<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://sechard.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-03 14:23:01 GMT -->
	<url>
		<loc>https://sechard.com/</loc>
		<lastmod>2025-12-22T10:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/</loc>
		<lastmod>2025-10-20T11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/about/</loc>
		<lastmod>2025-06-20T12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/contact/</loc>
		<lastmod>2023-08-18T10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/terms-and-conditions/</loc>
		<lastmod>2022-03-19T22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/privacy-policy/</loc>
		<lastmod>2022-03-19T22:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/book-a-demo/</loc>
		<lastmod>2025-10-01T07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/become-a-partner/</loc>
		<lastmod>2022-03-18T18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/deal-registration/</loc>
		<lastmod>2023-11-29T10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/book-a-meeting/</loc>
		<lastmod>2022-03-09T11:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/resources/</loc>
		<lastmod>2026-01-30T11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/saleskickoff24/</loc>
		<lastmod>2024-01-18T08:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/gisec2023/</loc>
		<lastmod>2023-03-09T12:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/ukmeetings/</loc>
		<lastmod>2023-05-23T06:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/information-security-management-system-policy/</loc>
		<lastmod>2023-05-31T07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/customers/</loc>
		<lastmod>2025-05-07T13:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/events/</loc>
		<lastmod>2023-09-11T11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/case-study-documents/</loc>
		<lastmod>2025-12-22T10:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/case-study-videos/</loc>
		<lastmod>2025-12-22T10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/trial-license/</loc>
		<lastmod>2025-12-18T13:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/marketing-portal/</loc>
		<lastmod>2026-01-06T12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/why-foundational-security-is-your-most-resilient-asset/</loc>
		<lastmod>2025-10-20T11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/from-snapshots-to-a-live-control-plane/</loc>
		<lastmod>2025-09-05T08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/how-good-cyber-hygiene-reduces-alert-fatigue-and-empowers-your-team-2/</loc>
		<lastmod>2025-09-04T11:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/no-security-without-asset-inventory-sechards-guide-to-full-stack-asset-visibility-and-control/</loc>
		<lastmod>2025-08-14T11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/from-standing-privileges-to-just-in-time-access-a-gartner-inspired-shift-in-cybersecurity/</loc>
		<lastmod>2025-08-04T07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/the-roi-of-robust-cyber-hygiene-a-sechard-perspective/</loc>
		<lastmod>2025-07-29T11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/how-good-cyber-hygiene-reduces-alert-fatigue-and-empowers-your-team/</loc>
		<lastmod>2025-07-29T11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/cybersecurity-asset-and-risk-management/</loc>
		<lastmod>2025-06-30T07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/enhancing-network-resilience-deviceboxs-centralized-approach-for-enterprises-and-msps/</loc>
		<lastmod>2025-06-02T07:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/the-power-of-platformization-how-sechard-is-revolutionizing-cybersecurity/</loc>
		<lastmod>2025-05-13T06:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cyber-hygiene-platform/</loc>
		<lastmod>2025-06-11T13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/devicebox/</loc>
		<lastmod>2025-05-15T09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cyber-hygiene/</loc>
		<lastmod>2025-05-08T12:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/how-cis-controls-v8-1-can-improve-your-organizations-security-posture/</loc>
		<lastmod>2024-12-23T07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/preventing-certificate-expiration-and-data-breaches-with-effective-key-management/</loc>
		<lastmod>2024-12-23T07:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/how-sechard-supports-compliance-with-cis-controls/</loc>
		<lastmod>2024-11-20T07:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/how-zero-trust-architecture-helps-proactive-risk-management/</loc>
		<lastmod>2024-11-20T07:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/key-strategies-for-gaining-user-buy-in-for-zero-trust-security-implementations/</loc>
		<lastmod>2024-11-20T07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/automated-security-controls-assessment/</loc>
		<lastmod>2024-09-17T19:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/privileged-access-management-pam/</loc>
		<lastmod>2024-08-06T07:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cis-controls-compliance/</loc>
		<lastmod>2024-08-02T13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cybersecurity-mesh/</loc>
		<lastmod>2025-06-20T12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/secure-configuration-management/</loc>
		<lastmod>2025-06-20T12:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cybersecurity-asset-and-risk-management/</loc>
		<lastmod>2025-06-20T12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/continuous-compliance-management-ccm/</loc>
		<lastmod>2025-06-20T12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cybersecurity-robotic-process-automation/</loc>
		<lastmod>2025-06-20T12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/zero-trust-adoption/</loc>
		<lastmod>2025-05-15T09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/cybersecurity-technology-consolidation/</loc>
		<lastmod>2024-08-02T21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/key-challenges-in-implementing-security-hardening/</loc>
		<lastmod>2024-07-16T11:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/principle-of-least-privilege-polp-best-practices/</loc>
		<lastmod>2024-07-08T11:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/legacy-software-risk-management/</loc>
		<lastmod>2024-07-05T11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/common-types-of-cyber-security-vulnerabilities-2/</loc>
		<lastmod>2024-07-04T07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/common-types-of-cyber-security-vulnerabilities/</loc>
		<lastmod>2024-07-02T08:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/best-workplaces-award/</loc>
		<lastmod>2024-04-29T10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/most-common-types-of-password-attacks-and-how-to-prevent-them/</loc>
		<lastmod>2023-10-13T11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/the-real-costs-of-manual-security-management-time-risks-and-resources/</loc>
		<lastmod>2023-10-06T08:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/mitigating-layer-2-network-attacks-with-sechard/</loc>
		<lastmod>2023-10-06T07:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/what-makes-your-infrastructure-a-prime-cyber-security-target/</loc>
		<lastmod>2023-09-11T11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/cyber-security-automation-key-benefits-and-best-practices/</loc>
		<lastmod>2023-09-11T11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/a-comprehensive-guide-to-developing-an-effective-pam-privileged-access-management-architecture-strategy/</loc>
		<lastmod>2023-08-04T09:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/challenges-faced-by-organizations-while-migrating-to-a-zero-trust-architecture/</loc>
		<lastmod>2023-07-31T15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/privileged-access-management-pam-best-practices/</loc>
		<lastmod>2023-07-12T22:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/blog/aligning-with-the-executive-office-of-the-president-memorandum/</loc>
		<lastmod>2023-07-12T22:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/key-manager/</loc>
		<lastmod>2023-06-08T11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/syslog-server/</loc>
		<lastmod>2023-06-08T11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/tacacs-server/</loc>
		<lastmod>2025-06-19T13:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/performance-monitor/</loc>
		<lastmod>2023-06-08T11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/device-manager/</loc>
		<lastmod>2023-06-08T11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/risk-manager/</loc>
		<lastmod>2023-06-08T11:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/vulnerability-manager/</loc>
		<lastmod>2022-03-06T23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/asset-manager/</loc>
		<lastmod>2022-03-18T21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/privileged-access-manager/</loc>
		<lastmod>2025-06-19T08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sechard.com/features/security-hardening/</loc>
		<lastmod>2022-03-18T23:04+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
