<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.ishantech.net/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.ishantech.net/about-us/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/contact/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/green-it/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-infra/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/field-research/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/it-infrastructure/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/ridge-bot/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/splunk/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/eset/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-infra/certero-assetstudio/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/presecurity/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/threatmon/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/secsatria/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/it-security/sangfor-cyber-command-ndr/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/green-it/certero-powerstudio/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-products/field-research/field-map/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/information-security-solutions/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/vulnerability-assessment/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/enterprise-security-audit/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/security-code-review/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/application-security-audit/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/penetration-testing/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/penetration-testing-services/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/infrastructure-security-services/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/security-consulting-and-advisory/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/ict-services/cyber-security/next-generation-security-operation-center-soc/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/careers/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/ridge-security-and-splunk-partner-to-accelerate-speed-of-response-with-integrated-security-solution/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/ridgebot-brings-affordable-pen-tests-to-your-organization/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/eset-research-warns-malaysian-bank-customers-about-three-malicious-android-apps-targeting-their-money/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/things-you-should-do-to-defend-against-wild-hackers-in-2022/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/owasp-top-10-compliance-with-ridgebot/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/hows-your-digital-serve/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/automated-penetration-testing-adversary-cyber-emulation/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/unifying-software-testing-across-hybrid-and-multicloud-systems/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/ridge-security-recognized-as-a-sample-vendor-in-gartner-hype-cycle/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/news/ridge-security-and-ishantech-host-technology-summit-in-malaysia/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/ishantech-granted-cybersecurity-service-provider-licenses-by-nacsa-malaysia/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/ishantech-has-been-awarded-malaysia-digital-status/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/achievement-splunk-elite-partner-ishantech-ict-solutions/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/top-10-cyber-security-solutions-providers-2023/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/eset-award-for-eset-smb-champion-2022-and-eset-growth-champion-2022/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/careers/business-executive/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/careers/support-engineer/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/partner-registration/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-claroty/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-crowdstrike/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-cyble/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-f5/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-forescout/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-mimecast/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-pre-security/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-ridgebot/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-sangfor-ndr/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-sensorfu/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-splunk/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-trend-micro/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-trillex/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/downloads/security-eset/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/awards-achievements/</loc>
  <lastmod>2025-08-06T05:45:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/ESET_Endpoint_Solutions_Product_Overview-1.pdf</loc>
  <lastmod>2025-05-16T11:17:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/acquaintia-product-brochure-2016.pdf</loc>
  <lastmod>2025-05-16T08:21:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/powerstudio-product-brochure-2016.pdf</loc>
  <lastmod>2025-05-16T08:23:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/passworks-product-brochure-2016.pdf</loc>
  <lastmod>2025-05-16T08:24:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/windows-and-mac-os-product-brochure-2016.pdf</loc>
  <lastmod>2025-05-16T08:25:57+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/SD_Windows_Enterprise_Brochure_20151019b_A4-1.pdf</loc>
  <lastmod>2025-05-16T08:27:16+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/RidgeS-Malaysian-RMiT-compliance-16Mch2021_1.pdf</loc>
  <lastmod>2025-05-16T11:36:55+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/RidgeBot-3.2-Datasheet-v1b-EN-Final.pdf</loc>
  <lastmod>2025-05-16T08:30:01+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/08/ISHANTECH_COMPANY_PROFILE_2025.pdf</loc>
  <lastmod>2025-08-04T13:38:44+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/PowerStudio-Datasheet-V2.pdf</loc>
  <lastmod>2025-07-22T05:15:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Infra-Vitado-By-Certero.pdf</loc>
  <lastmod>2025-07-22T05:59:12+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ThreatMon-Datasheet.pdf</loc>
  <lastmod>2025-07-23T05:19:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/IshanTech_M_Sdn_Bhd_Magazine.pdf</loc>
  <lastmod>2025-07-23T05:45:26+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/05/APAC_CIO_OUTLOOK_IshanTech.pdf</loc>
  <lastmod>2025-05-26T09:17:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Claroty-1.pdf</loc>
  <lastmod>2025-07-22T06:26:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Claroty-Continuous-Threat-Detection.pdf</loc>
  <lastmod>2025-07-22T06:26:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Claroty-Edge.pdf</loc>
  <lastmod>2025-07-22T06:26:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/crowdstrike-cloud-security-services.pdf</loc>
  <lastmod>2025-07-22T07:01:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/crowdstrike-incident-response-advisory-services.pdf</loc>
  <lastmod>2025-07-22T07:01:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/falcon-endpoint-protection-enterprise.pdf</loc>
  <lastmod>2025-07-22T07:01:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Falcon-FileVantage.pdf</loc>
  <lastmod>2025-07-22T07:01:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/why-security-leaders-choose-next-gen-mdr.pdf</loc>
  <lastmod>2025-07-22T07:01:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ASM-Datasheet.pdf</loc>
  <lastmod>2025-07-22T09:29:13+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Cyble-datasheet-Attack-Surface-Management.pdf</loc>
  <lastmod>2025-07-22T09:29:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Data-Sheet-Cyble-Brand-Intelligence.pdf</loc>
  <lastmod>2025-07-22T09:29:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/big-ip-advanced-waf-datasheet.pdf</loc>
  <lastmod>2025-07-22T10:24:01+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/big-ip-local-traffic-manager-ds.pdf</loc>
  <lastmod>2025-07-22T10:24:02+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/big-ip-platforms-datasheet.pdf</loc>
  <lastmod>2025-07-22T10:24:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/f5-distributed-cloud-app-stack-ds.pdf</loc>
  <lastmod>2025-07-22T10:24:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/f5-distributed-cloud-customer-edge-ce-deployable-software.pdf</loc>
  <lastmod>2025-07-22T10:24:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Cybersecurity-and-Risk-Management-for-OT-Solution-Brief.pdf</loc>
  <lastmod>2025-07-22T14:14:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Forescout-4D-Platformtrade.pdf</loc>
  <lastmod>2025-07-22T14:14:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Risk-and-Exposure-Management_-Identify-Quantify-and-Prioritize-Risk-and-Compliance.pdf</loc>
  <lastmod>2025-07-22T14:14:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Threat-Detection-038-Response-Brochure.pdf</loc>
  <lastmod>2025-07-22T14:14:49+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Advanced-BEC-Protection-1-pager.pdf</loc>
  <lastmod>2025-07-22T14:31:21+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Incydr-Product-Overview.pdf</loc>
  <lastmod>2025-07-22T14:31:22+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Mimecast-Email-Security-Cloud-Integrated.pdf</loc>
  <lastmod>2025-07-22T14:31:22+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Simplify-Your-Security-With-Mimecast.pdf</loc>
  <lastmod>2025-07-22T14:31:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/PRE-Datasheet-v2.pdf</loc>
  <lastmod>2025-07-22T14:46:24+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/SIEM-Replacement-Use-Case-PRE-Security-Draft-2.pdf</loc>
  <lastmod>2025-07-22T14:46:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/What-Is-AI-Native-Use-Case-PRE-Security-Draft-2.pdf</loc>
  <lastmod>2025-07-22T14:46:25+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/RidgeBot-HIPAA-White-Paper-032821.pdf</loc>
  <lastmod>2025-07-22T15:09:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/RidgeBot-ISO27001-White-Paper-111720.pdf</loc>
  <lastmod>2025-07-22T15:09:46+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/RidgeBot%C2%AE-Datasheet-English.pdf</loc>
  <lastmod>2025-07-22T15:09:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Web-Penetration-Testing-Sample-Report-4.2.2.pdf</loc>
  <lastmod>2025-07-22T15:09:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/cyber-command-_datasheet_20230518.pdf</loc>
  <lastmod>2025-07-22T15:32:04+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/sangfor-br-p-athena-ndr-datasheet-20250616.pdf</loc>
  <lastmod>2025-07-22T15:32:06+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Protecting-water-utility-against-nation-state-cyber-adversary-Whitepaper.pdf</loc>
  <lastmod>2025-07-22T15:40:14+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/SensorFu-whitepaper-Experiences-with-Beacon-deployments.pdf</loc>
  <lastmod>2025-07-22T15:40:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/enterprise-security-uba.pdf</loc>
  <lastmod>2025-07-23T04:55:06+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Product-Brief-Enterprise-Security.pdf</loc>
  <lastmod>2025-07-23T04:55:07+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Product-Brief-Splunk-SOAR.pdf</loc>
  <lastmod>2025-07-23T04:55:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Splunk-Attack-Analyzer-Product-Brief.pdf</loc>
  <lastmod>2025-07-23T04:55:08+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Splunk-Enterprise.pdf</loc>
  <lastmod>2025-07-23T04:55:09+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/splunk-cloud-platform.pdf</loc>
  <lastmod>2025-07-23T04:55:10+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/splunk-uba-product-brief.pdf</loc>
  <lastmod>2025-07-23T04:55:10+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ds-vision-one-endpoint-security.pdf</loc>
  <lastmod>2025-07-23T05:24:30+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ds-xdr-for-networks.pdf</loc>
  <lastmod>2025-07-23T05:24:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-central-management-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-change-control-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-datasheet-dlp-prevent.pdf</loc>
  <lastmod>2025-07-23T05:54:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-detection-as-a-service-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-email-security-server-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:53+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-endpoint-detection-and-response-der-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-endpoint-protection-platform-solution-brief.pdf</loc>
  <lastmod>2025-07-23T05:54:54+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-endpoint-security-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:55+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-epo-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:55+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-intaas-datasheet.pdf</loc>
  <lastmod>2025-07-23T05:54:56+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-mobile-security-datasheet-1.pdf</loc>
  <lastmod>2025-07-23T05:54:56+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/trellix-network-detection-and-response-solution-brief.pdf</loc>
  <lastmod>2025-07-23T05:54:57+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/26_-_Endpoint-V6-Security_for_windows.pdf</loc>
  <lastmod>2025-07-23T06:33:45+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/38_-_ESET_verticals_fin-4.pdf</loc>
  <lastmod>2025-07-23T06:33:46+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/54_-_Endpoint-Mobile_Device_Management_for_iOS.pdf</loc>
  <lastmod>2025-07-23T06:33:46+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESET-Business-Solutions-MOD.pdf</loc>
  <lastmod>2025-07-23T06:33:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESET-Endpoint-Antivirus-for-Windows.pdf</loc>
  <lastmod>2025-07-23T06:33:47+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESET-Internet-Security-Product-Overview.pdf</loc>
  <lastmod>2025-07-23T06:33:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESETus-Enterprise-CompanyProfile-web.pdf</loc>
  <lastmod>2025-07-23T06:33:49+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESETus-FileSecurity-WindowsServer-datasheet.pdf</loc>
  <lastmod>2025-07-23T06:33:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/ESETus-MSPprogram-overview.pdf</loc>
  <lastmod>2025-07-23T06:33:50+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Gemini_Offering_Brochure_A4.pdf</loc>
  <lastmod>2025-07-23T06:33:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Product-Overview-ESET-Endpoint-Security.pdf</loc>
  <lastmod>2025-07-23T06:33:51+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/07/Product-Overview-ESET-NOD32-Antivirus.pdf</loc>
  <lastmod>2025-07-23T06:33:52+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.ishantech.net/wp-content/uploads/2025/06/RidgeBOT-whitepaper_021620_print-Small.pdf</loc>
  <lastmod>2025-06-04T14:43:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
</urlset>