<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.agilicus.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.agilicus.com/white-papers/industrial-cyber-security-best-practices/</loc>
		<lastmod>2026-05-22T03:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1641c6ff-security-best-practices-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1641c6ff-security-best-practices-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5092f6cc-generated-image-april-14-2026-9_41pm-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/237ee549-image-1-2d99e6a4-c36d-411c-9100-a6e818d62fba-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5cb82e67-image-1-3efc907c-0580-4c9d-9298-7f569ec4b2d3-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/cdbb83f7-image-1-af105fe4-8116-4e96-8bed-4ab5164771c9-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/eeafec07-image-1-9d9e071e-c2df-4667-9ca6-dedca0a8628c-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/551a1b4f-image-1-cb8f9785-5361-46d1-bf5a-97e2c96b2513-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/bc7dd644-purdue-with-agilicus-connector-overlay-purdue-only.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4d823d83-image-1-2b1ca48c-c6a2-4214-aaf9-3d125317cf89-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/pragmatic-cyber-resilience-achieving-the-canadian-centre-for-cyber-security-36-readiness-goals-with-agilicus-anyx/</loc>
		<lastmod>2026-05-21T15:01:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ffff3f35-z.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ffff3f35-z.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8e5abff8-anyx-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/identity-aware-proxy-wins-over-privileged-access-manager/</loc>
		<lastmod>2026-05-21T03:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/be8ae2f8-2q.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/be8ae2f8-2q.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/transforming-industrial-connectivity-into-identity-governed-compliance/</loc>
		<lastmod>2026-05-16T21:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8e5abff8-anyx-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ffff3f35-z.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/c14e29d9-industrial-mesh.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8e5abff8-anyx-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/43c22fdf-sso-ics-flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/fba98e0c-audit-flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/secure-remote-updates-for-air-gapped-systems/</loc>
		<lastmod>2026-05-16T17:14:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9a0ed6f8-factory-floor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/06d8c1be-schneider-plc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/dc581c9e-partner-hero-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/b2070675-facilitating-online-certificate-revocation-checking-architecture-diagram.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1f9691d8-diagnostic-log.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/6afe25d5-air-gapped-industrial-control.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/the-evolution-of-nerc-cip-003-transitioning-from-9-to-11-and-securing-the-grid/</loc>
		<lastmod>2026-05-16T17:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ffff3f35-z.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ffff3f35-z.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/why-traditional-vpns-are-the-weak-link-in-nerc-cip-003-9-compliance/</loc>
		<lastmod>2026-05-16T16:58:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8cc2d6d2-rust-repairs-and-ransomware-slashing-mttr-without-the-vpn-dumpster-fire.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/enabling-nis2-compliance-for-vnc-remote-access/</loc>
		<lastmod>2026-05-01T22:54:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4ea4e491-nis2-vnc-youtube-thumbnail-with-text-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/vpns-complex-non-compliant-and-lacking-security-for-modern-remote-access/</loc>
		<lastmod>2026-04-05T15:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4ef8b756-vpn-hacker.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4ef8b756-vpn-hacker-1024x538.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/7c319dc9-diagrams-vpn-tunnel.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ad4b7e88-diagrams-vpn-hotel.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/616c5f48-diagrams-overlapping-ip.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f3b7a300-diagrams-joint-risk.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4227ac3d-diagrams-laterral.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/159a552b-diagrams-general-agilicus-connection.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/agilicus-anyx-configuration-security/</loc>
		<lastmod>2026-04-05T15:56:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/20da8365-configuration-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/385d7f88-configuration-security-1024x1024.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/30c74c34-wastewater-remote-operations-and-asset-management.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/7531b7ba-identity-venn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/cb4460b9-wireguard-wstunnel.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/the-frictionless-factory-solving-the-connectivity-crisis-in-hyper-specialised/</loc>
		<lastmod>2026-04-05T15:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/0a7617b6-chain-gang-shared-fate.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/0a7617b6-chain-gang-shared-fate-1024x559.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/0a7617b6-chain-gang-shared-fate.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5f6a0f7e-high-speed-sort.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/secure-connectivity-for-multi-site-manufacturing/</loc>
		<lastmod>2026-04-05T15:56:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/75c7e825-manufacturing-floor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/75c7e825-manufacturing-floor-1024x569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e1bf7a0d-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/3d122bb3-diagrams-multi-site-vpn.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/6ac9d526-purdue-model.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/3d122bb3-diagrams-multi-site-vpn.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f7d87192-diagrams-copy-of-hub-and-spoke-vpn-transparent.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/24000740-diagrams-hub-and-spoke-vpn-transparent.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8c71bdec-shared-nothing-transparent.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/159a552b-diagrams-general-agilicus-connection.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/the-fragility-of-interdependence-securing-the-hyper-specialised-supply-chain-in-the-age-of-cyber-physical-convergence/</loc>
		<lastmod>2026-04-05T15:56:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/7a824b82-fragility-of-interdependence-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/securing-the-distributed-supply-chain-why-identity-is-the-new-air-gap/</loc>
		<lastmod>2026-04-05T15:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/94ad6369-perimeter.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/94ad6369-perimeter-1024x572.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/efe482cd-acme-manufacturing-network.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/7531b7ba-identity-venn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/69dc22fa-roi.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/nerc-cip-003-9-and-the-shift-to-multi-factor-authentication/</loc>
		<lastmod>2026-04-05T15:55:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/ee8962ee-nerccip0039whyyourvpnisacompliancedumpsterfire.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/nerc-cip-003-9-automating-access-control-and-authorisation-for-remote-power-sites/</loc>
		<lastmod>2026-04-05T15:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/c4d14913-flush-the-friction-secure-remote-operations-for-water-systems.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/secure-remote-access-for-energy-utilities-meeting-nerc-cip-standards-without-a-vpn/</loc>
		<lastmod>2026-04-05T15:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e34c6bf3-poland-distributed-energy-cyber-attack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/simplified-nerc-cip-compliance-for-low-impact-bes-cyber-assets/</loc>
		<lastmod>2026-04-05T15:55:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/be4463d4-electricity-square.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/how-zero-trust-architecture-secures-critical-energy-infrastructure-and-satisfies-nerc-cip/</loc>
		<lastmod>2026-04-05T15:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d4bc58b8-water-infrastructure-security-navigating-state-mandates-and-zero-trust.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/the-energy-utilitys-guide-to-replacing-vpns-for-nerc-cip-secure-remote-access/</loc>
		<lastmod>2026-04-05T15:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/a520e978-drowning-in-drives-secure-remote-scada-without-the-vpn-nightmare.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/198eb936-supply-mesh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/nerc-cip-003-9-legacy-remote-access-tools-are-not-sufficient/</loc>
		<lastmod>2026-03-02T03:19:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/67e33e6c-nerc-cip-003-9-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/67e33e6c-nerc-cip-003-9-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/b19d3f05-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/29d94dc2-nerc-cip-003-9-61-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e3f34238-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1d591b83-nerc-cip-003-9-61-circled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/merging-local-identity-with-online-identity/</loc>
		<lastmod>2025-12-01T00:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5c3021c0-plant-datacentre.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/10e485a0-plant-datacentre.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/40c531ca-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d2bcda55-02.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/b6041fda-03.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/58db3588-customer-provided-local-authentication.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f49235f6-icon-help-desk.svg.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8f560a1b-vnc-remote-desktop-data-flow.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/azure-application-consent/</loc>
		<lastmod>2025-11-30T21:42:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/934da57e-azure-app-registration-consent.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5663b320-azure-application-registration-consent.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/fd7ced49-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1d98bb5c-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d7ed0cf8-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1b2cee21-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/746ba5f6-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/protect-against-cyber-threats-zero-trust/</loc>
		<lastmod>2025-11-30T21:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/0f788a82-whitepaper-cyber-threats.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8e16ffd2-remoteaccess-threat-icons_1-vpn.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d77d2d03-about-body_39.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9e00501b-remoteaccess-threat-icons_1-vpn.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/b27065e0-remoteaccess-threat-icons_2-credentials.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/0b647923-remoteaccess-threat-icons_3-ransomware.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/21133a33-vpn-replacement-icons_2-network-risk.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/fa32c3b4-vpn-replacement-vpn-shield-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/2a6736e5-insurance-icons_security-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e3a5b124-icons-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42c7f555-insurance-icons_data-security-encryption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/66662b12-insurance-icons_role-based-access-controls.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4cf6201e-icons-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d38a005b-insurance-icons_identity-aware-web-application-firewall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/zero-trust-microsegmentation/</loc>
		<lastmod>2025-11-30T21:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/fdba5cd6-zones.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8de4e438-isa-iec-62443-infographic.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/df152d5c-users-gear-solid.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/88d81510-layer-group-solid.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/717ab30f-diagram-project-solid.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/2a3765ff-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e2a8c6b1-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/970c1a61-zero-trust-micro-segmentation-north-south-restrictions.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1cff1d35-zero-trust-micro-segmentation-north-south-east-west-undesirable.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/99996f98-zero-trust-micro-segmentation-all-micro-segmentation.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/multi-factor-authentication-on-the-internal-network/</loc>
		<lastmod>2025-11-30T21:38:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/87655a6b-east-west-vpn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/727b43c7-east-west-vpn.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/00c19137-resources-featured-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/4941c6ff-case-study-mfa-hero-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/909cbedc-iam-user-access-01.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/773bbf9e-audit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/piercing-the-purdue-model-zero-trust-in-operational-technology/</loc>
		<lastmod>2025-11-30T21:38:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/eb5baf3e-operational-technology.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/6ac9d526-purdue-model.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/3861386a-operational-technology.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/102f7af9-scada.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/6ac9d526-purdue-model.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/99996f98-zero-trust-micro-segmentation-all-micro-segmentation.drawio.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/zero-trust-air-gap-lockdown-inbound-and-outbound/</loc>
		<lastmod>2025-11-30T21:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d5df9c1f-outbound-only.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/f1c10fe6-zero-trust-air-gap-lockdown-inbound-and-outbound-page-1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/nist-sp-800-53-in-critical-infrastructure/</loc>
		<lastmod>2025-11-30T21:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/87655a6b-east-west-vpn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/727b43c7-east-west-vpn.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/nist-sp-800-53-mapping-to-zero-trust/</loc>
		<lastmod>2025-11-30T21:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/8f66015b-controls-e1681162736332.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/750fb19d-controls.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/2d2a277a-nist-sp-800-53-mapping-button.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/subscription-model-and-remote-access-in-industrial-control/</loc>
		<lastmod>2025-11-30T21:35:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/a1514bcf-industry-4.0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/97c8102c-industry-4.0.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/a670f711-licensing.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/71d67d2d-zero-trust-micro-segmentation-north-south-restrictions.drawio.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/high-availability-dual-wan-remote-industrial-connectivity/</loc>
		<lastmod>2025-11-30T21:32:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/b5034e40-industry-4.0-worldwide.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d6c678de-ssh-data-flow.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/9f758437-agilicus-logo-horizonta.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/42b9b652-partner.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/starlink-port-forwarding/</loc>
		<lastmod>2025-05-12T01:49:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/e514bc3e-sat.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/2b09b6f4-sketch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/1169ff82-typical-soho-port-forward.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/6915d92c-starlink-cgnat.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/d6c678de-ssh-data-flow.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/64f8ce57-starlink-agilicus.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.agilicus.com/white-papers/remote-desktop-access-managing-cyber-risk-with-modern-security-systems/</loc>
		<lastmod>2024-07-31T00:25:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.agilicus.com/www/eb29b507-remote-desktop-style.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/39ffd582-remote-desktop-style.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/5ac1c1b0-rdp-unsecure.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/dbc7f5d3-rdp-hack-icons_1-credstuff.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/3a0c9e9c-rdp-hack-icons_2-employeevuln.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/59de1aae-rdp-hack-icons_3-maninthemiddle.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/3122138c-rdp-hack-icons_5-permissions.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/dbc7f5d3-rdp-hack-icons_1-credstuff.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.agilicus.com/www/a33c2cd5-remote-desktop-access-infographic-01.svg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->