<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://fidelissecurity.com/wp-content/plugins/pdf-sitemap/pdf-sitemap.xsl"?>
<!-- Served from cache -->
<urlset xmlns="https://www.sitemaps.org/schemas/sitemap/0.9">
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/04/Top-Threats-Trends-in-Cybersecurity-for-2026-Q1.pdf</loc>
	<lastmod>2026-04-01T10:55:33+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/03/Fidelis-Network-Hybrid-Infeastructure-Security-Datasheet.pdf</loc>
	<lastmod>2026-03-18T10:35:05+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/03/Hybrid-Infrastructure-Hidden-Risk-and-Security.pdf</loc>
	<lastmod>2026-03-18T10:07:29+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/03/Report-Top-10-CVEs-that-Affected-Enterprises-in-2025-Being-Prepared-for-2026-by-Fidelis-Security.pdf</loc>
	<lastmod>2026-03-10T15:21:51+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/03/Report-Top-10-CVEs-that-Affected-Enterprises-in-2025-Being-Prepared-for-2026-Fidelis-Security.pdf</loc>
	<lastmod>2026-03-10T12:30:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/03/Top-5-Benefits-and-Use-Cases-of-CNAPP.pdf</loc>
	<lastmod>2026-03-09T15:15:58+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/02/Achieving-of-Data-Loss-Prevention-in-the-era-of-Generative-AI-Fidelis-Security.pdf</loc>
	<lastmod>2026-02-18T07:54:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/02/Innovation-Spotlight-Fidelis-Deception-changes-the-Modern-Threat-Detection.pdf</loc>
	<lastmod>2026-02-11T13:47:46+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/02/Must-Have-NDR-Integrations-for-Security-Leaders-Whitepaper-Fidelis-Security.pdf</loc>
	<lastmod>2026-02-06T13:31:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/01/Top-Cybersecurity-Threats-Trends-of-2025-Part-3.pdf</loc>
	<lastmod>2026-01-29T08:36:34+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/01/Fidelis-Network-Forensics-Datasheet-Fidelis-Security.pdf</loc>
	<lastmod>2026-01-29T08:29:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/01/NDR-solutions-Buyers-Guide-Fidelis-Security.pdf</loc>
	<lastmod>2026-01-25T22:20:57+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/01/Cybersecurity-Forecast-2026-What-to-Expect-Fidelis-Security.pdf</loc>
	<lastmod>2026-01-14T10:18:41+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2026/01/Master-Threat-Hunting-Checklist-Fidelis-Security.pdf</loc>
	<lastmod>2026-01-12T05:10:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/12/Top-10-Ransomware-Attacks-in-2025-and-How-You-Can-Be-Prepared-for-2026.pdf</loc>
	<lastmod>2025-12-01T11:07:33+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/11/Adapting-your-security-strategy-to-a-cloud-infrastructure-Fidelis-Security.pdf</loc>
	<lastmod>2025-11-21T12:42:25+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/11/Next-Gen-Security-Operations-Integrating-XDR-with-SIEM-and-SOAR.pdf</loc>
	<lastmod>2025-11-21T12:06:37+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/11/How-to-Choose-a-CNAPP.pdf</loc>
	<lastmod>2025-11-12T16:31:49+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/11/How-to-track-key-vulnerabilities-and-Exposures-Fidelis-Security.pdf</loc>
	<lastmod>2025-11-07T15:51:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Monitoring-Your-Active-Directory-Checklist-Fidelis-Security.pdf</loc>
	<lastmod>2025-10-25T17:06:29+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/XDR-Solution-Implementation-Guide-Fidelis-Security-Guide.pdf</loc>
	<lastmod>2025-10-14T18:16:19+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Fidelis-vs-Other-Deception-Technologies.pdf</loc>
	<lastmod>2025-10-13T16:19:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-OnPrem_Sandbox_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:53+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-Sensor_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:51+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-Decoy-Server_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:47+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-CommandPost_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:43+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-Collector-SA_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:40+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-N-Fidelis-CollectorHighCapacityXA4_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:38+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-Sensor_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:35+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-OnPrem_Sandbox_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:33+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-Decoy-Server_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:30+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-CommandPost_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:27+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-Collector-SA_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:25+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-M-CollectorHighCapacityXA4_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:21+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-Sensor_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:18+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-OnPrem_Sandbox_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-Decoy-Server_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:13+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-CommandPost_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:10+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-Collector-SA_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/10/Rev-L-CollectorHighCapacityXA4_QSG.pdf</loc>
	<lastmod>2025-10-07T13:22:03+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/09/Role-of-NDR-in-building-an-incident-response-strategy-Fidelis-Security-Whitepaper.pdf</loc>
	<lastmod>2025-09-12T12:06:09+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/09/Top-Cybersecurity-Threats-Trends-Part-2-Fidelis-Security.pdf</loc>
	<lastmod>2025-09-09T13:05:36+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/08/How-Deception-Supercharges-NDR-for-advanced-Threat-Detection-Response.pdf</loc>
	<lastmod>2025-08-26T16:59:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/08/Leveraging-Deception-Technology-to-Protect-Healthcare-Data.pdf</loc>
	<lastmod>2025-08-20T18:01:25+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/08/Rev-N_Appliance-QuickSpecs.pdf</loc>
	<lastmod>2025-08-08T14:34:44+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/07/Why-Switch-from-Honeypots-to-Deception.pdf</loc>
	<lastmod>2025-07-10T13:07:21+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/07/Email-Security-Datasheet.pdf</loc>
	<lastmod>2025-07-07T12:09:03+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/06/Defending-AI-Driven-Crimes-How-to-Enhance-Your-Security-Posture.pdf</loc>
	<lastmod>2025-06-09T08:49:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/05/Threat-Report-Top-Security-Threats-and-Trends-of-2025-Part-1.pdf</loc>
	<lastmod>2025-05-29T12:03:45+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/05/Top-Security-Threats-and-Trends-of-2025-Part-1-Fidelis-Security.pdf</loc>
	<lastmod>2025-05-27T16:04:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/05/Fidelis-XDR-Vendor-Checklist.pdf</loc>
	<lastmod>2025-05-14T06:30:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/04/Breaking-Down-the-Real-Meaning-of-XDR.pdf</loc>
	<lastmod>2025-04-25T17:00:30+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/04/Top-5-Use-Cases_Enhancing-Cybersecurity-with-Fidelis-Elevate-XDR.pdf</loc>
	<lastmod>2025-04-10T07:19:38+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/03/Fidelis-__-PANW-Integration-Guide.docx.pdf</loc>
	<lastmod>2025-03-27T10:32:57+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/03/Fidelis-Network-DLP-Datasheet-Fidelis-Security.pdf</loc>
	<lastmod>2025-03-21T20:46:25+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/03/Fidelis-Deep-Session-Inspection-Datasheet.pdf</loc>
	<lastmod>2025-03-04T16:44:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/A-Robust-DLP-Solution-%E2%80%A8Need-For-Every-Industry-by-Fidelis-Security.pdf</loc>
	<lastmod>2025-01-29T16:41:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Fidelis-XDR-for-Ransomware-Preparedness.pdf</loc>
	<lastmod>2025-01-17T14:18:38+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Fidelis-Network-Detection-and-Response-Buyers-Guide-1.pdf</loc>
	<lastmod>2025-01-15T10:39:58+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Cyber-Effects-Russo-Ukrainian-Conflict-Fidelis-Report.pdf</loc>
	<lastmod>2025-01-10T19:19:46+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Cobalt-Group-Thredkit-Report.pdf</loc>
	<lastmod>2025-01-10T18:49:49+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Fidelis-Network-Detection-and-Response-Buyers-Guide.pdf</loc>
	<lastmod>2025-01-08T15:26:04+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/December-202-Threat-Intelligence-Summary-Fidelis-Security.pdf</loc>
	<lastmod>2025-01-01T16:28:50+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Cloud-Workload-Security-Forrester-Wave-Report-Fidelis-Security-Ebook.pdf</loc>
	<lastmod>2025-01-01T16:20:11+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2025/01/Capture-the-Flag-with-Deception-Fidelis-Security.pdf</loc>
	<lastmod>2025-01-01T15:22:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/Use-MITRE-ATTCK%C2%AE-for-Deception.pdf</loc>
	<lastmod>2024-12-19T13:52:44+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/Fidelis_Sandbox-Malware-Detection-Techniques.pdf</loc>
	<lastmod>2024-12-13T06:05:20+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/Fidelis-Elevate-CDM-Solution.pdf</loc>
	<lastmod>2024-12-11T11:27:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/A-New-Cyber-Game-Plan-Takes-Shape-Fidelis-Security.pdf</loc>
	<lastmod>2024-12-11T09:09:03+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/5-Must-Haves-to-boost-threat-detection-and-response-Fidelis-Security.pdf</loc>
	<lastmod>2024-12-11T08:59:22+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/12/10-Deployment-Considerations-for-your-Deception-Strategy-Ebook.pdf</loc>
	<lastmod>2024-12-02T14:39:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/Fidelis_Network-Deception-ProductReview_SANS_POLISH.pdf</loc>
	<lastmod>2024-11-28T10:58:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/Fidelis_Network-Deception-ProductReview_SANS_GERMAN.pdf</loc>
	<lastmod>2024-11-28T10:50:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/Fidelis_Endpoint_ProductReview_SANS_POLISH.pdf</loc>
	<lastmod>2024-11-20T09:22:01+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/State-of-SOC.pdf</loc>
	<lastmod>2024-11-20T08:55:44+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/Fidelis-Security-starkt-die-Sicherheit-in-Unternehmen-Sicherheitsfunktionen-in-Fidelis-Endpoint.pdf</loc>
	<lastmod>2024-11-11T17:23:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/Fidelis-Threat-Advisory-1020-Dissecting-the-Malware-Involved-in-the-INOCNATION-Campaign.pdf</loc>
	<lastmod>2024-11-11T17:11:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/2021-AWS-Cloud-Security-Report-Fidelis-CloudPassage.pdf</loc>
	<lastmod>2024-11-01T16:26:21+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/11/The-Five-Nastiest-Security-Mistakes-Exposing-Public-Cloud-Infrastructure-Whitepaper-Fidelis-Security.pdf</loc>
	<lastmod>2024-11-01T14:26:17+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/10/Building-a-Threat-Informed-Cybersecurity-Defense-Fidelis-Security.pdf</loc>
	<lastmod>2024-10-24T16:14:32+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/10/Achieving-Complete-Security-and-Compliance-Visibility-in-Public-Cloud-Environments-Fidelis.pdf</loc>
	<lastmod>2024-10-24T16:14:29+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/10/Fidelis-Reimagining-security-stack.pdf</loc>
	<lastmod>2024-10-18T19:00:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/10/Utilizing-Deception-Technology-Fidelis.pdf</loc>
	<lastmod>2024-10-18T18:59:58+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/09/No-Blind-Spots-Toolkit-Publich-cloud-security.pdf</loc>
	<lastmod>2024-09-23T10:08:28+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/09/Agenttesla-Ransomware-Research-Report-Fidelis.pdf</loc>
	<lastmod>2024-09-18T10:35:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/CISCO-eBook.pdf</loc>
	<lastmod>2024-08-30T17:20:23+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Practical-devsecops-adoption.pdf</loc>
	<lastmod>2024-08-30T17:10:29+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Deception_Technology_WhitePaper_02.3.pdf</loc>
	<lastmod>2024-08-27T11:43:51+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Fidelis-Cloud-AWS-PCI-Compliance-CS-1.pdf</loc>
	<lastmod>2024-08-22T16:51:15+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/fidelis-halo-ncr-case-study.pdf</loc>
	<lastmod>2024-08-21T15:50:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Terrain-eBook.pdf</loc>
	<lastmod>2024-08-20T15:16:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/legal-firms-dzp-case-study-with-Fidelis.pdf</loc>
	<lastmod>2024-08-16T18:30:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Network-Appliance.pdf</loc>
	<lastmod>2024-08-16T10:05:32+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/amazon-web-services.pdf</loc>
	<lastmod>2024-08-16T06:53:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Endpoint-Review-SA.pdf</loc>
	<lastmod>2024-08-13T17:44:12+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Threat-Advisory-1021-The-Turbo-Campaign.pdf</loc>
	<lastmod>2024-08-12T12:24:04+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Zero-Trust-Architecture-Whitepaper.pdf</loc>
	<lastmod>2024-08-09T17:43:30+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Halo-CNAPP-for-GCP.pdf</loc>
	<lastmod>2024-08-09T17:43:28+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/fidelis-halo-cnapp-for-aws-datasheet.pdf</loc>
	<lastmod>2024-08-08T15:56:12+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/fidelis-halo-cnapp-for-azure-dtasheet.pdf</loc>
	<lastmod>2024-08-08T15:56:11+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/The-First-72-hours-of-Incident.pdf</loc>
	<lastmod>2024-08-07T18:23:56+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Elevate-Risk-Calculation.pdf</loc>
	<lastmod>2024-08-07T18:23:54+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/What-is-Hiding-within-the-Metadata.pdf</loc>
	<lastmod>2024-08-06T16:35:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Deception-SC-Media-Review.pdf</loc>
	<lastmod>2024-08-06T15:26:32+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Threat-Hunting-Defined-Ebook.pdf</loc>
	<lastmod>2024-08-06T12:49:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/08/Fidelis-Automating-Threat-Detection.pdf</loc>
	<lastmod>2024-08-06T10:48:50+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/07/Network-DLP-buyers-Guide.pdf</loc>
	<lastmod>2024-07-24T04:51:05+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/07/TAG_Quarterly_2021_Q2.pdf</loc>
	<lastmod>2024-07-23T11:12:30+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/07/ESG-WP-Fidelis-Security-Oct-2021.pdf</loc>
	<lastmod>2024-07-23T05:05:05+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/07/ESG-eBook-Fidelis-Threat-Detection-and-Response-2019-04.pdf</loc>
	<lastmod>2024-07-22T13:57:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/07/Fidelis-Elevate-and-Forescout-EyeInspect.pdf</loc>
	<lastmod>2024-07-16T08:24:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Overcoming-Detection-Gaps-of-Deep-Packet-Inspection-Tools-Fidelis-Security.pdf</loc>
	<lastmod>2024-06-28T05:11:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Network-for-SentineOne-Joint-Solution.pdf</loc>
	<lastmod>2024-06-27T12:29:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-OnPrem_Sandbox_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:47+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-CommandPost_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:43+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis_Collector-XA2_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:40+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Sensor_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:38+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Decoy-Server_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:34+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Collector-SA_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:32+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-CollectorHighCapacityXA4_QSG_Rev-K.pdf</loc>
	<lastmod>2024-06-25T15:45:30+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Elevat-XDR-Terrain-Based-CyberDefense-DS-Rd2-F-May2023.pdf</loc>
	<lastmod>2024-06-07T14:23:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Network-Web-Sensor-Datasheet.pdf</loc>
	<lastmod>2024-06-07T14:22:29+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Incident-Response-Datasheet.pdf</loc>
	<lastmod>2024-06-07T14:22:04+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Fidelis-Scout-2-Datasheet.pdf</loc>
	<lastmod>2024-06-07T14:20:42+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/06/Active-Directory-Hardening-Checklist-and-strategies.pdf</loc>
	<lastmod>2024-06-04T16:56:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Halo-Cloud-Secure-Solution-Brief.pdf</loc>
	<lastmod>2024-05-31T04:57:12+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/MSSP-Solution-Brief.pdf</loc>
	<lastmod>2024-05-31T04:57:09+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Training_1910.pdf</loc>
	<lastmod>2024-05-25T08:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Endpoint_A-Technical-Deep-Dive_WP_1903.pdf</loc>
	<lastmod>2024-05-25T08:25:02+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Security-and-Zscaler-Solution-Brief.pdf</loc>
	<lastmod>2024-05-18T13:01:19+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Security-and-Devo-Joint-Solution.pdf</loc>
	<lastmod>2024-05-18T13:01:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Fidelis-Network-Mail-Sensor-Fidelis-Security.pdf</loc>
	<lastmod>2024-05-10T14:36:37+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/05/Prevention-Capabilities-of-Fidelis-Network-Fidelis-Security.pdf</loc>
	<lastmod>2024-05-10T14:36:34+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/retail-enterprise-pii-security-case-study-with-Fidelis.pdf</loc>
	<lastmod>2024-04-30T07:03:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Fidelis-SLA_Cloud.pdf</loc>
	<lastmod>2024-04-26T13:23:57+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Fidelis-Purchase-Order-Terms.pdf</loc>
	<lastmod>2024-04-26T13:23:54+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Fidelis-Software-As-Service-Agreement.pdf</loc>
	<lastmod>2024-04-26T13:23:51+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Implementers-Guide-to-Deception-Technologies.pdf</loc>
	<lastmod>2024-04-13T19:01:02+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Fidelis-Halo-Microagent-Datasheet.pdf</loc>
	<lastmod>2024-04-13T18:45:45+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/04/Gartner-NDR-buying-guide-2020.pdf</loc>
	<lastmod>2024-04-02T12:53:46+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Fidelis-CloudPassage-Halo-Container-Secure-Datasheet.pdf</loc>
	<lastmod>2024-03-28T13:49:24+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Fidelis-CloudPassage-Halo-Server-Secure-Datasheet.pdf</loc>
	<lastmod>2024-03-28T13:49:20+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Securing-greenfield-cloud-applications-with-the-halo-platform.pdf</loc>
	<lastmod>2024-03-07T05:44:18+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Securing-lift-and-shift-cloud-migrations-with-the-halo-platform.pdf</loc>
	<lastmod>2024-03-07T05:44:14+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Automating-Security-Controls-in-Kubernetes-Environments-Fidelis.pdf</loc>
	<lastmod>2024-03-06T15:56:04+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Securing-Hybrid-Cloud-with-the-Halo-Platform.pdf</loc>
	<lastmod>2024-03-06T15:56:02+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/03/Fidelis-Halo-Cloud-Secure-Datasheet.pdf</loc>
	<lastmod>2024-03-06T15:34:17+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Endpoint-Solution-Brief.pdf</loc>
	<lastmod>2024-02-28T16:11:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Stop-Ransomware-Solution-Brief.pdf</loc>
	<lastmod>2024-02-28T16:10:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/The-Shared-Responsibility-Model-Explained-Whitepaper.pdf</loc>
	<lastmod>2024-02-28T16:10:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Sandbox-Data-Sheet.pdf</loc>
	<lastmod>2024-02-27T15:39:31+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Active-Threat-Detection-Data-Sheet.pdf</loc>
	<lastmod>2024-02-27T15:16:22+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Active-Directory-Intercept-Data-Sheet.pdf</loc>
	<lastmod>2024-02-27T15:16:20+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/August-September-Cyber-Threat-Research-Intelligence.pdf</loc>
	<lastmod>2024-02-27T14:28:24+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Network-DLP-Buyers-Guide.pdf</loc>
	<lastmod>2024-02-27T13:50:18+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Deception-Solution-Brief.pdf</loc>
	<lastmod>2024-02-23T13:28:23+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/fidelis-cloudpassage-halo-datasheet.pdf</loc>
	<lastmod>2024-02-14T06:07:05+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Endpoint-detection-and-response-datsheet.pdf</loc>
	<lastmod>2024-02-13T16:22:28+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-network-detection-and-response-datasheet.pdf</loc>
	<lastmod>2024-02-13T16:22:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Deception-Datasheet.pdf</loc>
	<lastmod>2024-02-13T16:22:24+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Threat-Intelligence-Summary-June-2023-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-02-07T06:38:12+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/The-Evolution-of-NDR.pdf</loc>
	<lastmod>2024-02-07T06:37:10+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Proactive-Cyber-defense-with-XDR-MITRE.pdf</loc>
	<lastmod>2024-02-07T06:34:41+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Fidelis-Network-Solution-Brief.pdf</loc>
	<lastmod>2024-02-06T10:09:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Deep-Visibility-for-post-breach-detection.pdf</loc>
	<lastmod>2024-02-06T10:09:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Conflict_East_Europe_24_February_2022.pdf</loc>
	<lastmod>2024-02-05T08:42:03+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Ukraine-Report-Feb2023.pdf</loc>
	<lastmod>2024-02-01T15:02:13+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/02/Feb-2023-Threat-Intelligence-Summary-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-02-01T15:02:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Pharma-Company.pdf</loc>
	<lastmod>2024-01-30T12:36:33+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Multimedia-Company.pdf</loc>
	<lastmod>2024-01-30T12:36:21+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Lyell.pdf</loc>
	<lastmod>2024-01-30T12:36:09+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Lauda-Visibility-Control.pdf</loc>
	<lastmod>2024-01-30T12:35:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-IT-CS-Tech-Company.pdf</loc>
	<lastmod>2024-01-30T12:35:45+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Global-Banking-Leader.pdf</loc>
	<lastmod>2024-01-30T12:35:32+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-FINANCE-CS-Financial-Company.pdf</loc>
	<lastmod>2024-01-30T12:35:20+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Case-Study-Childern-Hospital.pdf</loc>
	<lastmod>2024-01-30T12:35:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/April-2023-Threat-Intelligence-Summary-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-30T12:27:38+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/TRT-Dec-2022.pdf</loc>
	<lastmod>2024-01-18T09:04:17+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Russo-ukraine-cyber-attacks.pdf</loc>
	<lastmod>2024-01-18T08:52:34+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Cybersecurity-Challenges-in-Coved-19.pdf</loc>
	<lastmod>2024-01-17T11:56:00+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Threat-Hunting-Checklist.pdf</loc>
	<lastmod>2024-01-17T11:54:14+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Evolution-of-Network-Detection-Response.pdf</loc>
	<lastmod>2024-01-17T11:44:36+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/May-2023-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:48:18+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/October-2022-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:47:06+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Nov-2022-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:47:05+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/March-2023-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:46:59+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/March-2022-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:46:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Jan-2023-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:46:52+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Aug-Sep-2022-Threat-Intelligence-Report-by-Fidelis-Security.pdf</loc>
	<lastmod>2024-01-04T07:46:49+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Mastering-Active-Directory-Security.pdf</loc>
	<lastmod>2024-01-02T09:16:46+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Building-Cyber-Resilience.pdf</loc>
	<lastmod>2024-01-02T09:16:44+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Beyond-Digital-Transformation-WhitePaper.pdf</loc>
	<lastmod>2024-01-02T09:16:40+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Halo-Service-Brief-Server-Secure.pdf</loc>
	<lastmod>2024-01-02T07:31:49+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Halo-Service-Brief-Container-Secure.pdf</loc>
	<lastmod>2024-01-02T07:31:47+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Elevate-Solution-Brief.pdf</loc>
	<lastmod>2024-01-02T07:31:46+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-CloudPassage-Halo-Solution-Brief.pdf</loc>
	<lastmod>2024-01-02T07:31:44+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-network-cloud-datasheet.pdf</loc>
	<lastmod>2024-01-02T06:43:42+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-collector-datasheet.pdf</loc>
	<lastmod>2024-01-02T06:43:39+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2024/01/Fidelis-Insight-Datasheet.pdf</loc>
	<lastmod>2024-01-02T06:43:36+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/UPDATEDFidelis-Software-As-Service-Agreement.pdf</loc>
	<lastmod>2023-12-29T04:53:57+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/UPDATEDFidelis-SLA_Cloud.pdf</loc>
	<lastmod>2023-12-29T04:53:55+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Beyond-Digital-Transformation-WhitePaper.pdf</loc>
	<lastmod>2023-12-28T13:16:36+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/April-2022-Threat-Intelligence-Summary-by-Fidelis-Security.pdf</loc>
	<lastmod>2023-12-27T06:16:39+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Fidelis-NCR-Case-Study-F.pdf</loc>
	<lastmod>2023-12-22T08:49:04+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Cloud-ComplianceAtHyperscale_CS.pdf</loc>
	<lastmod>2023-12-22T07:35:48+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/CloudPassageHalo-DATASHEET.pdf</loc>
	<lastmod>2023-12-08T18:19:17+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Fidelis-Security-and-SentinelOne-Joint-Solution-Brief.pdf</loc>
	<lastmod>2023-12-08T17:10:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/How-Fidelis-Elevate-works-Datasheet.pdf</loc>
	<lastmod>2023-12-06T08:15:26+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/Fidelis-Training.pdf</loc>
	<lastmod>2023-12-06T07:47:47+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/CS-Fidelis-Pharma-Company-1802.pdf</loc>
	<lastmod>2023-12-04T12:54:37+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/NDR-Infographic-Final.pdf</loc>
	<lastmod>2023-12-04T05:30:16+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/12/SC-Media-Fidelis-Deception93.pdf</loc>
	<lastmod>2023-12-01T12:53:34+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/FidelisCybersecurity-Product-Lifecycle-Policy-v05042018.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CollectorHighCapacityXA4-Rev-I.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Cloud-AWS-PCI-Compliance-CS.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CommandPost-K2-Rev-I.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Decoy-Server-Rev-K.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_CollectorEnterpriseXA2-Rev-I-1.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Purchase-Order-Terms.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Collector-SA-Rev-I.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_CollectorEnterpriseXA2-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CommandPost-Rev-K.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Software-As-Service-Agreement.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_Lyell_Case_Study-1.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_Sandbox-9.3.3_REV-J.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Collector-SA-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Sensors-Network-8.0-8.2.x.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Deception-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_Collector-XA2_QSG_Rev-K-1.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/FidelisNetworkSensorAWS.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis_CollectorEnterpriseXA2-Rev-I.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Sensor_QSG_Rev-K-1.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-OnPrem-Sandbox-Rev-K.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CommandPost-K2-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Sensor-Network-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Sensors-Network-8.3.4.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/TRT-Aug-Sept2.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Threat-Intelligence-Summary_F_July_2022.pdf</loc>
	<lastmod>2023-12-01T09:25:08+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CollectorHighCapacityXA4-9.3.3_RevJ.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CollectorHighCapacityXA4_QSG_Rev-K.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-CommandPost-8.3.4.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Collector-SA-Rev-K.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-SLA_Cloud.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Collector-High-Capacity-XA3.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/09/Fidelis-Sensor-Network-Rev-I.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Fidelis_Threat_Intelligence_Summary_Dec2021_F.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Fidelis-Cloud-AWS-PCI-Compliance-CS.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/StrategicPlan_20220912-V2_508c.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Fidelis_Threat_Intelligence_Summary_Nov2021_01.3.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Fidelis-Endpoint%C2%AE.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Fidelis-Deception%C2%AE.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Terrain-based-Proactive-Cyber-Defense.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Active-Threat-Detection.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Asset-Risk-Calculation.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Fidelis-Elevate%C2%AE.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/10/Fidelis-Halo.pdf</loc>
	<lastmod>2023-12-01T09:25:07+00:00</lastmod>
</url>
<url>
	<loc>https://fidelissecurity.com/wp-content/uploads/2023/11/Fidelis_Practical_DevSecOps_Adoption_F.pdf</loc>
	<lastmod>2023-12-01T09:25:06+00:00</lastmod>
</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->