<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.cashelgroup.com.au/professional-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1450152490864-FBO9105MH3H9I7JP587W/image-asset.jpeg</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1449901806556-X77NFV25HMLHD26CX1HB/image-asset.jpeg</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1449671749453-N0EXWMI9T61K0DLNRG3O/One-day-I-will-run-this-place-000020573651_Full.jpg</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1452049879552-7AHFANV4V0E8MZ2P206A/Small+Two-businessmen-talking-while-looking-at-notes-000029245606_Full.jpg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/downloads-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-05-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1466314903093-3EIAUR7VKGN51U2HVQ1S/image-asset.jpeg</image:loc>
      <image:title>Downloads</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1466312702116-TIELUQQAP125QQ2LIU6N/Download+1.jpg</image:loc>
      <image:title>Downloads</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1458791937184-L5OE9PG8PGIP2U2DMBU2/image-asset.jpeg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1458111425998-IC0QHXZNUMGLJK6EGY4I/image-asset.jpeg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1496662614184-Q3B1CJWUUZ6VMRFPCLJA/group-of-smiling-businesspeople-meeting-in-office-000066255555_Full.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-06-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1449748784509-UGG3ZRA75NQX24QFHI9Z/image-asset.jpeg</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1449748724303-R8I4BHY54B5RIL8749IE/image-asset.jpeg</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1453972084785-JNQEX8GL0T5GA7NQA7IX/Woman-use-digital-tablet.jpg</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/meraki</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636687399-F54QCWAYAGGUL2M7EOEX/laptop1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526637053592-SEG5CQOQMEVLZ7G5ZD6A/7.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636710945-E8ZTEGSZP0G0TKM8I7AM/tablet1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526637079442-L0HKW9T9F5OGM03EURXC/6.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>IT Security Engineering, Consulting &amp; Architecture Program &amp; Project Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526637103850-3XX20EKI6PLHUP2OSA1E/seccamera.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>With over a decade of experience in hiring highly sought after IT Security resources, we can find the right resource for your business</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526637028141-12KYNB1BN7BVCVGAO23Q/4.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636741839-X4WJ2F4P6PNHVH27U7H8/Mobile1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636882212-CW5OZG8YO1VH9JB63B52/mobile-app1.png</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions - The Meraki dashboard mobile app for network management on the go.</image:title>
      <image:caption>Monitor Monitor wireless, switching, and security infrastructure. See network status and usage. Receive push notifications for network outages. Deploy Scan a switch barcode to add it to your network. Use the phone’s camera to document the switch location. Pinpoint the installation location using GPS. Troubleshoot Verify connectivity using live tools. Measure network throughput remotely. Reboot devices without on-site staff.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1506061869469-J2RYUTSBSUDDQGMVCF95/CM_Logo_Color.png</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636771319-PA9XMKJE5A0ZU1BRRY3J/wifi1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636653968-EK3YCYKRPNODTPCYUZRV/Meraki3.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>Cisco Meraki Dashboard accessed via browser</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636809195-Z6XWYVGR3SILS2GBVTWR/Headup.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636837569-ET2NRTXRP5E3GUNUY6Q0/city.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526636614399-22E49A2MWB3KIC5AKB5M/cloud2.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/free-demo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/cymulate-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-06-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527123407045-JVKI52INU65ZK0H80YJK/Data.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541286282644-QLHZIPDKK1T23HR3GMH4/Code.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation - Run the attack simulations</image:title>
      <image:caption>Run the attack simulations via the Cloud based SaaS Dashboard</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527123568243-JMDJ8TQBLCWP76L1BI95/Data-Safe-Box-596384360_2003x1502.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation - Analyse and remediate</image:title>
      <image:caption>Comprehensive report details successful attacks and suggests remediation actions</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541133559110-KAFHLBPVGK39S075JFLA/Cymulate-logo.png</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527123070240-ECO4Q6J51EGABAIT2POF/Eye1.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541133618687-1VYY427X8F44GSIGKYC8/Cymulate-logo.png</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527123045947-FAYT7L04KCXKK5XBBWHY/Tablet2.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
      <image:caption>Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541281280128-548P7UACSAMTYPS4LSSP/Download+1.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation - Install the agent</image:title>
      <image:caption>Register for a free trial, download and install the agent.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1540794242105-B6JNLGITEQI8HFHX4GWA/Screen+Shot+2018-10-29+at+5.14.56+pm.png</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527123015097-QUYLKKZ278FD7GNW9VKA/Binoculars.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1540364483236-6F2YCIS0RLGWSNTHFAEX/Cymulate1.png</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1527122981567-Z1KDPTZ7QL9CZOZVYPMX/Hoodie.jpg</image:loc>
      <image:title>Breach &amp; Attack Simulation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/cashel-group</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2024-07-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526284406999-X1HOP3O3JB22799WBK65/Lock1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526284610524-AG0QGTPNJU03E2OTKTJ9/Cloud1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>IT Security Engineering, Consulting &amp; Architecture Program &amp; Project Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541288354854-CCKXXKCAQ7RDAMXX7O4L/Investigate1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526452927310-Y0Y2KE2H8SN2C1K4VCDR/Thumb.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/c9f6af30-ee21-427d-8561-3babaf9d4351/Partner+Logos.png</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1526283795226-ILOYXFMA0RP6WOWQ1AHD/Password.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1541288182778-8UCKHV2J0WXVJKIHJOFS/Team1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1533533949510-I2VWIE02NJI3DFSL90Z7/Front+Page+2.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/rapid7</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1558423859772-87SMAADLEGXSP000D1DW/intelligence.jpg</image:loc>
      <image:title>SIEM &amp; VM - insightIDR - Cut through noise to detect attacks</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598868709991-KQ8WQK2KQCX05EZLE1LR/Rapid7+6.jpg</image:loc>
      <image:title>SIEM &amp; VM - Monitor your network operations</image:title>
      <image:caption>Cloud based storage and analysis of all your infrastructure logging</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598854780108-30YYY42AYKPM344PRW96/rapid7-logo-black-orange.png</image:loc>
      <image:title>SIEM &amp; VM - Security Data Management</image:title>
      <image:caption>Cloud based solutions for todays networks</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598856499897-QS8Q2SYK6D02E4I4IBTZ/product-wheel.png</image:loc>
      <image:title>SIEM &amp; VM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598862254168-FIP3G78OZN9EXHSNPNI1/Rapid7+2.jpeg</image:loc>
      <image:title>SIEM &amp; VM</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598868185049-OY77RNKD2HL0DWJPYQQ5/Rapid7+5.jpg</image:loc>
      <image:title>SIEM &amp; VM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598862475081-TE8D229E3DH2YCD0OZ7Z/Rapid7+3.jpg</image:loc>
      <image:title>SIEM &amp; VM</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598862740366-RUONGEZS712Q4YMWLNPZ/Rapid7+4.jpg</image:loc>
      <image:title>SIEM &amp; VM - insightVM - Secure your modern network</image:title>
      <image:caption>Gain full visibility of your ecosystem</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1598862050831-56H85A1V0U8LHTAODNGA/Screen+Shot+2020-08-31+at+6.18.39+pm.jpg</image:loc>
      <image:title>SIEM &amp; VM</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/dtex-2-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-05-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1620969243272-SRPJ63S9M5IIDNPVNDI5/Screen+Shot+2021-05-14+at+3.13.45+pm.png</image:loc>
      <image:title>Workforce Cyber Intelligence 2 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1558422907686-ROZV7UADETRC0JIHYERB/Visibility.jpg</image:loc>
      <image:title>Workforce Cyber Intelligence 2 - DLP with less overhead</image:title>
      <image:caption>Traditional Endpoint Data Loss Prevention (DLP) solutions rely on intrusive, resource intensive content inspection rules. These types of detection techniques are prone to high levels of false positives, require heavy endpoint agents that degrade performance, and must be constantly tuned by IT and security staff to remain effective. The ever-changing dynamics of today’s digital and distributed enterprises demand lightweight, easy-to-manage data loss prevention that doesn’t rely on rules-based keywords, patterns, expressions, and hashing to detect and prevent user-initiated data loss. Enterprises need a new approach.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1558423306256-HNY71P9IJ4EGILOOI1UJ/Answers4.jpg</image:loc>
      <image:title>Workforce Cyber Intelligence 2 - Dtex is light on bandwidth</image:title>
      <image:caption>Unlike heavy Endpoint DLP tools, DTEX InTERCEPT is a lightweight forwarder that requires no more than 3-5MB of bandwidth per day per endpoint and utilizes less than 1% CPU. With DTEX InTERCEPT, processing of DLP policies is not performed on the endpoint. Instead, all data is streamed in real-time to the cloud for analysis and detection, thereby avoiding many of the endpoint interoperability issues associated with traditional endpoint agents.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1620786512630-OEG5LZ0WPLQNVFT4SLGZ/download.png</image:loc>
      <image:title>Workforce Cyber Intelligence 2 - Make it stand out</image:title>
      <image:caption>Automatically uncover insider threats and prevent data loss</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1558423859772-87SMAADLEGXSP000D1DW/intelligence.jpg</image:loc>
      <image:title>Workforce Cyber Intelligence 2 - A new approach to DLP</image:title>
      <image:caption>Data Loss Prevention from DTEX takes a behavioral approach to data loss by monitoring and auditing all user activities based upon “out of the box” policies. Using this method, DTEX InTERCEPT is able to see the full lifecycle of behavior activity and understand the who, what, when and how of a possible data loss incident. No false positives, simply a real-time, scoring-based audit trail of all events.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55d55a81e4b099f9b43d6d02/1558417444835-WZRFBODZTI21RG37D96H/Cymulate1.jpg</image:loc>
      <image:title>Workforce Cyber Intelligence 2</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/remote-worker</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-08-26</lastmod>
  </url>
</urlset>

