloud-security-alliance.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963833072-E4382LF5FRMDGG88UUXU/cnda-roll-img-sec2.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963833339-FH5R41UD9Q7RNEBL1OOH/cph.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963833465-C41LSLV3B2LHUJBBJ7PG/fireeye.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963833888-JEEULG41M6ECOIKO6KEE/LPI-1.gif</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583963834013-PLT3I4P6PFW735QQV5LX/sourcefirelogo.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591207778247-J3DQC8QACH1XZOK3G99B/CISSP.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208538658-718IH14JULDMATZKFHXP/linkedin_thumb_oscp-acclaim.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208576870-47FVFEJLJI7D2HJ3EKB8/Template_GNFA.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208609408-VQYFNZRPL8KZH7T35OIX/GMON.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208622161-3V4SXK5BXGZDFFE26Y6K/linkedin_thumb_Template_GSEC.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208769322-YMCHPI50OCDW8OG4LHNP/GCTI.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208718378-D9D1TVU89RML2CXS4Z88/what-is-ccna-cisco-certified-network-associate.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208738509-B7IXIQI8CVYP5487S4JS/Security%2B.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208909521-R7XQU0BTTG8N99NOABU4/eJPT.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208931198-FC4XY2JX1439CNGUNNNE/elk_stack.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208948535-38N6IZ4V89X51QFT5BKQ/Honeywell-Logo.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208973599-SYG7BU8VTNUTAK372VTV/Lenel.png</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591208985618-16B9Q4IASWBW9SFJUFW4/Aiphone_Logo.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1583961041160-3EPFWWWP2FXDDCPXEX9K/FirmGuardianHERO.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/process-icons</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-04-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586900345679-VZF8CJRU8SQ8B6RYGAUH/Visibility.jpg</image:loc>
      <image:title>Process Icons - Visibility</image:title>
      <image:caption>FirmGuardian leverages industry leading behavioral and signature-based agents to provide the visibility and telemetry of your endpoint machines. Our sensors are quickly deployed to provide a significant amount of data, vastly exceeding the complexity and insight compared to conventional antivirus programs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586900345679-VZF8CJRU8SQ8B6RYGAUH/Visibility.jpg</image:loc>
      <image:title>Process Icons - Visibility</image:title>
      <image:caption>FirmGuardian leverages industry leading behavioral and signature-based agents to provide the visibility and telemetry of your endpoint machines. Our sensors are quickly deployed to provide a significant amount of data, vastly exceeding the complexity and insight compared to conventional antivirus programs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586900353137-G25MN9KCH9EJ3YLDE1Y8/Detection.jpg</image:loc>
      <image:title>Process Icons - Detection</image:title>
      <image:caption>Our continuously improving and dynamic detection product leverages next-generation Endpoint Detection and Response software. Detection occurs through conventional virus signature confirmation, and more importantly, behavior that is mapped to the MITRE ATT&amp;CK™ knowledge base, and public and private threat intelligence feeds.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586900358895-HQANSCCSD6GZB0G1EI9A/Investigation.jpg</image:loc>
      <image:title>Process Icons - Investigation</image:title>
      <image:caption>This critical analysis step is performed by our Security Operations team. We leverage proprietary alert ingestion to mitigate false positives and provide actionable information from vast data sets. In conventional signature-based cybersecurity solutions, this step is often skipped, or otherwise automated with a hollow assurance. Additionally, we perform Threat Hunting to mitigate false negatives, and search for anomalies in computing behavior.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586900364141-JQXRRA2CMUGVZZ4C6LWB/Response.jpg</image:loc>
      <image:title>Process Icons - Response</image:title>
      <image:caption>Automated Incident Response activities are a common start in quarantining and deleting suspicious files. However, a more robust Incident Response action can more accurately be performed by human intervention. Too often automated fixes give us a false sense of comfort. Our resident agents provide an automated action, reducing the mean time to remediate, collecting forensic data to be leveraged to strengthen ongoing defenses by understanding the full scope of attacks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048525713-HSU0VLUPH2L590D0ARK5/Certifications.jpg</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596045587021-K3LEUAJ4KBEZXXJXW8N5/FG_Partners.png</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595433946184-3I8KER69VU8VB9AZ53ZS/AdobeStock_163585024_HORIZONTAL_CENTERED.jpg</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595883887281-HKV6VG8OPYZ7G9G9TDA3/IncidentResponse.jpg</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048928498-ONGBKZ9OCREJN5D63HHW/MDR_FINAL.jpg</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596049001284-AZG7QYN61WH8R8JEEPUQ/RiskManagement_FINAL.jpg</image:loc>
      <image:title>FirmGuardian Cybersecurity Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/healthcare</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1607545545277-ETP9SEIC2NZWZUR92RL1/FG_CybersecurityInHealthcare.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169769573-VAK77TK5EL13HZ0RQIYA/Office365_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169748337-6WWURSOV8TV005LZP6MG/CarbonBlack_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169845298-6QCZA4W1ELP1U31O9DHG/PlexTrac_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169924262-LLL9IR5U75G0VEXL5R8L/KnowBe4_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169789594-JFWVKIB75TWMYNYGLU6Z/tenable_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048525713-HSU0VLUPH2L590D0ARK5/Certifications.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611172091988-MXKWW2OA1H61Y78EOFVV/RiskManagement_FINAL_SQUARE.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare - Security as a Service</image:title>
      <image:caption>Healthcare clinics rely on in-house and outsourced IT teams to keep the operational side of the practice running. Although security is often considered by these teams, it is rarely the primary focus. We serve as an extension of your IT operations to protect you from malware, ransomware, and provide you with an Incident Response team to keep your focus on patient care.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048928498-ONGBKZ9OCREJN5D63HHW/MDR_FINAL.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596049001284-AZG7QYN61WH8R8JEEPUQ/RiskManagement_FINAL.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595883887281-HKV6VG8OPYZ7G9G9TDA3/IncidentResponse.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595433946184-3I8KER69VU8VB9AZ53ZS/AdobeStock_163585024_HORIZONTAL_CENTERED.jpg</image:loc>
      <image:title>Cybersecurity for Healthcare</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/cybersecurity-for-law-firms</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1620861916304-VW4KVLVHEXMVFPVOJTZZ/Law-Firm-Laptop.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169748337-6WWURSOV8TV005LZP6MG/CarbonBlack_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169769573-VAK77TK5EL13HZ0RQIYA/Office365_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169924262-LLL9IR5U75G0VEXL5R8L/KnowBe4_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169789594-JFWVKIB75TWMYNYGLU6Z/tenable_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1611169845298-6QCZA4W1ELP1U31O9DHG/PlexTrac_400x300.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048525713-HSU0VLUPH2L590D0ARK5/Certifications.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596048928498-ONGBKZ9OCREJN5D63HHW/MDR_FINAL.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1596049001284-AZG7QYN61WH8R8JEEPUQ/RiskManagement_FINAL.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1595883887281-HKV6VG8OPYZ7G9G9TDA3/IncidentResponse.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1619028461914-Q6TD35V3H9YJLKOOVRJ8/AdobeStock_284672803.jpg</image:loc>
      <image:title>Cybersecurity for Law Firms</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/brand-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/7a7d797e-374f-41b5-9580-1357e6e4819c/BRAND_ABUSE.jpg</image:loc>
      <image:title>Brand Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/f485ddfd-e6da-48d6-971b-75b03a5801ec/DOTTED_SPACER.jpg</image:loc>
      <image:title>Brand Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/03ef2aab-6eb2-48a3-828d-7201bca11062/BRAND_INFRINGEMENT.jpg</image:loc>
      <image:title>Brand Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/78034aed-4704-4ca4-8f06-3a5e92036b12/BRAND_INTELLIGENCE.jpg</image:loc>
      <image:title>Brand Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/397316ad-4c34-460d-9c20-ad871fd5027c/DOTTED_SPACER_LEFT.jpg</image:loc>
      <image:title>Brand Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/brand-protection-solutions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/c81069bc-4925-46b1-a94e-eab87a5c2f65/DOPPEL_APP.jpg</image:loc>
      <image:title>Brand Protection Solutions</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/7444c92f-ad47-47f8-9180-3ed2a9ed192c/BRAND_PROTECTION_MONITORING.png</image:loc>
      <image:title>Brand Protection Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/6b4807e4-bce5-4e7a-a498-313863f28f55/BRAND_PROTECTION_PROACTIVE.jpg</image:loc>
      <image:title>Brand Protection Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/dc51bdc2-fb48-40b6-b6e3-f2140ff9f73d/AdobeStock_562167542.png</image:loc>
      <image:title>Brand Protection Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/5d12f6d3-f8f6-4d03-93be-0efe6c2baedc/DOPPEL_FIRMGUARDIAN.png</image:loc>
      <image:title>Brand Protection Solutions - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/contact-form</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588785924615-1HSWMYVNGSXUGAMU54EM/FG_Background_image.jpg</image:loc>
      <image:title>Contact</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/emailprotection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/39d4d675-a428-475d-9d29-0e162c6c0f58/annie-spratt-MChSQHxGZrQ-unsplash.jpg</image:loc>
      <image:title>Email Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/a6f87315-489f-40b0-a95b-ffcba4a4cee0/maxim-ilyahov-0aRycsfH57A-unsplash.jpg</image:loc>
      <image:title>Email Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588793577395-PXFXXUVUOBJMJPPZDF38/AdobeStock_2674104_2.jpg</image:loc>
      <image:title>Email Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1591210108905-FG1NDQXSD96628U4PHUB/FG_Background_image.jpg</image:loc>
      <image:title>Privacy Policy</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/ir-methodology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.firmguardian.com/ir-call-to-action</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1586555766498-XFDBJOKH37ZF7TSE1OWW/FG_Doc_BG.jpg</image:loc>
      <image:title>IR Call to Action</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.firmguardian.com/endpoint-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-12-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/8b5fe7bb-740a-428c-bc33-f1defa9b4b25/40080902694_76aa53b709_c.jpg</image:loc>
      <image:title>Endpoint Protection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/a02bfd7c-2d13-453a-8ff1-1dfbb6bd9d09/CyberDefense.jpg</image:loc>
      <image:title>Endpoint Protection - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/58b9b3d12e69cfb7c3858cae/1588793577395-PXFXXUVUOBJMJPPZDF38/AdobeStock_2674104_2.jpg</image:loc>
      <image:title>Endpoint Protection</image:title>
    </image:image>
  </url>
</urlset>

