<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.legatosecurity.com</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ensemble-security-operations-platform</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/mdr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/partners</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/our-team</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/edr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/xdr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/siemaas</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/firewall-administration</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/regulatory-compliance-readiness</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/email-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/strategic-services/security-consulting</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/strategic-services/vciso-fciso</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/third-party-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/security-assessments</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/incident-response</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/compromise-assessment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/professional-services/policy-generation</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/careers</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/why-us</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/events</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/thank-you</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/managed-services/socaas</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/disclaimer</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/acceptable-use-policy</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/platform</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/dl/security-assessment-thank-you</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/equal-employment-opportunity-information</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/msp-partners</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/lp/coleman-presley-meeting-scheduler</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/a-cisos-framework-for-assessing-your-security-stack</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/avoiding-the-one-size-fits-all-trap-why-technology-agnostic-solutions-offer-superior-customization</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/closing-the-gaps-apts-exploit-why-tools-alone-arent-enough</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/cmmc-compliance-is-no-longer-optional-why-it-matters-and-how-to-prepare</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/creating-a-compelling-business-case-for-cybersecurity-investment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/embracing-the-future-of-cybersecurity-the-promise-of-siemaas</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/enhancing-security-posture-with-legato-securitys-soc-as-a-service-streamlined-operations-and-proactive-threat-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/harnessing-the-power-of-security-edge-service-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/helping-your-ciso-identify-vulnerabilities-before-attackers-do</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/how-cybersecurity-investments-support-corporate-governance-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/how-to-bridge-the-gap-between-security-controls-and-operational-practice-nf5vc</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/how-to-limit-the-impact-of-a-cloud-data-breach</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/hunting-for-security-unmasking-the-critical-importance-of-threat-hunting-services</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/introducing-ensemble-security-operations-made-easier</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/introducing-mdr-revolutionizing-cybersecurity-with-unmatched-visibility-and-24x7-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/laying-the-groundwork-for-long-term-cyber-planning-with-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/legato-security-honored-as-a-top-10-solutions-provider-in-crns-2024-fast-growth-150</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/mastering-digital-security-with-the-indispensable-protection-of-firewall-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/mitigating-the-risks-of-unmanaged-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/quantifying-the-cost-of-cybersecurity-risks-vs-investments</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/reducing-risk-by-addressing-knowledge-gaps-across-teams</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/reimagining-cybersecurity-the-pivotal-role-of-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/strengthen-security-posture-with-compromise-assessment-proactive-defense-against-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/the-false-sense-of-security-created-by-cybersecurity-tools-alone</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/the-missing-link-in-your-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/the-risks-of-neglecting-security-validation</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/the-role-of-consistent-security-language-in-effective-risk-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/the-strategic-framework-to-building-a-people-process-and-technology-security-program</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/uncovering-vulnerabilities-that-may-have-gone-unnoticed</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/unleashing-the-power-of-managed-detection-and-response-mdr-for-comprehensive-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/unveiling-the-unseen-guardian-managed-email-security-services</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/vlog-new-sec-reporting-requirements</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/blog/your-cybersecurity-program-is-built-now-prove-it-works</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/jacob-schofield</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/jen-greulich</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/kendra-valle</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/legato-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/tim-hastings</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/author/tom-boyden</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks/compromise-assessment-checklist-part-1</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks/key-considerations-for-building-a-security-budget</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks/part-2-compromise-assessment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks/part-3-compromise-assessment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/ebooks/what-to-consider-when-choosing-an-mssp</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/events/the-future-is-proactive-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/partners/google-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/partners/trend-micro-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/compromise-assessment-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/endpoint-security-management-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/ensemble-security-operations-platform</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/firewall-management-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/legato-security-ensemble-google-secops</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/managed-consulting-security-services</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/mdr-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/regulatory-and-compliance-readiness-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/security-awareness-training-data-sheet-</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/siemaas-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/socaas-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/tabletop-exercise-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/threat-hunting-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/virtual-ciso-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/data-sheets/vulnerability-management-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/introducing-mdr-legato-securitys-groundbreaking-solution-for-unparalleled-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/legato-security-achieves-cmmc-level-2-certification-reinforcing-its-position-as-a-trusted-partner-for-defense-and-federal-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/legato-security-secures-funding-to-drive-growth-and-innovation</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/legato-security-unveils-ensemble-a-game-changing-security-operations-platform</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/mandiants-tim-hastings-joins-legato-security-as-new-chief-information-security-officer</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/news/trend-micro-drives-high-margin-proactive-security-services-with-legato-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/compromise-assessment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/edr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/email-security</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/firewall-administration</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/incident-response</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/mdr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/pen-testing</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/policy-generation</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/regulatory-compliance-readiness</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/security-consulting</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/security-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/siemaas</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/socaas</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/tabletop-exercises</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/third-party-risk-assessments</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/vciso-fciso</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/category/xdr</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/tools/example-security-budget</loc>
    </url>
    <url>
        <loc>https://www.legatosecurity.com/tools/security-assessment</loc>
    </url>
</urlset>